Towards leakage-resilient fine-grained access control in fog computing

被引:33
|
作者
Yu, Zuoxia [1 ]
Au, Man Ho [1 ]
Xu, Qiuliang [2 ]
Yang, Rupeng [2 ]
Han, Jinguang [3 ,4 ]
机构
[1] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
[2] Shandong Univ, Sch Comp Sci & Technol, Jinan 250101, Shandong, Peoples R China
[3] Nanjing Univ Finance & Econ, Jiangsu Prov Key Lab E Business, Nanjing 210003, Jiangsu, Peoples R China
[4] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
基金
英国工程与自然科学研究理事会; 中国国家自然科学基金;
关键词
Fog computing; Functional encryption; Leakage Resilient Cryptography; Dual system methodology; Pair encoding; IDENTITY-BASED ENCRYPTION; DUAL SYSTEM ENCRYPTION; FUNCTIONAL ENCRYPTION; FORENSIC DATA; SECURITY; FRAMEWORK; INTERNET; CHALLENGES; PRIVACY; THINGS;
D O I
10.1016/j.future.2017.01.025
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fog Computing, a technology that takes advantage of both the paradigms of Cloud Computing and the Internet of Things, has a great advantage in reducing the communication cost. Since its introduction, fog computing has found a lot of applications, including, for instance, connected vehicles, wireless sensors, smart cities and etc. One prominent problem in fog computing is how fine-grained access control can be imposed. Functional encryption, a new cryptographic primitive, is known to support fine-grained access control. However, when it comes to some new threats in the fog computing scenario, such as side channel attacks, functional encryption cannot maintain its security. Therefore, we need new cryptographic primitives that not only provide a way to securely share data with a fine-grained access control but also are able to resist those new threats. In this paper, we consider how to construct functional encryption schemes (FEs) adaptively secure in continual memory leakage model (CML), which is one of the strongest models that allows continuous leakage on both user and master secret keys. Besides providing privacy and fine-grained access control in fog computing, our scheme can also guarantee security against side channel attacks. More concretely, we propose a generic framework for constructing fully secure leakage-resilient FEs (LR-FEs) in the CML model results from leakage-resilient pair encoding, which is an extension of pair encoding presented in the recent work of Attrapadung. In this way, our framework simplifies the design and analysis of LR-FEs into the design and analysis of predicate encodings. Moreover, we discover new adaptively secure LRFEs, including FE for regular languages, attribute-based encryption (ABE) for large universe and ABE with short ciphertext. Above all, leakage-resilient adaptively secure functional encryption schemes can equip fog computing with higher security and fine-grained access control. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:763 / 777
页数:15
相关论文
共 50 条
  • [1] Fine-grained attribute update and outsourcing computing access control scheme in fog computing
    Du, Ruizhong
    Yan, Peiwen
    Liu, Yan
    [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (03): : 160 - 170
  • [2] Fine-grained access control for cloud computing
    Ye, Xinfeng
    Khoussainov, Bakh
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 160 - 168
  • [3] Towards a fine-grained access control for Cloud
    Msahli, Mounira
    Chen, Xiuzhen
    Serhrouchni, Ahmed
    [J]. 2014 IEEE 11TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2014, : 286 - 291
  • [4] Novel lightweight and fine-grained fast access control using RNS properties in fog computing
    Alizadeh, Mohammad Ali
    Jafarali Jassbi, Somayyeh
    Khademzadeh, Ahmad
    Haghparast, Majid
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (03): : 3799 - 3817
  • [5] A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment
    Xiao, Min
    Zhou, Jing
    Liu, Xuejiao
    Jiang, Mingda
    [J]. SENSORS, 2017, 17 (06)
  • [6] A searchable personal health records framework with fine-grained access control in cloud-fog computing
    Sun, Jin
    Wang, Xiaojing
    Wang, Shangping
    Ren, Lili
    [J]. PLOS ONE, 2018, 13 (11):
  • [7] Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing
    Xu, Shengmin
    Ning, Jianting
    Li, Yingjiu
    Zhang, Yinghui
    Xu, Guowen
    Huang, Xinyi
    Deng, Robert H.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1064 - 1077
  • [8] A fine-grained data access control algorithm in cloud computing
    Han, Dezhi
    Wu, Shuai
    Bi, Kun
    [J]. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2012, 40 (SUPPL.1): : 245 - 248
  • [9] Towards Fine-Grained Access Control in Java']JavaScript Contexts
    Patil, Kailas
    Dong, Xinshu
    Li, Xiaolei
    Liang, Zhenkai
    Jiang, Xuxian
    [J]. 31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, : 720 - 729
  • [10] Towards supporting fine-grained access control for Grid resources
    Bertino, E
    Mazzoleni, P
    Crispo, B
    Sivasubramanian, S
    Ferrari, E
    [J]. 10TH IEEE INTERNATIONAL WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2004, : 59 - 65