A secure and efficient access control scheme with attribute revocation and merging capabilities for fog-enabled IoT?

被引:5
|
作者
Sarma, Richa [1 ]
Barbhuiya, Ferdous Ahmed [1 ]
机构
[1] Indian Inst Informat Technol, Dept Comp Sci & Engn, Gauhati, India
关键词
Fog; IoT; Cloud; Attribute merging; Attribute revocation; Access control;
D O I
10.1016/j.compeleceng.2022.108449
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The current era's technological innovation has accelerated the expansion of the Internet of things (IoT), leading to an exponential growth of the number of connected devices and the produced data. This inspired the emergence of fog computing paradigm that enables data processing and analysis near end-users. The cloud co-exists with fog to offer services like processing resources, huge storage, etc. But sending the data through multiple levels for analysis and storage poses a severe threat to data security in cloud-fog-IoT framework. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a well-known cryptographic mechanism for providing fine-grained access control. However, the existing CP-ABE schemes are not suitable as they fail to address the issues of attribute merging, attribute revocation, outsourcing operations, and facilitating privileged access altogether. Hence, this paper proposes a CP-ABE scheme addressing all the aforementioned issues. Further, security and performance analyses show that the proposed scheme is secure and suitable for IoT devices.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] An Efficient Access Control Scheme With Outsourcing and Attribute Revocation for Fog-Enabled E-Health
    Zhao, Jing
    Zeng, Peng
    Choo, Kim-Kwang Raymond
    [J]. IEEE ACCESS, 2021, 9 : 13789 - 13799
  • [2] ACS-FIT: A Secure and Efficient Access Control Scheme for Fog-enabled IoT
    Sarma, Richa
    Kumar, Chandan
    Barbhuiya, Ferdous Ahmed
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2020, : 2782 - 2789
  • [3] Efficient Attribute-Based Encryption Outsourcing Scheme With User and Attribute Revocation for Fog-Enabled IoT
    Li, Ling
    Wang, Zheng
    Li, Na
    [J]. IEEE ACCESS, 2020, 8 : 176738 - 176749
  • [4] Efficient and privacy preserving access control scheme for fog-enabled IoT
    Fan, Kai
    Xu, Huiyue
    Gao, Longxiang
    Li, Hui
    Yang, Yintang
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 99 : 134 - 142
  • [5] PAC-FIT: An efficient privacy preserving access control scheme for fog-enabled IoT
    Sarma, Richa
    Kumar, Chandan
    Barbhuiya, Ferdous Ahmed
    [J]. SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS, 2021, 30
  • [6] A Flexible Access Control with User Revocation in Fog-Enabled Cloud Computing
    Nagarani, C.
    Kousalya, R.
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 909 - 914
  • [7] MOFIT: An Efficient Access Control Scheme with Attribute Merging and Outsourcing Capability for Fog-Enhanced IoT
    Sarma, Richa
    Barbhuiya, Ferdous Ahmed
    [J]. PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT 2021, 2022, 13148 : 523 - 535
  • [8] Secure Computing for Fog-Enabled Industrial IoT
    Alvi, Ahmad Naseem
    Ali, Bakhtiar
    Saleh, Mohamed Saad
    Alkhathami, Mohammed
    Alsadie, Deafallah
    Alghamdi, Bushra
    [J]. SENSORS, 2024, 24 (07)
  • [9] e-SAFE: A secure and efficient access control scheme with attribute convergence and user revocation in fog enhanced IoT for E-Health
    Sarma, Richa
    Moulik, Sanjay
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 85
  • [10] Attribute-based data access control scheme with secure revocation in fog computing for smart grid
    Wu, Zhiwei
    Shi, Run-hua
    Li, Kunchang
    Yang, Yifan
    [J]. Cluster Computing, 2022, 25 (06) : 3899 - 3913