OAC-HAS: outsourced access control with hidden access structures in fog-enhanced IoT systems

被引:33
|
作者
Zhang, Jiale [1 ]
Cheng, Zhen [1 ]
Cheng, Xiang [1 ]
Chen, Bing [1 ,2 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Peoples R China
[2] Collaborat Innovat Ctr Novel Software Technol & I, Nanjing, Peoples R China
基金
中国国家自然科学基金;
关键词
Fog-cloud computing; outsourced ABE; privacy-preserving; access control; ATTRIBUTE-BASED-ENCRYPTION; PRIVACY; PARADIGM;
D O I
10.1080/09540091.2020.1841096
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Fog computing is recently a novel distributed computing paradigm that performs a significant achievement in the latency-sensitive smart Internet of Things (IoT) applications. However, the security and privacy issues, such as data leakage, still challenge the wide deployment of fog computing infrastructure. To guarantee data confidentiality and meanwhile achieving fine-grained access control, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) promises to provide a flexible access policy for securely sharing data among users, fog nodes, and cloud center. However, due to the complicated cryptographic operations, CP-ABE has met a significant drawback that requires heavy computation resources on the user-side. In this paper, we propose an outsourced access control scheme with hidden access structures, named OAC-HAS, in fog-enhanced IoT systems. The contributions of our OAC-HAS scheme are three-folds. Firstly, we introduce a fog-cloud computing (FCC) environment which has the outsourcing capability. Then, we design an outsource verification mechanism to guarantee the correctness of executing cryptographic operations on the fog nodes. Finally, we also provide a privacy guarantee that prevents information leakage from the access structures. Security analysis and experimental results show that the proposed OAC-HAS scheme achieves flexible access policy, privacy-preserving, and high efficiency in fog-enhanced IoT systems.
引用
收藏
页码:1060 / 1076
页数:17
相关论文
共 50 条
  • [1] MOFIT: An Efficient Access Control Scheme with Attribute Merging and Outsourcing Capability for Fog-Enhanced IoT
    Sarma, Richa
    Barbhuiya, Ferdous Ahmed
    PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT 2021, 2022, 13148 : 523 - 535
  • [2] MACFI: A multi-authority access control scheme with efficient ciphertext and secret key size for fog-enhanced IoT
    Sarma, Richa
    Kumar, Chandan
    Barbhuiya, Ferdous Ahmed
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 123
  • [3] A Distributed Access Control with Outsourced Computation in Fog Computing
    Wang, Qihua
    Wang, Huaqun
    Wang, Yufeng
    Guo, Rui
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [4] Distributed Access Control with Outsourced Computation in Fog Computing
    Wang, Qihua
    Lv, Gaoyan
    Sun, Xiuling
    PROCEEDINGS OF THE 2019 31ST CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2019), 2019, : 2446 - 2450
  • [5] A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
    Fan, Kai
    Wang, Junxiong
    Wang, Xin
    Li, Hui
    Yang, Yintang
    SENSORS, 2017, 17 (07)
  • [6] A Distributed Fog-based Access Control Architecture for IoT
    Alnefaie, Seham
    Cherif, Asma
    Alshehri, Suhair
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (12): : 4545 - 4566
  • [7] Resource Management in Fog-Enhanced Radio Access Network to Support Real-Time Vehicular Services
    Li, Jun
    Natalino, Carlos
    Dung Pham Van
    Wosinska, Lena
    Chen, Jiajia
    2017 IEEE 1ST INTERNATIONAL CONFERENCE ON FOG AND EDGE COMPUTING (ICFEC), 2017, : 68 - 74
  • [8] An adaptive distributed access control model for IoT and fog computing environments
    Charaf, Lalla Amina
    Alihamidi, Imam
    Deroussi, Anass
    Madi, Abdessalam Ait
    Addaim, Adnane
    Charaf, Moulay El Hassan
    INTERNATIONAL JOURNAL OF MODELLING IDENTIFICATION AND CONTROL, 2024, 44 (03) : 230 - 245
  • [9] Enhanced Authentication for Decentralized IoT Access Control Architecture
    Kang, Jeong Hwa
    Seo, Minhye
    CRYPTOGRAPHY, 2023, 7 (03)
  • [10] EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy
    Ma, Haobin
    Zhou, Dehua
    Li, Peng
    Wang, Xiaoming
    SENSORS, 2023, 23 (09)