Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation

被引:33
|
作者
Xu, Qian [1 ]
Tan, Chengxiang [1 ]
Fan, Zhijie [1 ]
Zhu, Wenye [1 ]
Xiao, Ya [1 ]
Cheng, Fujia [1 ]
机构
[1] Tongji Univ, Dept Comp Sci & Technol, Cao An Highway, Shanghai 201804, Peoples R China
关键词
Internet of Things; fog computing; Attribute Based Signcryption; multi-authority; access control; anonymous authentication; PERSONAL HEALTH RECORDS; CLOUD; SCHEME; CHALLENGES;
D O I
10.3390/s18051609
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional "encrypt-then-sign" or "sign-then-encrypt" strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation.
引用
收藏
页数:38
相关论文
共 50 条
  • [21] Attribute-Based Access Control for Multi-Authority Systems with Constant Size Ciphertext in Cloud Computing
    CHEN Yanli
    SONG Lingling
    YANG Geng
    中国通信, 2016, 13 (02) : 146 - 162
  • [22] An Attribute-Based Access Control with Efficient and Secure Attribute Revocation for Cloud Data Sharing Service
    Nyamsuren Vaanchig
    Wei Chen
    Zhi-Guang Qin
    JournalofElectronicScienceandTechnology, 2017, 15 (01) : 90 - 98
  • [23] Lattice-based multi-authority ciphertext-policy attribute-based searchable with attribute revocation for cloud
    Shen, Xiajiong
    Li, Xiaoran
    Yin, Hongjian
    Cao, Chaoyang
    Zhang, Lei
    COMPUTER NETWORKS, 2024, 250
  • [24] A Multi-Authority Attribute-Based Encryption Scheme with Attribute Hierarchy
    Qi, Fang
    Li, Ke
    Tang, Zhe
    2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 607 - 613
  • [25] Efficient Multi-Authority Attribute-Based Signcryption with Constant-Size Ciphertext
    Zhao, Yang
    Ruan, Ankang
    Dan, Guohang
    Huang, Jicheng
    Ding, Yi
    2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [26] Large universe multi-authority attribute-based PHR sharing with user revocation
    Dong, Enting
    Wang, Jianfeng
    Liu, Zhenhua
    Ma, Hua
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 19 (03) : 376 - 386
  • [27] A traceable and revocable multi-authority attribute-based access control scheme for mineral industry data secure storage in blockchain
    Xiaohong Zhang
    Wenqi Du
    Ata Jahangir Moshayedi
    The Journal of Supercomputing, 2023, 79 : 14743 - 14779
  • [28] Multi-authority Attribute Based Encryption Scheme with Revocation
    Huang, XiaoFang
    Tao, Qi
    Qin, BaoDong
    Liu, ZhiQin
    24TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS ICCCN 2015, 2015,
  • [29] A traceable and revocable multi-authority attribute-based access control scheme for mineral industry data secure storage in blockchain
    Zhang, Xiaohong
    Du, Wenqi
    Moshayedi, Ata Jahangir
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (13): : 14743 - 14779
  • [30] Multi-authority attribute-based identification scheme
    Tang F.
    Bao J.
    Huang Y.
    Huang D.
    Wang H.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (03): : 220 - 228