Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing

被引:15
|
作者
Li, Dawei [1 ]
Liu, Jianwei [2 ]
Wu, Qianhong [2 ]
Guan, Zhenyu [2 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, Beijing 100191, Peoples R China
[2] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
基金
中国国家自然科学基金;
关键词
Fog computing; attribute-based encryption; distributed access control; multi-authority; large-universe; ATTRIBUTE-BASED ENCRYPTION; MULTI-AUTHORITY;
D O I
10.1109/ACCESS.2019.2890976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing enables computation, storage, applications, and network services between the Internet of Things and the cloud servers by extending the Cloud Computing paradigm to the edge of the network. When protecting information security in Fog computing, advanced security with low latency, wide-spread geographical distribution support, and high flexibility should be taken in to considertion first, because of its huge number of nodes. In this paper, we propose a new cryptographic primitive, named CCA2 secure publicly-verifiable revocable large-universe multi-authority attribute-based encryption (CCA2-PV-R-LU-MA-ABE), to achieve flexible fine-grained access control in Fog computing. In this primitive, end nodes in fogs generate private keys from multiple authorities that might be differentiated by their geographical locations or functions, and their attributes can be denoted by any strings in the large universe, which meets diverse needs in practical Fog applications. In addition, the accessibility of nodes can be revoked efficiently even by resource-limited devices. To ensure the validity of ciphertext, this primitive supports public verification and only valid ciphertext can be stored or transmitted. Based on the primitive and the feature of Fog computing, we construct a concrete CCA2-PV-R-LU-MA-ABE scheme. We define the security model of this primitive, which is much more secure than the CPA-secure scheme. Finally, we compare the efficiency of the proposed concrete scheme with that of the existing CPA-secure scheme by both theoretical and experimental analysis, and the results show that the extra consumption of efficiency to improving CPA to CCA2 is considerably low. The proposed scheme is highly secure, flexible, and efficient enough to be deployed in practical Fog computing.
引用
收藏
页码:11688 / 11697
页数:10
相关论文
共 50 条
  • [21] Secure and fine-grained access control on e-healthcare records in mobile cloud computing
    Liu, Yi
    Zhang, Yinghui
    Ling, Jie
    Liu, Zhusong
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 1020 - 1026
  • [22] A searchable personal health records framework with fine-grained access control in cloud-fog computing
    Sun, Jin
    Wang, Xiaojing
    Wang, Shangping
    Ren, Lili
    PLOS ONE, 2018, 13 (11):
  • [23] Lightweight, verifiable and revocable EHRs sharing with fine-grained bilateral access control
    Zhang, Kai
    Chen, Tao
    Chen, Siyuan
    Wei, Lifei
    Ning, Jianting
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (07): : 9957 - 9973
  • [24] A fine-grained data access control algorithm in cloud computing
    Han, Dezhi
    Wu, Shuai
    Bi, Kun
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2012, 40 (SUPPL.1): : 245 - 248
  • [25] Method of secure, scalable, and fine-grained data access control with efficient revocation in untrusted cloud
    Song Lingwei
    Yu Fang
    Zhang Ru
    Niu Xinxin
    The Journal of China Universities of Posts and Telecommunications, 2015, (02) : 38 - 43
  • [26] Method of secure, scalable, and fine-grained data access control with efficient revocation in untrusted cloud
    Song Lingwei
    Yu Fang
    Zhang Ru
    Niu Xinxin
    The Journal of China Universities of Posts and Telecommunications, 2015, 22 (02) : 38 - 43
  • [27] Secure, Efficient and Fine-Grained Data Access Control Mechanism for P2P Storage Cloud
    He, Heng
    Li, Ruixuan
    Dong, Xinhua
    Zhang, Zhao
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2014, 2 (04) : 471 - 484
  • [28] A Fine-Grained Access Control Model with Secure Label on Data Resource
    Gao, Lijie
    Liu, Lianzhong
    Jin, Ze
    Han, Chunyan
    2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2013, : 14 - 18
  • [29] A Fine-Grained Access Control Scheme in Fog-IoT Based Environment
    Derki, Mohamed Saddek
    Taboudjemat-Nouali, Nadia
    Nouali, Omar
    ADVANCED INTELLIGENT SYSTEMS FOR SUSTAINABLE DEVELOPMENT (AI2SD'2020), VOL 2, 2022, 1418 : 465 - 474
  • [30] A License Management and Fine-Grained Verifiable Data Access Control System for Online Catering
    Ni, Xiaoze
    Feng, Jian
    Jiang, Renkai
    He, Yajie
    Liu, Tao
    Chen, Ting
    Qiu, Sen
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2023, 10 (06) : 3586 - 3601