Everything Under Control: Secure Data Sharing Mechanism for Cloud-Edge Computing

被引:6
|
作者
Song, Zishuai [1 ,2 ]
Ma, Hui [1 ,2 ]
Zhang, Rui [1 ,2 ]
Xu, Wenhan [1 ,2 ]
Li, Jianhao [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
基金
中国国家自然科学基金;
关键词
Access control; Encryption; Distributed databases; Security; Data processing; Data privacy; Servers; Cloud-edge computing; controllable delegation; bilateral access control; verifiability; WebAssembly; ATTRIBUTE-BASED ENCRYPTION; BILATERAL ACCESS-CONTROL; PROXY RE-ENCRYPTION;
D O I
10.1109/TIFS.2023.3266164
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud-edge computing is a new paradigm for data sharing. Many computation tasks are assigned to multiple edge nodes to mitigate the computing burden of the cloud and data is also outsourced to them to provide real-time services for IoT devices. However, two major issues remain, namely data privacy and real-world deployment. According to the data privacy rights and principles that stated by General Data Protection Regulation (GDPR), data access control, restriction of data processing and finding inaccuracy data are critical issues that should be tackled in cloud-edge computing. Besides, since there are various types of devices and many of them are resource-constrained, how to efficiently apply deployment in cloud-edge computing is challenging for practice. In this work, we propose a new cryptographic primitive Controllable Outsourced Attribute-Based Proxy Re-Encryption (COAB-PRE) and a universal WebAssembly-based implementation framework for cross-platform deployment. In particular, COAB-PRE achieves bilateral and distributed access control whereby data producers and data consumers can both specify policies the other party must satisfy without a centralized access control server. The property, that we called controllable delegation, restricts the data processing on the edge nodes. COAB-PRE also supports comprehensive verifiability to find out a wrong result produced by the edge nodes and locate the misbehaved one. Moreover, we further discussed the potential property of COAB-PRE and put forward an improved scheme with high efficiency on devices. We also implemented our scheme using the approach and deployed it on different devices for experiment. All theoretical and experimental results indicate that our solution is secure and practical, and our implementation is suitable for cloud-edge computing.
引用
收藏
页码:2234 / 2249
页数:16
相关论文
共 50 条
  • [1] Achieving fuzzy matching data sharing for secure cloud-edge communication
    Zhang, Chuan
    Zhao, Mingyang
    Xu, Yuhua
    Wu, Tong
    Li, Yanwei
    Zhu, Liehuang
    Wang, Haotian
    [J]. CHINA COMMUNICATIONS, 2022, 19 (07) : 257 - 276
  • [2] Achieving Fuzzy Matching Data Sharing for Secure Cloud-Edge Communication
    Chuan Zhang
    Mingyang Zhao
    Yuhua Xu
    Tong Wu
    Yanwei Li
    Liehuang Zhu
    Haotian Wang
    [J]. China Communications, 2022, 19 (07) : 257 - 276
  • [3] Adaptive Data Sharing and Computation Offloading in Cloud-Edge Computing with Resource Constraints
    Chu, Wenjie
    Zhao, Haiyan
    Jin, Zhi
    Hu, Zhenjiang
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2020, : 2842 - 2849
  • [4] Secure Keyword Search and Data Sharing Mechanism for Cloud Computing
    Ge, Chunpeng
    Susilo, Willy
    Liu, Zhe
    Xia, Jinyue
    Szalachowski, Pawel
    Fang Liming
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2787 - 2800
  • [5] Federated Secure Data Sharing by Edge-Cloud Computing Model*
    Karati, Arijit
    Das, Sajal K.
    [J]. 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 1362 - 1367
  • [6] Secure Sharing of Data in Cloud Computing
    Tiwari, Deepnarayan
    Gangadharan, G. R.
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 24 - 35
  • [7] Secure and Fine-Grained Flow Control for Subscription-Based Data Services in Cloud-Edge Computing
    Huang, Qinlong
    Wang, Chao
    Chen, Lixuan
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (03) : 2165 - 2177
  • [8] IoV data sharing scheme based on the hybrid architecture of blockchain and cloud-edge computing
    Zheng, Tiange
    Wu, Junhua
    Li, Guangshun
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [9] IoV data sharing scheme based on the hybrid architecture of blockchain and cloud-edge computing
    Tiange Zheng
    Junhua Wu
    Guangshun Li
    [J]. Journal of Cloud Computing, 12
  • [10] A Practical and Efficient Bidirectional Access Control Scheme for Cloud-Edge Data Sharing
    Cui, Jie
    Li, Bei
    Zhong, Hong
    Min, Geyong
    Xu, Yan
    Liu, Lu
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2022, 33 (02) : 476 - 488