Efficient Attribute-Based Encryption Outsourcing Scheme With User and Attribute Revocation for Fog-Enabled IoT

被引:17
|
作者
Li, Ling [1 ]
Wang, Zheng [1 ]
Li, Na [2 ]
机构
[1] Taiyuan Univ Technol, Sch Informat & Comp, Jinzhong 030600, Peoples R China
[2] State Grid Shanxi Elect Power Co, Taiyuan 030024, Peoples R China
关键词
Edge computing; Encryption; Cloud computing; Outsourcing; Logic gates; Servers; Fog computing; attribute-based encryption; revocation; outsourcing; access control; DATA ACCESS-CONTROL; INTERNET; SECURITY; THINGS;
D O I
10.1109/ACCESS.2020.3025140
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid growth of Internet of Things (IoT) applications, fog computing enables the IoT to provide efficient services by extending the cloud computing paradigm to the edge of the network. However, the existing attribute-based encryption schemes rarely focus on user and attribute revocation in fog computing and most of them still impose high computational and storage overhead on resource-limited IoT devices. In this article, we propose an efficient attribute-based encryption outsourcing scheme with user and attribute revocation for fog-enabled IoT. The proposed scheme improves the existing encryption scheme that uses the concept of attribute groups to achieve attribute revocation, making it suitable for fog computing and improving the efficiency of ciphertext update. In addition, it implements a novel method of user revocation in fog computing based on the characteristics of fog computing. In order to reduce the computing and storage burden of IoT devices, the heavy computation operations of encryption and decryption are outsourced to fog nodes and part of secret keys are stored in fog nodes. The security analysis shows that the proposed scheme is secure under the Decisional Bilinear Diffie-Hellman (DBDH) assumption. The performance analysis shows that the proposed scheme has high revocation efficiency and is efficient enough to be deployed in practical fog computing.
引用
收藏
页码:176738 / 176749
页数:12
相关论文
共 50 条
  • [31] Generic user revocation systems for attribute-based encryption in cloud storage
    Chen, Genlang
    Xu, Zhiqian
    Jiang, Hai
    Li, Kuan-ching
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2018, 19 (11) : 1362 - 1384
  • [32] Generic user revocation systems for attribute-based encryption in cloud storage
    Genlang CHEN
    Zhiqian XU
    Hai JIANG
    Kuan-ching LI
    Frontiers of Information Technology & Electronic Engineering, 2018, 19 (11) : 1362 - 1384
  • [33] Generic user revocation systems for attribute-based encryption in cloud storage
    Genlang Chen
    Zhiqian Xu
    Hai Jiang
    Kuan-ching Li
    Frontiers of Information Technology & Electronic Engineering, 2018, 19 : 1362 - 1384
  • [34] Attribute-based Encryption with Flexible Revocation for IoV
    Chen, Ruoyu
    Li, Yuhong
    Rahmani, Rahim
    18TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS, FNC 2023/20TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING, MOBISPC 2023/13TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY, SEIT 2023, 2023, 224 : 131 - 138
  • [35] Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems
    Hur, Junbeom
    Noh, Dong Kun
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (07) : 1214 - 1221
  • [36] Generic attribute revocation systems for attribute-based encryption in cloud storage
    Chen, Genlang
    Xu, Zhiqian
    Zhang, Jia-jian
    Wang, Guo-jun
    Jiang, Hai
    Huang, Miao-qing
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2019, 20 (06) : 773 - 786
  • [37] Generic attribute revocation systems for attribute-based encryption in cloud storage
    Genlang Chen
    Zhiqian Xu
    Jia-jian Zhang
    Guo-jun Wang
    Hai Jiang
    Miao-qing Huang
    Frontiers of Information Technology & Electronic Engineering, 2019, 20 : 773 - 786
  • [38] An efficient KP design framework of attribute-based searchable encryption for user level revocation in cloud
    Mamta
    Gupta, B. B.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (18):
  • [39] Research on Ciphertext-Policy Attribute-Based Encryption with Attribute Level User Revocation in Cloud Storage
    Wang, Guangbo
    Wang, Jianhua
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2017, 2017
  • [40] Modified Ciphertext-Policy Attribute-Based Encryption Scheme with Efficient Revocation for PHR System
    Zheng, Hongying
    Wu, Jieming
    Wang, Bo
    Chen, Jianyong
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2017, 2017