Cargando…

Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation

Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based sig...

Descripción completa

Detalles Bibliográficos
Autores principales: Xu, Qian, Tan, Chengxiang, Fan, Zhijie, Zhu, Wenye, Xiao, Ya, Cheng, Fujia
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5982144/
https://www.ncbi.nlm.nih.gov/pubmed/29772840
http://dx.doi.org/10.3390/s18051609
_version_ 1783328180047708160
author Xu, Qian
Tan, Chengxiang
Fan, Zhijie
Zhu, Wenye
Xiao, Ya
Cheng, Fujia
author_facet Xu, Qian
Tan, Chengxiang
Fan, Zhijie
Zhu, Wenye
Xiao, Ya
Cheng, Fujia
author_sort Xu, Qian
collection PubMed
description Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional “encrypt-then-sign” or “sign-then-encrypt” strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation.
format Online
Article
Text
id pubmed-5982144
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-59821442018-06-05 Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation Xu, Qian Tan, Chengxiang Fan, Zhijie Zhu, Wenye Xiao, Ya Cheng, Fujia Sensors (Basel) Article Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional “encrypt-then-sign” or “sign-then-encrypt” strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation. MDPI 2018-05-17 /pmc/articles/PMC5982144/ /pubmed/29772840 http://dx.doi.org/10.3390/s18051609 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Xu, Qian
Tan, Chengxiang
Fan, Zhijie
Zhu, Wenye
Xiao, Ya
Cheng, Fujia
Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation
title Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation
title_full Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation
title_fullStr Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation
title_full_unstemmed Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation
title_short Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation
title_sort secure data access control for fog computing based on multi-authority attribute-based signcryption with computation outsourcing and attribute revocation
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5982144/
https://www.ncbi.nlm.nih.gov/pubmed/29772840
http://dx.doi.org/10.3390/s18051609
work_keys_str_mv AT xuqian securedataaccesscontrolforfogcomputingbasedonmultiauthorityattributebasedsigncryptionwithcomputationoutsourcingandattributerevocation
AT tanchengxiang securedataaccesscontrolforfogcomputingbasedonmultiauthorityattributebasedsigncryptionwithcomputationoutsourcingandattributerevocation
AT fanzhijie securedataaccesscontrolforfogcomputingbasedonmultiauthorityattributebasedsigncryptionwithcomputationoutsourcingandattributerevocation
AT zhuwenye securedataaccesscontrolforfogcomputingbasedonmultiauthorityattributebasedsigncryptionwithcomputationoutsourcingandattributerevocation
AT xiaoya securedataaccesscontrolforfogcomputingbasedonmultiauthorityattributebasedsigncryptionwithcomputationoutsourcingandattributerevocation
AT chengfujia securedataaccesscontrolforfogcomputingbasedonmultiauthorityattributebasedsigncryptionwithcomputationoutsourcingandattributerevocation