Cargando…
Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation
Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based sig...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2018
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5982144/ https://www.ncbi.nlm.nih.gov/pubmed/29772840 http://dx.doi.org/10.3390/s18051609 |
_version_ | 1783328180047708160 |
---|---|
author | Xu, Qian Tan, Chengxiang Fan, Zhijie Zhu, Wenye Xiao, Ya Cheng, Fujia |
author_facet | Xu, Qian Tan, Chengxiang Fan, Zhijie Zhu, Wenye Xiao, Ya Cheng, Fujia |
author_sort | Xu, Qian |
collection | PubMed |
description | Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional “encrypt-then-sign” or “sign-then-encrypt” strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation. |
format | Online Article Text |
id | pubmed-5982144 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2018 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-59821442018-06-05 Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation Xu, Qian Tan, Chengxiang Fan, Zhijie Zhu, Wenye Xiao, Ya Cheng, Fujia Sensors (Basel) Article Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional “encrypt-then-sign” or “sign-then-encrypt” strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation. MDPI 2018-05-17 /pmc/articles/PMC5982144/ /pubmed/29772840 http://dx.doi.org/10.3390/s18051609 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Xu, Qian Tan, Chengxiang Fan, Zhijie Zhu, Wenye Xiao, Ya Cheng, Fujia Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation |
title | Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation |
title_full | Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation |
title_fullStr | Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation |
title_full_unstemmed | Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation |
title_short | Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation |
title_sort | secure data access control for fog computing based on multi-authority attribute-based signcryption with computation outsourcing and attribute revocation |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5982144/ https://www.ncbi.nlm.nih.gov/pubmed/29772840 http://dx.doi.org/10.3390/s18051609 |
work_keys_str_mv | AT xuqian securedataaccesscontrolforfogcomputingbasedonmultiauthorityattributebasedsigncryptionwithcomputationoutsourcingandattributerevocation AT tanchengxiang securedataaccesscontrolforfogcomputingbasedonmultiauthorityattributebasedsigncryptionwithcomputationoutsourcingandattributerevocation AT fanzhijie securedataaccesscontrolforfogcomputingbasedonmultiauthorityattributebasedsigncryptionwithcomputationoutsourcingandattributerevocation AT zhuwenye securedataaccesscontrolforfogcomputingbasedonmultiauthorityattributebasedsigncryptionwithcomputationoutsourcingandattributerevocation AT xiaoya securedataaccesscontrolforfogcomputingbasedonmultiauthorityattributebasedsigncryptionwithcomputationoutsourcingandattributerevocation AT chengfujia securedataaccesscontrolforfogcomputingbasedonmultiauthorityattributebasedsigncryptionwithcomputationoutsourcingandattributerevocation |