Cargando…

A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing

With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data stora...

Descripción completa

Detalles Bibliográficos
Autores principales: Fan, Kai, Wang, Junxiong, Wang, Xin, Li, Hui, Yang, Yintang
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2017
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5551097/
https://www.ncbi.nlm.nih.gov/pubmed/28737733
http://dx.doi.org/10.3390/s17071695
_version_ 1783256240901586944
author Fan, Kai
Wang, Junxiong
Wang, Xin
Li, Hui
Yang, Yintang
author_facet Fan, Kai
Wang, Junxiong
Wang, Xin
Li, Hui
Yang, Yintang
author_sort Fan, Kai
collection PubMed
description With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.
format Online
Article
Text
id pubmed-5551097
institution National Center for Biotechnology Information
language English
publishDate 2017
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-55510972017-08-11 A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing Fan, Kai Wang, Junxiong Wang, Xin Li, Hui Yang, Yintang Sensors (Basel) Article With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient. MDPI 2017-07-24 /pmc/articles/PMC5551097/ /pubmed/28737733 http://dx.doi.org/10.3390/s17071695 Text en © 2017 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Fan, Kai
Wang, Junxiong
Wang, Xin
Li, Hui
Yang, Yintang
A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
title A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
title_full A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
title_fullStr A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
title_full_unstemmed A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
title_short A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
title_sort secure and verifiable outsourced access control scheme in fog-cloud computing
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5551097/
https://www.ncbi.nlm.nih.gov/pubmed/28737733
http://dx.doi.org/10.3390/s17071695
work_keys_str_mv AT fankai asecureandverifiableoutsourcedaccesscontrolschemeinfogcloudcomputing
AT wangjunxiong asecureandverifiableoutsourcedaccesscontrolschemeinfogcloudcomputing
AT wangxin asecureandverifiableoutsourcedaccesscontrolschemeinfogcloudcomputing
AT lihui asecureandverifiableoutsourcedaccesscontrolschemeinfogcloudcomputing
AT yangyintang asecureandverifiableoutsourcedaccesscontrolschemeinfogcloudcomputing
AT fankai secureandverifiableoutsourcedaccesscontrolschemeinfogcloudcomputing
AT wangjunxiong secureandverifiableoutsourcedaccesscontrolschemeinfogcloudcomputing
AT wangxin secureandverifiableoutsourcedaccesscontrolschemeinfogcloudcomputing
AT lihui secureandverifiableoutsourcedaccesscontrolschemeinfogcloudcomputing
AT yangyintang secureandverifiableoutsourcedaccesscontrolschemeinfogcloudcomputing