TMO: Time Domain Outsourcing Attribute-Based Encryption Scheme for Data Acquisition in Edge Computing

被引:12
|
作者
Li, Youhuizi [1 ,2 ,3 ]
Dong, Zeyong [1 ,2 ]
Sha, Kewei [4 ]
Jiang, Congfeng [1 ,2 ]
Wan, Jian [2 ,5 ]
Wang, Yuan [6 ,7 ]
机构
[1] Hangzhou Dianzi Univ, Sch Comp Sci & Technol, Hangzhou 310018, Zhejiang, Peoples R China
[2] Minist Educ, Key Lab Complex Syst Modeling & Simulat, Hangzhou 310018, Zhejiang, Peoples R China
[3] Xian Key Lab Mobile Edge Comp & Secur, Xian 710071, Shaanxi, Peoples R China
[4] Univ Houston Clear Lake, Coll Sci & Engn, Houston, TX 77058 USA
[5] Zhejiang Univ Sci & Technol, Sch Informat & Elect Engn, Hangzhou 310023, Zhejiang, Peoples R China
[6] Engn Res Ctr Augmented Real & Intelligent Interac, Hangzhou 310052, Zhejiang, Peoples R China
[7] NetEase Hangzhou Network Co Ltd, Hangzhou 310052, Zhejiang, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
关键词
Multi-authority; CP-ABE; time-based; security; edge computing; ACCESS-CONTROL; INTERNET; CHALLENGES;
D O I
10.1109/ACCESS.2019.2907319
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of the Internet of Things and the ever-increasing demands of advanced services and applications, edge computing is proposed to move the computing and storage resources near the data source, which improves the response time and saves the bandwidth. However, due to the limited available resources and massive privacy-sensitive user data in edge nodes, there are huge challenges in data security and privacy protection in the edge computing environment. Hence, we propose an efficient time-domain multi-authority outsourcing attribute-based encryption (ABE) scheme (TMO) with a dynamic policy updating method for secure data acquisition and sharing in the edge computing. Specifically, considering that the time is a crucial factor in many real-world application scenarios, we add time-domain information in the encryption algorithm. Besides, to take full advantage of edge computing, TMO extends the multi-authority ABE approach by outsourcing the computation to edge nodes to enhance security and performance. Moreover, to tackle the mobility and frequently changing edge environment,TMO also provides an efficient online policy updating method to manage attribute information and to access policy with low overhead. The security analysis and the experimental results show that TMO can indeed efficiently enhance data security with low overhead in the edge computing environment.
引用
下载
收藏
页码:40240 / 40257
页数:18
相关论文
共 50 条
  • [1] Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption
    Zhu, Shuaishuai
    Han, Yiliang
    Wei, Yuechuan
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, : 257 - 261
  • [2] Attribute-based encryption scheme supporting attribute revocation and decryption outsourcing
    School of Mathematics and Statistics, Xidian Univ., Xi'an
    710071, China
    Xi'an Dianzi Keji Daxue Xuebao, 6 (6-10 and 55):
  • [3] Verifiable outsourcing EMRs scheme with attribute-based encryption in cloud-edge environments
    Xie, Chenlu
    Shi, Run-hua
    Zhang, Xiaoxu
    Wang, Pengbo
    Guo, Wanpeng
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 76
  • [4] Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing
    Ma, Chao
    Jin, Xiaojun
    Luo, Song
    Wei, Yifei
    Wang, Xiaojun
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2023, 17 (07): : 1935 - 1950
  • [5] Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation
    Gao J.
    Sun J.
    Qin J.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2160 - 2169
  • [6] Attribute-based encryption scheme supporting decryption outsourcing and attribute revocation in cloud storage
    Liu, Hongwei
    Zhu, Ping
    Chen, Zehong
    Zhang, Peng
    Jiang, Zoe L.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 556 - 561
  • [7] Attribute-Based Searchable Encryption in Edge Computing for Lightweight Devices
    Niu, Shufen
    Hu, Ying
    Zhou, Siwei
    Shao, Honglin
    Wang, Caifen
    IEEE SYSTEMS JOURNAL, 2023, 17 (03): : 3503 - 3514
  • [8] User Privacy Protection Scheme Based on Verifiable Outsourcing Attribute-Based Encryption
    Sheng, Luo
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021 (2021)
  • [9] Securely Outsourcing Attribute-Based Encryption with Checkability
    Li, Jin
    Huang, Xinyi
    Li, Jingwei
    Chen, Xiaofeng
    Xiang, Yang
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (08) : 2201 - 2210
  • [10] Security analyses of a data collaboration scheme with hierarchical attribute-based encryption in cloud computing
    Tai, Wei-Liang
    Chang, Ya-Fen
    Huang, Wen-Hsin
    International Journal of Network Security, 2020, 22 (02): : 212 - 217