A Secure Data-Sharing Scheme for Privacy-Preserving Supporting Node-Edge-Cloud Collaborative Computation

被引:2
|
作者
Zheng, Kaifa [1 ]
Ding, Caiyang [2 ]
Wang, Jinchen [3 ]
机构
[1] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
[2] Beihang Univ, Sch Comp Sci & Engn, Beijing 100191, Peoples R China
[3] North Informat Control Res Acad Grp Co Ltd, Nanjing 211100, Peoples R China
关键词
privacy-preserving; node-edge-cloud computation; data sharing; edge computing; attribute-based encryption; ATTRIBUTE-BASED ENCRYPTION; CIPHERTEXT; ABE;
D O I
10.3390/electronics12122737
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The node-edge-cloud collaborative computation paradigm has introduced new security challenges to data sharing. Existing data-sharing schemes suffer from limitations such as low efficiency and inflexibility and are not easily integrated with the node-edge-cloud environment. Additionally, they do not provide hierarchical access control or dynamic changes to access policies for data privacy preservation, leading to a poor user experience and lower security. To address these issues, we propose a data-sharing scheme using attribute-based encryption (ABE) that supports node-edge-cloud collaborative computation (DS-ABE-CC). Our scheme incorporates access policies into ciphertext, achieving fine-grained access control and data privacy preservation. Firstly, considering node-edge-cloud collaborative computation, it outsources the significant computational overhead of data sharing from the owner and user to the edge nodes and the cloud. Secondly, integrating deeply with the "node-edge-cloud" scenario, the key distribution and agreement between all entities embedded in the encryption and decryption process, with a data privacy-preserving mechanism, improve the efficiency and security. Finally, our scheme supports flexible and dynamic access control policies and realizes hierarchical access control, thereby enhancing the user experience of data sharing. The theoretical analysis confirmed the security of our scheme, while the comparison experiments with other schemes demonstrated the practical feasibility and efficiency of our approach in node-edge-cloud collaborative computation.
引用
收藏
页数:23
相关论文
共 50 条
  • [1] Secure data sharing scheme with privacy-preserving and certificateless integrity auditing in cloud storage
    Guan, Xuening
    Chang, Jinyong
    Zhang, Wei
    [J]. COMPUTER COMMUNICATIONS, 2024, 224 : 285 - 301
  • [2] Privacy-Preserving and Secure Sharing of PHR in the Cloud
    Leyou Zhang
    Qing Wu
    Yi Mu
    Jingxia Zhang
    [J]. Journal of Medical Systems, 2016, 40
  • [3] Privacy-Preserving and Secure Sharing of PHR in the Cloud
    Zhang, Leyou
    Wu, Qing
    Mu, Yi
    Zhang, Jingxia
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (12)
  • [4] A secure privacy-preserving cloud auditing scheme with data deduplication
    Li, Chen
    Liu, Zhenhua
    [J]. International Journal of Network Security, 2019, 21 (02): : 199 - 210
  • [5] Secure data sharing in collaborative network environments for privacy-preserving mechanisms
    Aher, Ujjwala Bal
    Bhosle, Amol A.
    Palsodkar, Prachi
    Patil, Swati Bula
    Koul, Nishchay
    Mange, Purva
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 855 - 865
  • [6] A Privacy-Preserving Architecture and Data-Sharing Model for Cloud-IoT Applications
    Fernandez, Maribel
    Jaimunk, Jenjira
    Thuraisingham, Bhavani
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 3495 - 3507
  • [7] RESEARCH ON PRIVACY-PRESERVING PROBLEM FOR DATA-SHARING IN IDS
    Wang, Wenbin
    Sun, Qibo
    Yan, Danfeng
    [J]. CIICT 2008: PROCEEDINGS OF CHINA-IRELAND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGIES 2008, 2008, : 320 - 323
  • [8] A Privacy-Preserving Data-Sharing Framework for Smart Grid
    Alharbi, Khalid Nawaf
    Lin, Xiaodong
    Shao, Jun
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (02): : 555 - 562
  • [9] Privacy-preserving data sharing scheme over cloud for social applications
    Lyu, Chen
    Sun, Shi-Feng
    Zhang, Yuanyuan
    Pande, Amit
    Lu, Haining
    Gu, Dawu
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 74 : 44 - 55
  • [10] A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing
    Wang, Xin
    Yang, Bo
    Xia, Zhe
    Zhao, Yanqi
    Yu, Huifang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,