A Flexible Access Control with User Revocation in Fog-Enabled Cloud Computing

被引:0
|
作者
Nagarani, C. [1 ,2 ]
Kousalya, R. [3 ]
机构
[1] Dr NGP Arts & Sci Coll, Dept Comp Sci, Coimbatore, Tamil Nadu, India
[2] PSG Coll Arts & Sci, Coimbatore, Tamil Nadu, India
[3] Dr NGP Arts & Sci Coll, Dept Comp Applicat, Coimbatore, Tamil Nadu, India
关键词
fog-enabled cloud computing; flexible access control; elliptic curve cryptography; user revocation; key management;
D O I
10.1109/ICICT50816.2021.9358479
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The major challenging task in the fog-enabled cloud computing paradigm is to ensure the security for accessing the data through cloud and fog nodes. To solve this challenge, a Flexible Access Control using Elliptic Curve Cryptography (FAC-ECC) protocol has been developed in which the user data are encrypted by multiple asymmetric keys. Such keys are handled by both users and fog nodes. Also, data access is controlled by encrypting the data through the user. However, the main problem is to guarantee the privacy and security of resources after processing of User Revocation (UR) by data owners. The issue of UR is needed to consider for satisfying the dynamic change of user access in different applications like healthcare systems, e-commerce, etc. Therefore in this article, a FAC-UR-ECC protocol is proposed to control the data access and realize the UR in fog-enabled cloud systems. In this protocol, a revocable key aggregate-based cryptosystem is applied in the fog-cloud paradigm. It is an extension of the key-aggregate cryptosystem such that a user is revoked if his/her credential is expired. First, the subset-cover model is combined into FAC-ECC protocol to design an efficient revocable key-aggregate encryption depending on multi-linear maps which realizes the user's access control and revocation. It can simplify the user's key management efficiently and delegate various clients with decryption permission. Also, it can accomplish revocation of user access privileges and the FAC efficiently. By using this protocol, both the user's secret key and the ciphertext are preserved in a fixed size. The security of accessing the data is highly enhanced by updating the ciphertext through the data owners successfully. At last, the experimental results exhibit the efficiency of FAC-UR-ECC compared to the FAC-ECC protocol.
引用
收藏
页码:909 / 914
页数:6
相关论文
共 50 条
  • [21] Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing
    Xia, Zhihua
    Zhang, Liangao
    Liu, Dandan
    CHINA COMMUNICATIONS, 2016, 13 (07) : 92 - 99
  • [22] Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing
    Zhihua Xia
    Liangao Zhang
    Dandan Liu
    中国通信, 2016, 13 (07) : 92 - 99
  • [23] Towards Cooperative Semantic Computing: A Distributed Reasoning Approach for Fog-Enabled SWoT
    Seydoux, Nicolas
    Drira, Khalil
    Hernandez, Nathalie
    Monteil, Thierry
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS, OTM 2018, PT I, 2018, 11229 : 407 - 425
  • [24] Efficient Decentralized Attribute-based Access Control for Cloud Storage with User Revocation
    Chen, Jianwei
    Ma, Huadong
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 3782 - 3787
  • [25] Architectural Imperatives for Fog Computing: Use Cases, Requirements, and Architectural Techniques for Fog-Enabled IoT Networks
    Byers, Charles C.
    IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (08) : 14 - 20
  • [26] Efficient Outsourced Data Access Control with User Revocation for Cloud-based IoT
    Hao, Jialu
    Huang, Cheng
    Liu, Jian
    Xian, Ming
    Shen, Xuemin
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [27] Efficient and scalable outsourced data access control with user revocation in cloud: A comprehensive study
    Debnath, S.
    Bhuyan, B.
    MULTIAGENT AND GRID SYSTEMS, 2018, 14 (04) : 383 - 401
  • [28] A survey of attribute-based access control with user revocation in cloud data storage
    Hwang, Min-Shiang (mshwang@asia.edu.tw), 1600, Femto Technique Co., Ltd. (18):
  • [29] Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud
    Kaushik, Shweta
    Gandhi, Charu
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2021, 15 (02) : 29 - 52
  • [30] Flexible Key Revocation and Access Control for a Privacy-protecting Cloud CBIR System
    Liu, Hao
    Goto, Hideaki
    2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2, 2017, : 738 - 743