A Privacy-Preserving Access Control Scheme with Verifiable and Outsourcing Capabilities in Fog-Cloud Computing

被引:0
|
作者
Cheng, Zhen [1 ]
Zhang, Jiale [1 ]
Qian, Hongyan [1 ]
Xiang, Mingrong [2 ]
Wu, Di [3 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
[2] Deakin Univ, Fac Sci Engn & Built Environm, Melbourne, Vic 3216, Australia
[3] Univ Technol Sydney, Ctr Artif Intelligence, Sch Comp Sci, Sydney, NSW 2007, Australia
关键词
Fog-cloud computing; Attribute-based encryption; Privacy-preserving; Access control; ATTRIBUTE-BASED-ENCRYPTION; PARADIGM;
D O I
10.1007/978-3-030-38991-8_23
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing is a distribution system architecture which uses edge devices to provide computation, storage, and sharing at the edge of the network as an extension of cloud computing architecture, where the potential network traffic jams can be resolved. Whereas, the untrustworthy edge devices which contribute the computing resources may lead to data security and privacy-preserving issues. To address security issues and achieve fine-grained access control to protect privacy of users, ciphertext-policy attribute-based encryption (CP-ABE) mechanism has been well-explored, where data owners obtain flexible access policy to share data between users. However, the major drawback of CP-ABE system is heavy computational cost due to the complicated cryptographic operations. To tackle this problem, we propose a privacy-preserving access control (PPAC) scheme and the contributions are tri-folded: (1) we introduce outsourcing capability in fog-cloud computing (FCC) environment; (2) the outsource verification mechanism has been considered to guarantee the third party execute the algorithm correctly; (3) we design a partiality hidden method to protect the privacy information embedded in the access structures. The experimental results show that our proposed PPAC is efficient, economical and suitable for mobile devices with limited resources.
引用
收藏
页码:345 / 358
页数:14
相关论文
共 50 条
  • [1] A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
    Fan, Kai
    Wang, Junxiong
    Wang, Xin
    Li, Hui
    Yang, Yintang
    [J]. SENSORS, 2017, 17 (07)
  • [2] Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing
    Tang, Wenyi
    Qin, Bo
    Li, Yanan
    Wu, Qianhong
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 281 - 298
  • [3] Functional privacy-preserving outsourcing scheme with computation verifiability in fog computing
    Tang, Wenyi
    Qin, Bo
    Li, Yanan
    Wu, Qianhong
    [J]. KSII Transactions on Internet and Information Systems, 2020, 14 (01) : 281 - 298
  • [4] Toward Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing
    Li, Yiran
    Li, Hongwei
    Xu, Guowen
    Xiang, Tao
    Huang, Xiaoming
    Lu, Rongxing
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (12): : 11460 - 11472
  • [5] Hybrid privacy-preserving clinical decision support system in fog-cloud computing
    Liu, Ximeng
    Deng, Robert H.
    Yang, Yang
    Iran, Hieu N.
    Zhong, Shangping
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 825 - 837
  • [6] Toward Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing
    Li, Yiran
    Li, Hongwei
    Xu, Guowen
    Xiang, Tao
    Huang, Xiaoming
    Lu, Rongxing
    [J]. IEEE Internet of Things Journal, 2020, 7 (12): : 11460 - 11472
  • [7] An Optimization Framework for Privacy-preserving Access Control in Cloud-Fog Computing Systems
    Jiang, Yili
    Zhang, Kuan
    Qian, Yi
    Zhou, Liang
    [J]. 2020 IEEE 92ND VEHICULAR TECHNOLOGY CONFERENCE (VTC2020-FALL), 2020,
  • [8] Privacy-Preserving and Verifiable Outsourcing Linear Inference Computing Framework
    Liu, Jiao
    Li, Xinghua
    Liu, Ximeng
    Tang, Jiawei
    Wang, Yunwei
    Tong, Qiuyun
    Ma, Jianfeng
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) : 4591 - 4604
  • [9] Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
    Chen, Fei
    Xiang, Tao
    Yang, Yuanyuan
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2014, 74 (03) : 2141 - 2151
  • [10] Privacy-preserving logistic regression outsourcing in cloud computing
    Zhu, Xu Dong
    Li, Hui
    Li, Feng Hua
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 144 - 150