Attribute-Based Encryption Scheme Supporting Outsourcing and Revocation in Fog Computing
Fog computing extends the computing power and data analysis applications of cloud computing to the edge of the network,meeting the requirements of low latency and mobility of the Internet of Things(IoT) devices,but at the same time generating new data security and privacy protection problems.The Att...
| Published in: | Jisuanji gongcheng |
|---|---|
| Main Author: | |
| Format: | Article |
| Language: | English |
| Published: |
Editorial Office of Computer Engineering
2020-05-01
|
| Subjects: | |
| Online Access: | https://www.ecice06.com/fileup/1000-3428/PDF/20200505.pdf |
| _version_ | 1848649751946330112 |
|---|---|
| author | HUANG Fengming, TU Shanshan, MENG Yuan |
| author_facet | HUANG Fengming, TU Shanshan, MENG Yuan |
| author_sort | HUANG Fengming, TU Shanshan, MENG Yuan |
| collection | DOAJ |
| container_title | Jisuanji gongcheng |
| description | Fog computing extends the computing power and data analysis applications of cloud computing to the edge of the network,meeting the requirements of low latency and mobility of the Internet of Things(IoT) devices,but at the same time generating new data security and privacy protection problems.The Attribute-Based Encryption(ABE) technology in the traditional cloud computing is not suitable for the IoT devices with limited computing resources in the fog environment,and the attribute change is difficult to manage.Therefore,this paper proposes an ABE scheme that supports encryption and decryption outsourcing and revocation in fog computing.A three-layer system model of "cloud-fog-terminal" is constructed,and by introducing the technology of the attribute group key,the key is dynamically updated,thus the requirement of immediate cancellation of the attribute is satisfied.Some complicated encryption and decryption operations in the terminal device are outsourced to the fog node,which greatly improves the calculation efficiency.Experimental results show that the scheme has better computational efficiency and reliability than KeyGen and Enc schemes. |
| format | Article |
| id | doaj-85483de8994747a0abeaceaf2dc2c136 |
| institution | Directory of Open Access Journals |
| issn | 1000-3428 |
| language | English |
| publishDate | 2020-05-01 |
| publisher | Editorial Office of Computer Engineering |
| record_format | Article |
| spelling | doaj-85483de8994747a0abeaceaf2dc2c1362025-11-03T05:52:49ZengEditorial Office of Computer EngineeringJisuanji gongcheng1000-34282020-05-01465344010.19678/j.issn.1000-3428.0055025Attribute-Based Encryption Scheme Supporting Outsourcing and Revocation in Fog ComputingHUANG Fengming, TU Shanshan, MENG Yuan0Department of Information, Beijing University of Technology, Beijing 100124, ChinaFog computing extends the computing power and data analysis applications of cloud computing to the edge of the network,meeting the requirements of low latency and mobility of the Internet of Things(IoT) devices,but at the same time generating new data security and privacy protection problems.The Attribute-Based Encryption(ABE) technology in the traditional cloud computing is not suitable for the IoT devices with limited computing resources in the fog environment,and the attribute change is difficult to manage.Therefore,this paper proposes an ABE scheme that supports encryption and decryption outsourcing and revocation in fog computing.A three-layer system model of "cloud-fog-terminal" is constructed,and by introducing the technology of the attribute group key,the key is dynamically updated,thus the requirement of immediate cancellation of the attribute is satisfied.Some complicated encryption and decryption operations in the terminal device are outsourced to the fog node,which greatly improves the calculation efficiency.Experimental results show that the scheme has better computational efficiency and reliability than KeyGen and Enc schemes.https://www.ecice06.com/fileup/1000-3428/PDF/20200505.pdffog computing|attribute-based encryption(abe)|encryption and decryption outsourcing|attribute revocation|attribute group key|ciphertext policy |
| spellingShingle | HUANG Fengming, TU Shanshan, MENG Yuan Attribute-Based Encryption Scheme Supporting Outsourcing and Revocation in Fog Computing fog computing|attribute-based encryption(abe)|encryption and decryption outsourcing|attribute revocation|attribute group key|ciphertext policy |
| title | Attribute-Based Encryption Scheme Supporting Outsourcing and Revocation in Fog Computing |
| title_full | Attribute-Based Encryption Scheme Supporting Outsourcing and Revocation in Fog Computing |
| title_fullStr | Attribute-Based Encryption Scheme Supporting Outsourcing and Revocation in Fog Computing |
| title_full_unstemmed | Attribute-Based Encryption Scheme Supporting Outsourcing and Revocation in Fog Computing |
| title_short | Attribute-Based Encryption Scheme Supporting Outsourcing and Revocation in Fog Computing |
| title_sort | attribute based encryption scheme supporting outsourcing and revocation in fog computing |
| topic | fog computing|attribute-based encryption(abe)|encryption and decryption outsourcing|attribute revocation|attribute group key|ciphertext policy |
| url | https://www.ecice06.com/fileup/1000-3428/PDF/20200505.pdf |
| work_keys_str_mv | AT huangfengmingtushanshanmengyuan attributebasedencryptionschemesupportingoutsourcingandrevocationinfogcomputing |
