Multimedia access control with secure provenance in fog-cloud computing networks

被引:0
|
作者
Yang Yang
Ximeng Liu
Wenzhong Guo
Xianghan Zheng
Chen Dong
Zhiquan Liu
机构
[1] Fuzhou University,College of Mathematics and Computer Science
[2] Guangxi Key Laboratory of Cryptography and Information Security,undefined
[3] Guangdong Provincial Key Laboratory of Data Security and Privacy Protection,undefined
[4] Fujian Provincial Key Laboratory of Information Processing and Intelligent Control (Minjiang University),undefined
来源
Multimedia Tools and Applications | 2020年 / 79卷
关键词
Multimedia data; Access control; Secure provenance; Fog computing; Data provider trace;
D O I
暂无
中图分类号
学科分类号
摘要
Multimedia data, ranging from text, audio, video to animation, undergoes intellectual property protection or has high sensitivity. To deal with privacy leakage during multimedia sharing and dissemination, it is crucial to trace the origin and transformation history of multimedia data, which is called multimedia provenance. In this paper, we construct a multimedia access control system with secure provenance in fog-cloud computing networks, which is designed based on attribute based encryption (ABE) and zero of knowledge technologies. The proposed scheme realizes confidentiality of multimedia big data that is outsourced to the cloud, anonymity of data provider, fine-grained access control of encrypted data, irrefutable of the provenance data, and traceability of data provider. We utilize the fog server to reduce user’s decryption burden and transfer partial decryption tasks. The suggested system is formally proved indistinguishable against chosen plaintext attack (IND-CPA). The simulation and experimental results indicate that our system has low communication overhead and low computation cost.
引用
收藏
页码:10701 / 10716
页数:15
相关论文
共 50 条
  • [1] Multimedia access control with secure provenance in fog-cloud computing networks
    Yang, Yang
    Liu, Ximeng
    Guo, Wenzhong
    Zheng, Xianghan
    Dong, Chen
    Liu, Zhiquan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (15-16) : 10701 - 10716
  • [2] A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
    Fan, Kai
    Wang, Junxiong
    Wang, Xin
    Li, Hui
    Yang, Yintang
    SENSORS, 2017, 17 (07)
  • [3] A Privacy-Preserving Access Control Scheme with Verifiable and Outsourcing Capabilities in Fog-Cloud Computing
    Cheng, Zhen
    Zhang, Jiale
    Qian, Hongyan
    Xiang, Mingrong
    Wu, Di
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING (ICA3PP 2019), PT I, 2020, 11944 : 345 - 358
  • [4] A Secure Fog-Cloud Based Architecture for MIoT
    Almehmadi, Tahani
    Alshehri, Suhair
    Tahir, Sabeen
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [5] Trade-off Model of Fog-Cloud Computing for Space Information Networks
    Carter, Jarred Michael
    Narman, Husnu S.
    Cosgun, Ozlem
    Liu, Jinwei
    2020 IEEE CLOUD SUMMIT, 2020, : 91 - 96
  • [6] Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing
    Xu, Shengmin
    Ning, Jianting
    Li, Yingjiu
    Zhang, Yinghui
    Xu, Guowen
    Huang, Xinyi
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1064 - 1077
  • [7] Enhanced Hybrid Equilibrium Strategy in Fog-Cloud Computing Networks with Optimal Task Scheduling
    Rao, Muchang
    Qin, Hang
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 79 (02): : 2647 - 2672
  • [8] Smart admission control strategy utilizing volunteer-enabled fog-cloud computing
    Jangu, Nupur
    Raza, Zahid
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (02)
  • [9] A Secure IoT Applications Allocation Framework for Integrated Fog-Cloud Environment
    Kalka Dubey
    S. C. Sharma
    Mohit Kumar
    Journal of Grid Computing, 2022, 20
  • [10] A Secure IoT Applications Allocation Framework for Integrated Fog-Cloud Environment
    Dubey, Kalka
    Sharma, S. C.
    Kumar, Mohit
    JOURNAL OF GRID COMPUTING, 2022, 20 (01)