Multimedia access control with secure provenance in fog-cloud computing networks

被引:0
|
作者
Yang Yang
Ximeng Liu
Wenzhong Guo
Xianghan Zheng
Chen Dong
Zhiquan Liu
机构
[1] Fuzhou University,College of Mathematics and Computer Science
[2] Guangxi Key Laboratory of Cryptography and Information Security,undefined
[3] Guangdong Provincial Key Laboratory of Data Security and Privacy Protection,undefined
[4] Fujian Provincial Key Laboratory of Information Processing and Intelligent Control (Minjiang University),undefined
来源
关键词
Multimedia data; Access control; Secure provenance; Fog computing; Data provider trace;
D O I
暂无
中图分类号
学科分类号
摘要
Multimedia data, ranging from text, audio, video to animation, undergoes intellectual property protection or has high sensitivity. To deal with privacy leakage during multimedia sharing and dissemination, it is crucial to trace the origin and transformation history of multimedia data, which is called multimedia provenance. In this paper, we construct a multimedia access control system with secure provenance in fog-cloud computing networks, which is designed based on attribute based encryption (ABE) and zero of knowledge technologies. The proposed scheme realizes confidentiality of multimedia big data that is outsourced to the cloud, anonymity of data provider, fine-grained access control of encrypted data, irrefutable of the provenance data, and traceability of data provider. We utilize the fog server to reduce user’s decryption burden and transfer partial decryption tasks. The suggested system is formally proved indistinguishable against chosen plaintext attack (IND-CPA). The simulation and experimental results indicate that our system has low communication overhead and low computation cost.
引用
收藏
页码:10701 / 10716
页数:15
相关论文
共 50 条
  • [21] Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing
    Xu, Shengmin
    Ning, Jianting
    Li, Yingjiu
    Zhang, Yinghui
    Xu, Guowen
    Huang, Xinyi
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1064 - 1077
  • [22] Service placement in fog-cloud computing environments: a comprehensive literature review
    Sarkohaki, Fatemeh
    Sharifi, Mohsen
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (12): : 17790 - 17822
  • [23] An evolutionary game approach to IoT task offloading in fog-cloud computing
    Hamidreza Mahini
    Amir Masoud Rahmani
    Seyyedeh Mobarakeh Mousavirad
    The Journal of Supercomputing, 2021, 77 : 5398 - 5425
  • [24] An evolutionary game approach to IoT task offloading in fog-cloud computing
    Mahini, Hamidreza
    Rahmani, Amir Masoud
    Mousavirad, Seyyedeh Mobarakeh
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (06): : 5398 - 5425
  • [25] Secure Dynamic Access Control Scheme of PHR in Cloud Computing
    Chen, Tzer-Shyong
    Liu, Chia-Hui
    Chen, Tzer-Long
    Chen, Chin-Sheng
    Bau, Jian-Guo
    Lin, Tzu-Ching
    JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (06) : 4005 - 4020
  • [26] Cooperative Fog-Cloud Computing Enhanced by Full-Duplex Communications
    Liu, Ming
    Mao, Yuming
    Leng, Supeng
    IEEE COMMUNICATIONS LETTERS, 2018, 22 (10) : 2044 - 2047
  • [27] Energy-makespan optimization of workflow scheduling in fog-cloud computing
    Ijaz, Samia
    Munir, Ehsan Ullah
    Ahmad, Saima Gulzar
    Rafique, M. Mustafa
    Rana, Omer F.
    COMPUTING, 2021, 103 (09) : 2033 - 2059
  • [28] Hierarchical Fog-Cloud Computing for IoT Systems: A Computation Offloading Game
    Shah-Mansouri, Hamed
    Wong, Vincent W. S.
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 3246 - 3257
  • [29] A fuzzy approach for optimal placement of IoT applications in fog-cloud computing
    Farhad Tavousi
    Sadoon Azizi
    Abdulbaghi Ghaderzadeh
    Cluster Computing, 2022, 25 : 303 - 320
  • [30] Provably Secure Data Access Control Protocol for Cloud Computing
    Zhang, Ji
    Chen, Anmin
    Zhang, Ping
    SYMMETRY-BASEL, 2023, 15 (12):