Practical Multiauthority Attribute-Based Access Control for Edge-Cloud-Aided Internet of Things

With the assistance of edge computing which reduces the heavy burden of the cloud center server by using the network edge servers, the Internet of Things (IoTs) architectures enable low latency for real-time devices and applications. However, there still exist security challenges on data access cont...

Full description

Bibliographic Details
Main Authors: Kaiqing Huang, Xueli Wang, Zhiqiang Lin
Format: Article
Language:English
Published: Hindawi-Wiley 2021-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2021/8872699
id doaj-a4e8ed3d748749d8bed3ecd44d2b78ad
record_format Article
spelling doaj-a4e8ed3d748749d8bed3ecd44d2b78ad2021-02-15T12:52:42ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222021-01-01202110.1155/2021/88726998872699Practical Multiauthority Attribute-Based Access Control for Edge-Cloud-Aided Internet of ThingsKaiqing Huang0Xueli Wang1Zhiqiang Lin2Department of Basic Courses, Dongguan Polytechnic, Dongguan, 523808, ChinaSchool of Mathematical Sciences, South China Normal University, Guangzhou, 510631, ChinaSchool of Mathematics and Information Science, Guangzhou University, Guangzhou, 510006, ChinaWith the assistance of edge computing which reduces the heavy burden of the cloud center server by using the network edge servers, the Internet of Things (IoTs) architectures enable low latency for real-time devices and applications. However, there still exist security challenges on data access control for the IoT. Multiauthority attribute-based encryption (MA-ABE) is a promising technique to achieve access control over encrypted data in cross-domain applications. Based on the characteristics and technical requirements of the IoT, we propose an efficient fine-grained revocable large universe multiauthority access control scheme. In the proposed scheme, the most expensive encryption operations have been executed in the user’s initialization phase by adding a reusable ciphertext pool besides splitting the encryption algorithm to online encryption and offline encryption. Massive decryption operations are outsourced to the near-edge servers for reducing the computation overhead of decryption. An efficient revocation mechanism is designed to change users’ access privileges dynamically. Moreover, the scheme supports ciphertext verification. Only valid ciphertext can be stored and transmitted, which saves system resources. With the help of the chameleon hash function, the proposed scheme is proven CCA2-secure under the q-DPBDHE2 assumption. The performance analysis results indicate that the proposed scheme is efficient and suitable in edge computing for the IoT.http://dx.doi.org/10.1155/2021/8872699
collection DOAJ
language English
format Article
sources DOAJ
author Kaiqing Huang
Xueli Wang
Zhiqiang Lin
spellingShingle Kaiqing Huang
Xueli Wang
Zhiqiang Lin
Practical Multiauthority Attribute-Based Access Control for Edge-Cloud-Aided Internet of Things
Security and Communication Networks
author_facet Kaiqing Huang
Xueli Wang
Zhiqiang Lin
author_sort Kaiqing Huang
title Practical Multiauthority Attribute-Based Access Control for Edge-Cloud-Aided Internet of Things
title_short Practical Multiauthority Attribute-Based Access Control for Edge-Cloud-Aided Internet of Things
title_full Practical Multiauthority Attribute-Based Access Control for Edge-Cloud-Aided Internet of Things
title_fullStr Practical Multiauthority Attribute-Based Access Control for Edge-Cloud-Aided Internet of Things
title_full_unstemmed Practical Multiauthority Attribute-Based Access Control for Edge-Cloud-Aided Internet of Things
title_sort practical multiauthority attribute-based access control for edge-cloud-aided internet of things
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2021-01-01
description With the assistance of edge computing which reduces the heavy burden of the cloud center server by using the network edge servers, the Internet of Things (IoTs) architectures enable low latency for real-time devices and applications. However, there still exist security challenges on data access control for the IoT. Multiauthority attribute-based encryption (MA-ABE) is a promising technique to achieve access control over encrypted data in cross-domain applications. Based on the characteristics and technical requirements of the IoT, we propose an efficient fine-grained revocable large universe multiauthority access control scheme. In the proposed scheme, the most expensive encryption operations have been executed in the user’s initialization phase by adding a reusable ciphertext pool besides splitting the encryption algorithm to online encryption and offline encryption. Massive decryption operations are outsourced to the near-edge servers for reducing the computation overhead of decryption. An efficient revocation mechanism is designed to change users’ access privileges dynamically. Moreover, the scheme supports ciphertext verification. Only valid ciphertext can be stored and transmitted, which saves system resources. With the help of the chameleon hash function, the proposed scheme is proven CCA2-secure under the q-DPBDHE2 assumption. The performance analysis results indicate that the proposed scheme is efficient and suitable in edge computing for the IoT.
url http://dx.doi.org/10.1155/2021/8872699
work_keys_str_mv AT kaiqinghuang practicalmultiauthorityattributebasedaccesscontrolforedgecloudaidedinternetofthings
AT xueliwang practicalmultiauthorityattributebasedaccesscontrolforedgecloudaidedinternetofthings
AT zhiqianglin practicalmultiauthorityattributebasedaccesscontrolforedgecloudaidedinternetofthings
_version_ 1714867297206665216