Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing

被引:15
|
作者
Li, Dawei [1 ]
Liu, Jianwei [2 ]
Wu, Qianhong [2 ]
Guan, Zhenyu [2 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, Beijing 100191, Peoples R China
[2] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
基金
中国国家自然科学基金;
关键词
Fog computing; attribute-based encryption; distributed access control; multi-authority; large-universe; ATTRIBUTE-BASED ENCRYPTION; MULTI-AUTHORITY;
D O I
10.1109/ACCESS.2019.2890976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing enables computation, storage, applications, and network services between the Internet of Things and the cloud servers by extending the Cloud Computing paradigm to the edge of the network. When protecting information security in Fog computing, advanced security with low latency, wide-spread geographical distribution support, and high flexibility should be taken in to considertion first, because of its huge number of nodes. In this paper, we propose a new cryptographic primitive, named CCA2 secure publicly-verifiable revocable large-universe multi-authority attribute-based encryption (CCA2-PV-R-LU-MA-ABE), to achieve flexible fine-grained access control in Fog computing. In this primitive, end nodes in fogs generate private keys from multiple authorities that might be differentiated by their geographical locations or functions, and their attributes can be denoted by any strings in the large universe, which meets diverse needs in practical Fog applications. In addition, the accessibility of nodes can be revoked efficiently even by resource-limited devices. To ensure the validity of ciphertext, this primitive supports public verification and only valid ciphertext can be stored or transmitted. Based on the primitive and the feature of Fog computing, we construct a concrete CCA2-PV-R-LU-MA-ABE scheme. We define the security model of this primitive, which is much more secure than the CPA-secure scheme. Finally, we compare the efficiency of the proposed concrete scheme with that of the existing CPA-secure scheme by both theoretical and experimental analysis, and the results show that the extra consumption of efficiency to improving CPA to CCA2 is considerably low. The proposed scheme is highly secure, flexible, and efficient enough to be deployed in practical Fog computing.
引用
收藏
页码:11688 / 11697
页数:10
相关论文
共 50 条
  • [31] Fine-Grained Access Control in the Era of Cloud Computing: An Analytical Review
    Albulayhi, Khalid
    Abuhussein, Abdullah
    Alsubaei, Faisal
    Sheldon, Frederick T.
    2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 748 - 755
  • [32] Fine-grained Access Control for Personal Health Records in Cloud Computing
    Li, Wei
    Ni, Wei
    Liu, Dongxi
    Liu, Ren Ping
    Wang, Peishun
    Luo, Shoushan
    2017 IEEE 85TH VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2017,
  • [33] A Secure Remote Monitoring Framework Supporting Efficient Fine-Grained Access Control and Data Processing in IoT
    Chen, Yaxing
    Sun, Wenhai
    Zhang, Ning
    Zheng, Qinghua
    Lou, Wenjing
    Hou, Y. Thomas
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 3 - 21
  • [34] Secure IoT Data Outsourcing With Aggregate Statistics and Fine-Grained Access Control
    Liu, Ling
    Wang, He
    Zhang, Yuqing
    IEEE ACCESS, 2020, 8 : 95057 - 95067
  • [35] Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud
    Xu, Shengmin
    Yang, Guomin
    Mu, Yi
    Deng, Robert H.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (08) : 2101 - 2113
  • [36] SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics
    Xue, Tao
    Wen, Yu
    Luo, Bo
    Li, Gang
    Li, Yingjiu
    Zhang, Boyang
    Zheng, Yang
    Hu, Yanfei
    Meng, Dan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (02) : 1104 - 1123
  • [37] Achieving fine-grained access control for secure data sharing on cloud servers
    Wang, Guojun
    Liu, Qin
    Wu, Jie
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2011, 23 (12): : 1443 - 1464
  • [38] A fully flexible key delegation mechanism with efficient fine-grained access control in CP-ABE
    Porwal S.
    Mittal S.
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (09) : 12837 - 12856
  • [39] F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing
    Ren, Wei
    Zeng, Lingling
    Liu, Ran
    Cheng, Chi
    MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [40] Efficient Fine-grained Data Access Control in Wireless Sensor Networks
    Wang, Qian
    Ren, Kui
    Wang, Cong
    Lou, Wenjing
    MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 2253 - +