A Flexible Access Control with User Revocation in Fog-Enabled Cloud Computing

被引:0
|
作者
Nagarani, C. [1 ,2 ]
Kousalya, R. [3 ]
机构
[1] Dr NGP Arts & Sci Coll, Dept Comp Sci, Coimbatore, Tamil Nadu, India
[2] PSG Coll Arts & Sci, Coimbatore, Tamil Nadu, India
[3] Dr NGP Arts & Sci Coll, Dept Comp Applicat, Coimbatore, Tamil Nadu, India
关键词
fog-enabled cloud computing; flexible access control; elliptic curve cryptography; user revocation; key management;
D O I
10.1109/ICICT50816.2021.9358479
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The major challenging task in the fog-enabled cloud computing paradigm is to ensure the security for accessing the data through cloud and fog nodes. To solve this challenge, a Flexible Access Control using Elliptic Curve Cryptography (FAC-ECC) protocol has been developed in which the user data are encrypted by multiple asymmetric keys. Such keys are handled by both users and fog nodes. Also, data access is controlled by encrypting the data through the user. However, the main problem is to guarantee the privacy and security of resources after processing of User Revocation (UR) by data owners. The issue of UR is needed to consider for satisfying the dynamic change of user access in different applications like healthcare systems, e-commerce, etc. Therefore in this article, a FAC-UR-ECC protocol is proposed to control the data access and realize the UR in fog-enabled cloud systems. In this protocol, a revocable key aggregate-based cryptosystem is applied in the fog-cloud paradigm. It is an extension of the key-aggregate cryptosystem such that a user is revoked if his/her credential is expired. First, the subset-cover model is combined into FAC-ECC protocol to design an efficient revocable key-aggregate encryption depending on multi-linear maps which realizes the user's access control and revocation. It can simplify the user's key management efficiently and delegate various clients with decryption permission. Also, it can accomplish revocation of user access privileges and the FAC efficiently. By using this protocol, both the user's secret key and the ciphertext are preserved in a fixed size. The security of accessing the data is highly enhanced by updating the ciphertext through the data owners successfully. At last, the experimental results exhibit the efficiency of FAC-UR-ECC compared to the FAC-ECC protocol.
引用
收藏
页码:909 / 914
页数:6
相关论文
共 50 条
  • [31] Lightweight blockchain-based remote user authentication for fog-enabled IoT deployment
    Harbi, Yasmine
    Aliouat, Zibouda
    Harous, Saad
    Gueroui, Abdelhak Mourad
    COMPUTER COMMUNICATIONS, 2024, 221 : 90 - 105
  • [32] Data Access Control in Cloud Computing: Flexible and Receiver Extendable
    Lai, Jianchang
    Guo, Fuchun
    Susilo, Willy
    Huang, Xinyi
    Jiang, Peng
    Zhang, Futai
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (05) : 2658 - 2670
  • [33] FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing
    Zhang, Yu
    Chen, Jing
    Du, Ruiying
    Deng, Lan
    Xiang, Yang
    Zhou, Qing
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 310 - 319
  • [34] Attribute-based data access control scheme with secure revocation in fog computing for smart grid
    Wu, Zhiwei
    Shi, Run-hua
    Li, Kunchang
    Yang, Yifan
    Cluster Computing, 2022, 25 (06) : 3899 - 3913
  • [35] Attribute-based data access control scheme with secure revocation in fog computing for smart grid
    Zhiwei Wu
    Run-hua Shi
    Kunchang Li
    Yifan Yang
    Cluster Computing, 2022, 25 : 3899 - 3913
  • [36] Attribute-based data access control scheme with secure revocation in fog computing for smart grid
    Wu, Zhiwei
    Shi, Run-hua
    Li, Kunchang
    Yang, Yifan
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (06): : 3899 - 3913
  • [37] Multimedia access control with secure provenance in fog-cloud computing networks
    Yang Yang
    Ximeng Liu
    Wenzhong Guo
    Xianghan Zheng
    Chen Dong
    Zhiquan Liu
    Multimedia Tools and Applications, 2020, 79 : 10701 - 10716
  • [38] Multimedia access control with secure provenance in fog-cloud computing networks
    Yang, Yang
    Liu, Ximeng
    Guo, Wenzhong
    Zheng, Xianghan
    Dong, Chen
    Liu, Zhiquan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (15-16) : 10701 - 10716
  • [39] A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
    Fan, Kai
    Wang, Junxiong
    Wang, Xin
    Li, Hui
    Yang, Yintang
    SENSORS, 2017, 17 (07)
  • [40] Resource Allocation Scheme for Fog-Enabled Wireless Access Networks under the QoS of Users
    Jiang, Huilin
    Chen, Lili
    Song, Xiang
    Liu, Xueming
    MOBILE INFORMATION SYSTEMS, 2021, 2021