A Flexible Access Control with User Revocation in Fog-Enabled Cloud Computing

被引:0
|
作者
Nagarani, C. [1 ,2 ]
Kousalya, R. [3 ]
机构
[1] Dr NGP Arts & Sci Coll, Dept Comp Sci, Coimbatore, Tamil Nadu, India
[2] PSG Coll Arts & Sci, Coimbatore, Tamil Nadu, India
[3] Dr NGP Arts & Sci Coll, Dept Comp Applicat, Coimbatore, Tamil Nadu, India
关键词
fog-enabled cloud computing; flexible access control; elliptic curve cryptography; user revocation; key management;
D O I
10.1109/ICICT50816.2021.9358479
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The major challenging task in the fog-enabled cloud computing paradigm is to ensure the security for accessing the data through cloud and fog nodes. To solve this challenge, a Flexible Access Control using Elliptic Curve Cryptography (FAC-ECC) protocol has been developed in which the user data are encrypted by multiple asymmetric keys. Such keys are handled by both users and fog nodes. Also, data access is controlled by encrypting the data through the user. However, the main problem is to guarantee the privacy and security of resources after processing of User Revocation (UR) by data owners. The issue of UR is needed to consider for satisfying the dynamic change of user access in different applications like healthcare systems, e-commerce, etc. Therefore in this article, a FAC-UR-ECC protocol is proposed to control the data access and realize the UR in fog-enabled cloud systems. In this protocol, a revocable key aggregate-based cryptosystem is applied in the fog-cloud paradigm. It is an extension of the key-aggregate cryptosystem such that a user is revoked if his/her credential is expired. First, the subset-cover model is combined into FAC-ECC protocol to design an efficient revocable key-aggregate encryption depending on multi-linear maps which realizes the user's access control and revocation. It can simplify the user's key management efficiently and delegate various clients with decryption permission. Also, it can accomplish revocation of user access privileges and the FAC efficiently. By using this protocol, both the user's secret key and the ciphertext are preserved in a fixed size. The security of accessing the data is highly enhanced by updating the ciphertext through the data owners successfully. At last, the experimental results exhibit the efficiency of FAC-UR-ECC compared to the FAC-ECC protocol.
引用
收藏
页码:909 / 914
页数:6
相关论文
共 50 条
  • [41] Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data
    Dong, Qiuxiang
    Huang, Dijiang
    Luo, Jim
    Kang, Myong
    2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [42] A Survey on Access Control in Fog Computing
    Zhang, Peng
    Liu, Joseph K.
    Yu, F. Richard
    Sookhak, Mehdi
    Au, Man Ho
    Luo, Xiapu
    IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (02) : 144 - 149
  • [43] Research on access control model based on user action in cloud computing
    Wang, Huan-Bin
    Tao, Ma
    Hui, Xiao-Bin
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2016, 97 : 157 - 160
  • [44] Online User Association and Computation Offloading for Fog-enabled D2D Network
    Zhao, Shuang
    Yang, Yang
    Yang, Xiumei
    Zhang, Wuxiong
    Luo, Xiliang
    Qian, Hua
    2017 IEEE FOG WORLD CONGRESS (FWC), 2017, : 97 - 102
  • [45] Public Possession Checking for Shared Data with User Revocation in Cloud Computing
    Wei, Jinxia
    Liu, Jianyi
    Zhang, Ru
    Niu, Xinxin
    Yao, Yuangang
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (06): : 1141 - 1149
  • [46] Efficient access control with traceability and user revocation in IoT
    Wu, Yi
    Zhang, Wei
    Xiong, Hu
    Qin, Zhiguang
    Yeh, Kuo-Hui
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (20) : 31487 - 31508
  • [47] Efficient access control with traceability and user revocation in IoT
    Yi Wu
    Wei Zhang
    Hu Xiong
    Zhiguang Qin
    Kuo-Hui Yeh
    Multimedia Tools and Applications, 2021, 80 : 31487 - 31508
  • [48] A Multi-Agent-Based Data Collection and Aggregation Model for Fog-Enabled Cloud Monitoring
    Bulla, Chetan M.
    Birje, Mahantesh N.
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2021, 11 (01) : 73 - 92
  • [49] Flexible Data Access Control Based on Trust and Reputation in Cloud Computing
    Yan, Zheng
    Li, Xueyun
    Wang, Mingjun
    Vasilakos, Athanasios V.
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (03) : 485 - 498
  • [50] Compressive Massive Access for Internet of Things: Cloud Computing or Fog Computing?
    Ke, Malong
    Gao, Zhen
    Wu, Yongpeng
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,