A Flexible Access Control with User Revocation in Fog-Enabled Cloud Computing

被引:0
|
作者
Nagarani, C. [1 ,2 ]
Kousalya, R. [3 ]
机构
[1] Dr NGP Arts & Sci Coll, Dept Comp Sci, Coimbatore, Tamil Nadu, India
[2] PSG Coll Arts & Sci, Coimbatore, Tamil Nadu, India
[3] Dr NGP Arts & Sci Coll, Dept Comp Applicat, Coimbatore, Tamil Nadu, India
关键词
fog-enabled cloud computing; flexible access control; elliptic curve cryptography; user revocation; key management;
D O I
10.1109/ICICT50816.2021.9358479
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The major challenging task in the fog-enabled cloud computing paradigm is to ensure the security for accessing the data through cloud and fog nodes. To solve this challenge, a Flexible Access Control using Elliptic Curve Cryptography (FAC-ECC) protocol has been developed in which the user data are encrypted by multiple asymmetric keys. Such keys are handled by both users and fog nodes. Also, data access is controlled by encrypting the data through the user. However, the main problem is to guarantee the privacy and security of resources after processing of User Revocation (UR) by data owners. The issue of UR is needed to consider for satisfying the dynamic change of user access in different applications like healthcare systems, e-commerce, etc. Therefore in this article, a FAC-UR-ECC protocol is proposed to control the data access and realize the UR in fog-enabled cloud systems. In this protocol, a revocable key aggregate-based cryptosystem is applied in the fog-cloud paradigm. It is an extension of the key-aggregate cryptosystem such that a user is revoked if his/her credential is expired. First, the subset-cover model is combined into FAC-ECC protocol to design an efficient revocable key-aggregate encryption depending on multi-linear maps which realizes the user's access control and revocation. It can simplify the user's key management efficiently and delegate various clients with decryption permission. Also, it can accomplish revocation of user access privileges and the FAC efficiently. By using this protocol, both the user's secret key and the ciphertext are preserved in a fixed size. The security of accessing the data is highly enhanced by updating the ciphertext through the data owners successfully. At last, the experimental results exhibit the efficiency of FAC-UR-ECC compared to the FAC-ECC protocol.
引用
收藏
页码:909 / 914
页数:6
相关论文
共 50 条
  • [1] A secure and efficient access control scheme with attribute revocation and merging capabilities for fog-enabled IoT?
    Sarma, Richa
    Barbhuiya, Ferdous Ahmed
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [2] An Efficient Access Control Scheme With Outsourcing and Attribute Revocation for Fog-Enabled E-Health
    Zhao, Jing
    Zeng, Peng
    Choo, Kim-Kwang Raymond
    IEEE ACCESS, 2021, 9 : 13789 - 13799
  • [3] A Cryptographically Enforced Access Control with a Flexible User Revocation on Untrusted Cloud Storage
    Kim, Jongkil
    Nepal, Surya
    DATA SCIENCE AND ENGINEERING, 2016, 1 (03) : 149 - 160
  • [4] Secure Computing for Fog-Enabled Industrial IoT
    Alvi, Ahmad Naseem
    Ali, Bakhtiar
    Saleh, Mohamed Saad
    Alkhathami, Mohammed
    Alsadie, Deafallah
    Alghamdi, Bushra
    SENSORS, 2024, 24 (07)
  • [5] Efficient Attribute-Based Encryption Outsourcing Scheme With User and Attribute Revocation for Fog-Enabled IoT
    Li, Ling
    Wang, Zheng
    Li, Na
    IEEE ACCESS, 2020, 8 : 176738 - 176749
  • [6] An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing
    Ahuja, Rohit
    Mohanty, Sraban Kumar
    Sakurai, Kouichi
    2016 11TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2016, : 39 - 47
  • [7] Temporal Access Control with User Revocation for Cloud Data
    Balani, Nihal
    Ruj, Sushmita
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 336 - 342
  • [8] Efficient and privacy preserving access control scheme for fog-enabled IoT
    Fan, Kai
    Xu, Huiyue
    Gao, Longxiang
    Li, Hui
    Yang, Yintang
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 99 : 134 - 142
  • [9] Access Control Scheme Supporting Userand Attribute Revocation in Fog Computing
    Wang Z.
    Li L.
    Li N.
    Li, Ling (liling_li_ling@163.com), 1600, Beijing University of Posts and Telecommunications (43): : 88 - 95
  • [10] SPMAC: Secure and privacy-preserving multi-authority access control for fog-enabled IoT cloud storage
    Ma, Ruonan
    Zhang, Leyou
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 142