Efficient Attribute-Based Encryption Outsourcing Scheme With User and Attribute Revocation for Fog-Enabled IoT

被引:17
|
作者
Li, Ling [1 ]
Wang, Zheng [1 ]
Li, Na [2 ]
机构
[1] Taiyuan Univ Technol, Sch Informat & Comp, Jinzhong 030600, Peoples R China
[2] State Grid Shanxi Elect Power Co, Taiyuan 030024, Peoples R China
关键词
Edge computing; Encryption; Cloud computing; Outsourcing; Logic gates; Servers; Fog computing; attribute-based encryption; revocation; outsourcing; access control; DATA ACCESS-CONTROL; INTERNET; SECURITY; THINGS;
D O I
10.1109/ACCESS.2020.3025140
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid growth of Internet of Things (IoT) applications, fog computing enables the IoT to provide efficient services by extending the cloud computing paradigm to the edge of the network. However, the existing attribute-based encryption schemes rarely focus on user and attribute revocation in fog computing and most of them still impose high computational and storage overhead on resource-limited IoT devices. In this article, we propose an efficient attribute-based encryption outsourcing scheme with user and attribute revocation for fog-enabled IoT. The proposed scheme improves the existing encryption scheme that uses the concept of attribute groups to achieve attribute revocation, making it suitable for fog computing and improving the efficiency of ciphertext update. In addition, it implements a novel method of user revocation in fog computing based on the characteristics of fog computing. In order to reduce the computing and storage burden of IoT devices, the heavy computation operations of encryption and decryption are outsourced to fog nodes and part of secret keys are stored in fog nodes. The security analysis shows that the proposed scheme is secure under the Decisional Bilinear Diffie-Hellman (DBDH) assumption. The performance analysis shows that the proposed scheme has high revocation efficiency and is efficient enough to be deployed in practical fog computing.
引用
收藏
页码:176738 / 176749
页数:12
相关论文
共 50 条
  • [1] A revocable multi-authority attribute-based encryption scheme for fog-enabled IoT
    Penuelas-Angulo, Alejandro
    Feregrino-Uribe, Claudia
    Morales-Sandoval, Miguel
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 155
  • [2] Revocation in attribute-based encryption for fog-enabled internet of things: A systematic survey
    Penuelas-Angulo, Alejandro
    Feregrino-Uribe, Claudia
    Morales-Sandoval, Miguel
    INTERNET OF THINGS, 2023, 23
  • [3] Attribute-based encryption scheme supporting attribute revocation and decryption outsourcing
    School of Mathematics and Statistics, Xidian Univ., Xi'an
    710071, China
    Xi'an Dianzi Keji Daxue Xuebao, 6 (6-10 and 55):
  • [4] Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation
    Gao J.
    Sun J.
    Qin J.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2160 - 2169
  • [5] An Efficient Access Control Scheme With Outsourcing and Attribute Revocation for Fog-Enabled E-Health
    Zhao, Jing
    Zeng, Peng
    Choo, Kim-Kwang Raymond
    IEEE ACCESS, 2021, 9 : 13789 - 13799
  • [6] A secure and efficient access control scheme with attribute revocation and merging capabilities for fog-enabled IoT?
    Sarma, Richa
    Barbhuiya, Ferdous Ahmed
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [7] Attribute-based encryption scheme supporting decryption outsourcing and attribute revocation in cloud storage
    Liu, Hongwei
    Zhu, Ping
    Chen, Zehong
    Zhang, Peng
    Jiang, Zoe L.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 556 - 561
  • [8] A privacy preserving attribute-based encryption scheme with user revocation
    Li, Jiguo
    Shi, Yuerong
    Zhang, Yichen
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2281 - 2292
  • [9] Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation
    Ghopur, Dilxat
    Ma, Jianfeng
    Ma, Xindi
    Hao, Jialu
    Jiang, Tao
    Wang, Xiangyu
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) : 3999 - 4011
  • [10] Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating
    Liu, Zechao
    Jiang, Zoe L.
    Wang, Xuan
    Yiu, S. M.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 108 : 112 - 123