Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing

被引:15
|
作者
Li, Dawei [1 ]
Liu, Jianwei [2 ]
Wu, Qianhong [2 ]
Guan, Zhenyu [2 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, Beijing 100191, Peoples R China
[2] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
基金
中国国家自然科学基金;
关键词
Fog computing; attribute-based encryption; distributed access control; multi-authority; large-universe; ATTRIBUTE-BASED ENCRYPTION; MULTI-AUTHORITY;
D O I
10.1109/ACCESS.2019.2890976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing enables computation, storage, applications, and network services between the Internet of Things and the cloud servers by extending the Cloud Computing paradigm to the edge of the network. When protecting information security in Fog computing, advanced security with low latency, wide-spread geographical distribution support, and high flexibility should be taken in to considertion first, because of its huge number of nodes. In this paper, we propose a new cryptographic primitive, named CCA2 secure publicly-verifiable revocable large-universe multi-authority attribute-based encryption (CCA2-PV-R-LU-MA-ABE), to achieve flexible fine-grained access control in Fog computing. In this primitive, end nodes in fogs generate private keys from multiple authorities that might be differentiated by their geographical locations or functions, and their attributes can be denoted by any strings in the large universe, which meets diverse needs in practical Fog applications. In addition, the accessibility of nodes can be revoked efficiently even by resource-limited devices. To ensure the validity of ciphertext, this primitive supports public verification and only valid ciphertext can be stored or transmitted. Based on the primitive and the feature of Fog computing, we construct a concrete CCA2-PV-R-LU-MA-ABE scheme. We define the security model of this primitive, which is much more secure than the CPA-secure scheme. Finally, we compare the efficiency of the proposed concrete scheme with that of the existing CPA-secure scheme by both theoretical and experimental analysis, and the results show that the extra consumption of efficiency to improving CPA to CCA2 is considerably low. The proposed scheme is highly secure, flexible, and efficient enough to be deployed in practical Fog computing.
引用
收藏
页码:11688 / 11697
页数:10
相关论文
共 50 条
  • [41] Fine-grained and Efficient Access Control in E-health Environment
    Miao, Tiantian
    Shen, Jian
    Jin, Xin
    Lai, Jin-Feng
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (07): : 2169 - 2176
  • [42] Efficient integration of fine-grained access control and resource brokering in grid
    P. Mazzoleni
    B. Crispo
    S. Sivasubramanian
    E. Bertino
    The Journal of Supercomputing, 2009, 49
  • [43] An Efficient Fine-grained Access Control Mechanism for Database Outsourcing Service
    Hue, T. B. P.
    Luyen, G. N.
    Kha, N. D.
    Wohlgemuth, S.
    Echizen, I.
    Thuc, D. N.
    Thuy, T. B. D.
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND INTELLIGENT CONTROL (ISIC 2012), 2012, : 65 - 69
  • [44] Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing
    Liu, Jun'e
    Wan, Zhiguo
    Gu, Ming
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 98 - 107
  • [45] Efficient integration of fine-grained access control and resource brokering in grid
    Mazzoleni, P.
    Crispo, B.
    Sivasubramanian, S.
    Bertino, E.
    JOURNAL OF SUPERCOMPUTING, 2009, 49 (01): : 108 - 126
  • [46] Fine-grained access control policy in blockchain-enabled edge computing
    He, Guangxuan
    Li, Chunlin
    Shu, Yong
    Luo, Youlong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2024, 221
  • [47] Unified Fine-Grained Access Control for Personal Health Records in Cloud Computing
    Li, Wei
    Liu, Bonnie M.
    Liu, Dongxi
    Liu, Ren Ping
    Wang, Peishun
    Luo, Shoushan
    Ni, Wei
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2019, 23 (03) : 1278 - 1289
  • [48] Fine-Grained Access Control via XACML Policy Optimization in Cloud Computing
    Pei, Xin
    Yu, Huiqun
    Fan, Guisheng
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2015, 25 (9-10) : 1709 - 1714
  • [49] A Fine-Grained and Lightweight Data Access Control Model for Mobile Cloud Computing
    Fugkeaw, Somchart
    IEEE ACCESS, 2021, 9 : 836 - 848
  • [50] Toward a flexible and fine-grained access control framework for infrastructure as a service clouds
    Li, Bo
    Li, Jianxin
    Liu, Lu
    Zhou, Chao
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) : 2730 - 2743