Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation

被引:33
|
作者
Xu, Qian [1 ]
Tan, Chengxiang [1 ]
Fan, Zhijie [1 ]
Zhu, Wenye [1 ]
Xiao, Ya [1 ]
Cheng, Fujia [1 ]
机构
[1] Tongji Univ, Dept Comp Sci & Technol, Cao An Highway, Shanghai 201804, Peoples R China
关键词
Internet of Things; fog computing; Attribute Based Signcryption; multi-authority; access control; anonymous authentication; PERSONAL HEALTH RECORDS; CLOUD; SCHEME; CHALLENGES;
D O I
10.3390/s18051609
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional "encrypt-then-sign" or "sign-then-encrypt" strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation.
引用
收藏
页数:38
相关论文
共 50 条
  • [1] Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-Based Signcryption
    Xu, Qian
    Tan, Chengxiang
    Fan, Zhijie
    Zhu, Wenye
    Xiao, Ya
    Cheng, Fujia
    IEEE ACCESS, 2018, 6 : 34051 - 34074
  • [2] Adaptively secure multi-authority attribute-based broadcast encryption in fog computing
    Chen, Jie
    Niu, Jiaxu
    Lei, Hao
    Lin, Li
    Ling, Yunhao
    COMPUTER NETWORKS, 2023, 232
  • [3] Attribute-Based Data Access Control for Multi-Authority System
    Salehi, Ahmad S.
    Rudolph, Carsten
    Grobler, Marthie
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1834 - 1841
  • [4] Attribute-based data access control scheme with secure revocation in fog computing for smart grid
    Zhiwei Wu
    Run-hua Shi
    Kunchang Li
    Yifan Yang
    Cluster Computing, 2022, 25 : 3899 - 3913
  • [5] Attribute-based data access control scheme with secure revocation in fog computing for smart grid
    Wu, Zhiwei
    Shi, Run-hua
    Li, Kunchang
    Yang, Yifan
    Cluster Computing, 2022, 25 (06) : 3899 - 3913
  • [6] Attribute-based data access control scheme with secure revocation in fog computing for smart grid
    Wu, Zhiwei
    Shi, Run-hua
    Li, Kunchang
    Yang, Yifan
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (06): : 3899 - 3913
  • [7] Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing
    Xu, Jie
    Wen, Qiaoyan
    Li, Wenmin
    Shen, Jian
    He, Debiao
    SOFT COMPUTING, 2017, 21 (18) : 5265 - 5279
  • [8] Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing
    Jie Xu
    Qiaoyan Wen
    Wenmin Li
    Jian Shen
    Debiao He
    Soft Computing, 2017, 21 : 5265 - 5279
  • [9] Multi-authority attribute-based encryption with efficient revocation
    Zhang K.
    Ma J.-F.
    Li H.
    Zhang J.-W.
    Zhang T.
    Tongxin Xuebao/Journal on Communications, 2017, 38 (03): : 83 - 91
  • [10] SLIM: A Secure and Lightweight Multi-Authority Attribute-Based Signcryption Scheme for IoT
    Gong, Bei
    Guo, Chong
    Guo, Chong
    Guo, Chen
    Sun, Yao
    Waqas, Muhammad
    Chen, Sheng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 1299 - 1312