A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment

被引:24
|
作者
Xiao, Min [1 ]
Zhou, Jing [2 ]
Liu, Xuejiao [3 ]
Jiang, Mingda [2 ]
机构
[1] Chongqing Univ Posts & Telecommun, Sch Cyber Secur & Informat Law, Chongqing 400065, Peoples R China
[2] Chongqing Univ Posts & Telecommun, Coll Comp Sci & Technol, Chongqing 400065, Peoples R China
[3] Hangzhou Normal Univ, Inst Serv Engn, Hangzhou 311121, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
searchable encryption; attribute-based encryption; online/offline encryption; mediated encryption; cloud computing; fog computing; ENCRYPTION;
D O I
10.3390/s17061423
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At present, there is little research on this issue. In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users. Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities simultaneously, and index ciphertext and data ciphertext are constructed based on a single ciphertext-policy attribute based encryption (CP-ABE) primitive and share the same key pair, thus the data access efficiency is significantly improved and the cost of key management is greatly reduced. Moreover, in the proposed scheme, the resource constrained end devices are allowed to rapidly assemble ciphertexts online and securely outsource most of decryption task to fog nodes, and mediated encryption mechanism is also adopted to achieve instantaneous user revocation instead of re-encrypting ciphertexts with many copies in many fog nodes. The security and the performance analysis show that our scheme is suitable for a fog computing environment.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] A Fine-Grained Access Control Scheme in Fog-IoT Based Environment
    Derki, Mohamed Saddek
    Taboudjemat-Nouali, Nadia
    Nouali, Omar
    [J]. ADVANCED INTELLIGENT SYSTEMS FOR SUSTAINABLE DEVELOPMENT (AI2SD'2020), VOL 2, 2022, 1418 : 465 - 474
  • [2] Verifiable Data Search with Fine-Grained Authorization in Edge Computing
    Li, Jianwei
    Wang, Xiaoming
    Gan, Qingqing
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [3] Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing
    Miao, Yinbin
    Ma, Jianfeng
    Liu, Ximeng
    Weng, Jian
    Li, Hongwei
    Li, Hui
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2019, 12 (05) : 772 - 785
  • [4] Towards leakage-resilient fine-grained access control in fog computing
    Yu, Zuoxia
    Au, Man Ho
    Xu, Qiuliang
    Yang, Rupeng
    Han, Jinguang
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 763 - 777
  • [5] A Fine-Grained Authorized Keyword Secure Search Scheme in the Cloud Computing
    Wang, Fan
    Qin, Zheng
    Yin, Hui
    [J]. CYBERSPACE SAFETY AND SECURITY, PT II, 2019, 11983 : 432 - 447
  • [6] Dynamic and fine-grained authentication and authorization architecture for grid computing
    Jung, H
    Han, H
    Jung, H
    Yeom, HY
    [J]. COMPUTATIONAL SCIENCE - ICCS 2005, PT 3, 2005, 3516 : 179 - 186
  • [7] Fine-grained access control for cloud computing
    Ye, Xinfeng
    Khoussainov, Bakh
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 160 - 168
  • [8] A method of fine-grained authorization and access control for ASP pages
    Wang, Ting
    Chen, Xingyuan
    Zhang, Bin
    Pei, Lichun
    [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 579 - 583
  • [9] Secure and efficient fine-grained data access control scheme in cloud computing
    Yang, Changsong
    Ye, Jun
    [J]. JOURNAL OF HIGH SPEED NETWORKS, 2015, 21 (04) : 259 - 271
  • [10] A flexible fine-grained dynamic access control approach for cloud computing environment
    Saima Mehraj
    M. Tariq Banday
    [J]. Cluster Computing, 2021, 24 : 1413 - 1434