Secure and Differentiated Fog-Assisted Data Access for Internet of Things

被引:2
|
作者
Yu, Ping [1 ,2 ]
Ni, Wei [3 ]
Zhang, Hua [1 ]
Ping Liu, Ren [2 ]
Wen, Qiaoyan [1 ]
Li, Wenmin [1 ]
Gao, Fei [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Switching & Networking Technol, Beijing 100876, Peoples R China
[2] Univ Technol Sydney, Global Big Data Technol Ctr, Sydney, NSW 2007, Australia
[3] CSIRO, Data61, Sydney, NSW 2122, Australia
来源
COMPUTER JOURNAL | 2022年 / 65卷 / 08期
基金
中国国家自然科学基金;
关键词
Internet of things (IoT); access control; attribute-based encryption (ABE); q-parallel bilinear Diffie-Hellman exponent (q-PBDHE); IDENTITY-BASED ENCRYPTION; PRIVACY; SCHEME; IOT;
D O I
10.1093/comjnl/bxab031
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The ability of Fog computing to admit and process huge volumes of heterogeneous data is the catalyst for the fast expansion of Internet of things (IoT). The critical challenge is secure and differentiated access to the data, given limited computation capability and trustworthiness in typical IoT devices and Fog servers, respectively. This paper designs and develops a new approach for secure, efficient and differentiated data access. Secret sharing is decoupled to allow the Fog servers to assist the IoT devices with attribute-based encryption of data while preventing the Fog servers from tampering with the data and the access structure. The proposed encryption supports direct revocation and can be decoupled among multiple Fog servers for acceleration. Based on the decisional q-parallel bilinear Diffie-Hellman exponent assumption, we propose a new extended q-parallel bilinear Diffie-Hellman exponent (Eq-PBDHE) assumption and prove that the proposed approach provides 'indistinguishably chosen-plaintext attacks secure' data access for legitimate data subscribers. As numerically and experimentally verified, the proposed approach is able to reduce the encryption time by 20% at the IoT devices and by 50% at the Fog network using parallel computing as compared to the state of the art.
引用
收藏
页码:1948 / 1963
页数:16
相关论文
共 50 条
  • [1] A Secure Integrated Framework for Fog-Assisted Internet-of-Things Systems
    Junejo, Aisha Kanwal
    Komninos, Nikos
    McCann, Julie A.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (08) : 6840 - 6852
  • [2] A secure anonymous tracing fog-assisted method for the Internet of Robotic Things
    Alamer, Abdulrahman
    [J]. LIBRARY HI TECH, 2022, 40 (04) : 1081 - 1103
  • [3] Fog-Assisted Internet of Medical Things for Smart Healthcare
    Wang, Xiaonan
    Wu, Yanan
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2023, 69 (03) : 391 - 399
  • [4] Role of fog-assisted Industrial Internet of Things: A systematic review
    Sree, Thankaraja Raja
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (12)
  • [5] Revocable and Privacy-Preserving Decentralized Data Sharing Framework for Fog-Assisted Internet of Things
    Zhang, Jiawei
    Ma, Jianfeng
    Yang, Yanbo
    Liu, Ximeng
    Xiong, Neal N.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (13) : 10446 - 10463
  • [6] SDAFA: Secure Data Aggregation in Fog-Assisted Smart Grid Environment
    Shruti
    Rani, Shalli
    Singh, Aman
    Alkanhel, Reem
    Hassan, Dina S. M.
    [J]. SUSTAINABILITY, 2023, 15 (06)
  • [7] Secure and efficient data delivery for fog-assisted wireless body area networks
    Thaier Hayajneh
    Kristen Griggs
    Muhammad Imran
    Bassam J. Mohd
    [J]. Peer-to-Peer Networking and Applications, 2019, 12 : 1289 - 1307
  • [8] Secure Fog-Assisted Crowdsensing With Collusion Resistance: From Data Reporting to Data Requesting
    Zhu, Liehuang
    Li, Meng
    Zhang, Zijian
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03): : 5473 - 5484
  • [9] Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things
    Huang, Qinlong
    Yang, Yixian
    Wang, Licheng
    [J]. IEEE ACCESS, 2017, 5 : 12941 - 12950
  • [10] Secure and efficient data delivery for fog-assisted wireless body area networks
    Hayajneh, Thaier
    Griggs, Kristen
    Imran, Muhammad
    Mohd, Bassam J.
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (05) : 1289 - 1307