TMO: Time Domain Outsourcing Attribute-Based Encryption Scheme for Data Acquisition in Edge Computing

被引:13
|
作者
Li, Youhuizi [1 ,2 ,3 ]
Dong, Zeyong [1 ,2 ]
Sha, Kewei [4 ]
Jiang, Congfeng [1 ,2 ]
Wan, Jian [2 ,5 ]
Wang, Yuan [6 ,7 ]
机构
[1] Hangzhou Dianzi Univ, Sch Comp Sci & Technol, Hangzhou 310018, Zhejiang, Peoples R China
[2] Minist Educ, Key Lab Complex Syst Modeling & Simulat, Hangzhou 310018, Zhejiang, Peoples R China
[3] Xian Key Lab Mobile Edge Comp & Secur, Xian 710071, Shaanxi, Peoples R China
[4] Univ Houston Clear Lake, Coll Sci & Engn, Houston, TX 77058 USA
[5] Zhejiang Univ Sci & Technol, Sch Informat & Elect Engn, Hangzhou 310023, Zhejiang, Peoples R China
[6] Engn Res Ctr Augmented Real & Intelligent Interac, Hangzhou 310052, Zhejiang, Peoples R China
[7] NetEase Hangzhou Network Co Ltd, Hangzhou 310052, Zhejiang, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
关键词
Multi-authority; CP-ABE; time-based; security; edge computing; ACCESS-CONTROL; INTERNET; CHALLENGES;
D O I
10.1109/ACCESS.2019.2907319
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of the Internet of Things and the ever-increasing demands of advanced services and applications, edge computing is proposed to move the computing and storage resources near the data source, which improves the response time and saves the bandwidth. However, due to the limited available resources and massive privacy-sensitive user data in edge nodes, there are huge challenges in data security and privacy protection in the edge computing environment. Hence, we propose an efficient time-domain multi-authority outsourcing attribute-based encryption (ABE) scheme (TMO) with a dynamic policy updating method for secure data acquisition and sharing in the edge computing. Specifically, considering that the time is a crucial factor in many real-world application scenarios, we add time-domain information in the encryption algorithm. Besides, to take full advantage of edge computing, TMO extends the multi-authority ABE approach by outsourcing the computation to edge nodes to enhance security and performance. Moreover, to tackle the mobility and frequently changing edge environment,TMO also provides an efficient online policy updating method to manage attribute information and to access policy with low overhead. The security analysis and the experimental results show that TMO can indeed efficiently enhance data security with low overhead in the edge computing environment.
引用
收藏
页码:40240 / 40257
页数:18
相关论文
共 50 条
  • [31] Improvement of an outsourced attribute-based encryption scheme
    Chen, Hongjie
    Liao, Yongjian
    SOFT COMPUTING, 2019, 23 (22) : 11409 - 11417
  • [32] Efficient revocable attribute-based encryption scheme
    Li X.
    Zhang D.
    Li H.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (06): : 32 - 39
  • [33] Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
    Wang, Shulan
    Liang, Kaitai
    Liu, Joseph K.
    Chen, Jianyong
    Yu, Jianping
    Xie, Weixin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) : 1661 - 1673
  • [34] Improvement of an outsourced attribute-based encryption scheme
    Hongjie Chen
    Yongjian Liao
    Soft Computing, 2019, 23 : 11409 - 11417
  • [35] Attribute-Based Data Transfer with Filtering Scheme in Cloud Computing
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    COMPUTER JOURNAL, 2014, 57 (04): : 579 - 591
  • [36] Decentralized Attribute-Based Encryption and Data Sharing Scheme in Cloud Storage
    Li, Xiehua
    Wang, Yanlong
    Xu, Ming
    Cui, Yaping
    CHINA COMMUNICATIONS, 2018, 15 (02) : 138 - 152
  • [37] Decentralized Attribute-Based Encryption and Data Sharing Scheme in Cloud Storage
    Xiehua Li
    Yanlong Wang
    Ming Xu
    Yaping Cui
    中国通信, 2018, 15 (02) : 138 - 152
  • [38] Attribute-based data transfer with filtering scheme in cloud computing
    Han, J. (jh843@uowmail.edu.au), 1600, Oxford University Press (57):
  • [39] Securely outsourcing the ciphertext-policy attribute-based encryption
    Kim Thuat Nguyen
    Oualha, Nouha
    Laurent, Maryline
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (01): : 169 - 183
  • [40] Privilege separation of data sharing scheme using attribute-based encryption
    Zhu, Hui
    Lei, Wan
    Huang, Rong
    Li, Hui
    Liu, Xi-Meng
    Tongxin Xuebao/Journal on Communications, 2014, 35 : 53 - 62