TMO: Time Domain Outsourcing Attribute-Based Encryption Scheme for Data Acquisition in Edge Computing

被引:12
|
作者
Li, Youhuizi [1 ,2 ,3 ]
Dong, Zeyong [1 ,2 ]
Sha, Kewei [4 ]
Jiang, Congfeng [1 ,2 ]
Wan, Jian [2 ,5 ]
Wang, Yuan [6 ,7 ]
机构
[1] Hangzhou Dianzi Univ, Sch Comp Sci & Technol, Hangzhou 310018, Zhejiang, Peoples R China
[2] Minist Educ, Key Lab Complex Syst Modeling & Simulat, Hangzhou 310018, Zhejiang, Peoples R China
[3] Xian Key Lab Mobile Edge Comp & Secur, Xian 710071, Shaanxi, Peoples R China
[4] Univ Houston Clear Lake, Coll Sci & Engn, Houston, TX 77058 USA
[5] Zhejiang Univ Sci & Technol, Sch Informat & Elect Engn, Hangzhou 310023, Zhejiang, Peoples R China
[6] Engn Res Ctr Augmented Real & Intelligent Interac, Hangzhou 310052, Zhejiang, Peoples R China
[7] NetEase Hangzhou Network Co Ltd, Hangzhou 310052, Zhejiang, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
关键词
Multi-authority; CP-ABE; time-based; security; edge computing; ACCESS-CONTROL; INTERNET; CHALLENGES;
D O I
10.1109/ACCESS.2019.2907319
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of the Internet of Things and the ever-increasing demands of advanced services and applications, edge computing is proposed to move the computing and storage resources near the data source, which improves the response time and saves the bandwidth. However, due to the limited available resources and massive privacy-sensitive user data in edge nodes, there are huge challenges in data security and privacy protection in the edge computing environment. Hence, we propose an efficient time-domain multi-authority outsourcing attribute-based encryption (ABE) scheme (TMO) with a dynamic policy updating method for secure data acquisition and sharing in the edge computing. Specifically, considering that the time is a crucial factor in many real-world application scenarios, we add time-domain information in the encryption algorithm. Besides, to take full advantage of edge computing, TMO extends the multi-authority ABE approach by outsourcing the computation to edge nodes to enhance security and performance. Moreover, to tackle the mobility and frequently changing edge environment,TMO also provides an efficient online policy updating method to manage attribute information and to access policy with low overhead. The security analysis and the experimental results show that TMO can indeed efficiently enhance data security with low overhead in the edge computing environment.
引用
收藏
页码:40240 / 40257
页数:18
相关论文
共 50 条
  • [21] A Comparative Study of Attribute-Based Encryption Schemes for Secure Cloud Data Outsourcing
    Thangavel, M.
    Varalakshmi, P.
    Abinaya, C.
    2017 NINTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 261 - 266
  • [22] Power data sharing scheme based on blockchain and attribute-based encryption
    Yang X.
    Liao Z.
    Liu L.
    Wang C.
    Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control, 2023, 51 (13): : 169 - 176
  • [23] Survey on attribute-based encryption in cloud computing
    Ancy, P.R.
    Krishna, Addapalli V.N.
    Balachandran, K.
    Balamurugan, M.
    Prakasi, O.S. Gnana
    Ancy, P.R. (ancy.prasadam@res.christuniversity.in), 1600, Femto Technique Co., Ltd. (22): : 863 - 868
  • [24] Attribute-based Encryption in Cloud Computing Environment
    Yan, Yuping
    Kamel, Mohammed B. M.
    Ligeti, Peter
    2020 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE, 2020, : 63 - 68
  • [25] Attribute-Based Encryption Optimized for Cloud Computing
    Horvath, Mate
    SOFSEM 2015: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2015, 8939 : 566 - 577
  • [26] Attribute-Based Encryption Optimized for Cloud Computing
    Horvath, Mate
    INFOCOMMUNICATIONS JOURNAL, 2015, 7 (02): : 1 - 9
  • [27] Attribute-Based Encryption Scheme With High Efficient Revocation in Cloud Computing Environment
    Chen H.-S.
    Shen Q.-L.
    2018, Beijing University of Posts and Telecommunications (41): : 113 - 118
  • [28] TRACEABLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR CLOUD COMPUTING
    Yang, Xiaodong
    Yang, Ping
    An, Faying
    Zhou, Qixu
    Yang, Miaomiao
    2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 263 - 267
  • [29] Software Implementation of an Attribute-Based Encryption Scheme
    Zavattoni, Eric
    Dominguez Perez, Luis J.
    Mitsunari, Shigeo
    Sanchez-Ramirez, Ana H.
    Teruya, Tadanori
    Rodriguez-Henriquez, Francisco
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (05) : 1429 - 1441
  • [30] A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing
    Fu, Junsong
    Wang, Na
    IEEE ACCESS, 2019, 7 : 36218 - 36232