Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing

被引:15
|
作者
Li, Dawei [1 ]
Liu, Jianwei [2 ]
Wu, Qianhong [2 ]
Guan, Zhenyu [2 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, Beijing 100191, Peoples R China
[2] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
基金
中国国家自然科学基金;
关键词
Fog computing; attribute-based encryption; distributed access control; multi-authority; large-universe; ATTRIBUTE-BASED ENCRYPTION; MULTI-AUTHORITY;
D O I
10.1109/ACCESS.2019.2890976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing enables computation, storage, applications, and network services between the Internet of Things and the cloud servers by extending the Cloud Computing paradigm to the edge of the network. When protecting information security in Fog computing, advanced security with low latency, wide-spread geographical distribution support, and high flexibility should be taken in to considertion first, because of its huge number of nodes. In this paper, we propose a new cryptographic primitive, named CCA2 secure publicly-verifiable revocable large-universe multi-authority attribute-based encryption (CCA2-PV-R-LU-MA-ABE), to achieve flexible fine-grained access control in Fog computing. In this primitive, end nodes in fogs generate private keys from multiple authorities that might be differentiated by their geographical locations or functions, and their attributes can be denoted by any strings in the large universe, which meets diverse needs in practical Fog applications. In addition, the accessibility of nodes can be revoked efficiently even by resource-limited devices. To ensure the validity of ciphertext, this primitive supports public verification and only valid ciphertext can be stored or transmitted. Based on the primitive and the feature of Fog computing, we construct a concrete CCA2-PV-R-LU-MA-ABE scheme. We define the security model of this primitive, which is much more secure than the CPA-secure scheme. Finally, we compare the efficiency of the proposed concrete scheme with that of the existing CPA-secure scheme by both theoretical and experimental analysis, and the results show that the extra consumption of efficiency to improving CPA to CCA2 is considerably low. The proposed scheme is highly secure, flexible, and efficient enough to be deployed in practical Fog computing.
引用
收藏
页码:11688 / 11697
页数:10
相关论文
共 50 条
  • [1] Publicly Verifiable and Efficient Fine-Grained Data Deletion Scheme in Cloud Computing
    Yang, Changsong
    Liu, Yueling
    Tao, Xiaoling
    Zhao, Feng
    IEEE ACCESS, 2020, 8 : 99393 - 99403
  • [2] Secure and efficient fine-grained data access control scheme in cloud computing
    Yang, Changsong
    Ye, Jun
    JOURNAL OF HIGH SPEED NETWORKS, 2015, 21 (04) : 259 - 271
  • [3] Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing
    He, Kai
    Weng, Jian
    Liu, Joseph K.
    Zhou, Wanlei
    Liu, Jia-Nan
    NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 65 - 79
  • [4] Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations
    Sun, Shi-Feng
    Lyu, Chen
    Gu, Dawu
    Zhang, Yuanyuan
    Ren, Yanli
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [5] Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing
    Xu, Shengmin
    Ning, Jianting
    Li, Yingjiu
    Zhang, Yinghui
    Xu, Guowen
    Huang, Xinyi
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1064 - 1077
  • [6] Fine-grained attribute update and outsourcing computing access control scheme in fog computing
    Du R.
    Yan P.
    Liu Y.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (03): : 160 - 170
  • [7] Towards leakage-resilient fine-grained access control in fog computing
    Yu, Zuoxia
    Au, Man Ho
    Xu, Qiuliang
    Yang, Rupeng
    Han, Jinguang
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 763 - 777
  • [8] Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
    Yu, Shucheng
    Wang, Cong
    Ren, Kui
    Lou, Wenjing
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [9] Fine-grained access control for cloud computing
    Ye, Xinfeng
    Khoussainov, Bakh
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 160 - 168
  • [10] A flexible fine-grained dynamic access control approach for cloud computing environment
    Saima Mehraj
    M. Tariq Banday
    Cluster Computing, 2021, 24 : 1413 - 1434