Attribute-Based Encryption Scheme Supporting Outsourcing and Revocation in Fog Computing

Fog computing extends the computing power and data analysis applications of cloud computing to the edge of the network,meeting the requirements of low latency and mobility of the Internet of Things(IoT) devices,but at the same time generating new data security and privacy protection problems.The Att...

Full description

Bibliographic Details
Published in:Jisuanji gongcheng
Main Author: HUANG Fengming, TU Shanshan, MENG Yuan
Format: Article
Language:English
Published: Editorial Office of Computer Engineering 2020-05-01
Subjects:
Online Access:https://www.ecice06.com/fileup/1000-3428/PDF/20200505.pdf
_version_ 1848649751946330112
author HUANG Fengming, TU Shanshan, MENG Yuan
author_facet HUANG Fengming, TU Shanshan, MENG Yuan
author_sort HUANG Fengming, TU Shanshan, MENG Yuan
collection DOAJ
container_title Jisuanji gongcheng
description Fog computing extends the computing power and data analysis applications of cloud computing to the edge of the network,meeting the requirements of low latency and mobility of the Internet of Things(IoT) devices,but at the same time generating new data security and privacy protection problems.The Attribute-Based Encryption(ABE) technology in the traditional cloud computing is not suitable for the IoT devices with limited computing resources in the fog environment,and the attribute change is difficult to manage.Therefore,this paper proposes an ABE scheme that supports encryption and decryption outsourcing and revocation in fog computing.A three-layer system model of "cloud-fog-terminal" is constructed,and by introducing the technology of the attribute group key,the key is dynamically updated,thus the requirement of immediate cancellation of the attribute is satisfied.Some complicated encryption and decryption operations in the terminal device are outsourced to the fog node,which greatly improves the calculation efficiency.Experimental results show that the scheme has better computational efficiency and reliability than KeyGen and Enc schemes.
format Article
id doaj-85483de8994747a0abeaceaf2dc2c136
institution Directory of Open Access Journals
issn 1000-3428
language English
publishDate 2020-05-01
publisher Editorial Office of Computer Engineering
record_format Article
spelling doaj-85483de8994747a0abeaceaf2dc2c1362025-11-03T05:52:49ZengEditorial Office of Computer EngineeringJisuanji gongcheng1000-34282020-05-01465344010.19678/j.issn.1000-3428.0055025Attribute-Based Encryption Scheme Supporting Outsourcing and Revocation in Fog ComputingHUANG Fengming, TU Shanshan, MENG Yuan0Department of Information, Beijing University of Technology, Beijing 100124, ChinaFog computing extends the computing power and data analysis applications of cloud computing to the edge of the network,meeting the requirements of low latency and mobility of the Internet of Things(IoT) devices,but at the same time generating new data security and privacy protection problems.The Attribute-Based Encryption(ABE) technology in the traditional cloud computing is not suitable for the IoT devices with limited computing resources in the fog environment,and the attribute change is difficult to manage.Therefore,this paper proposes an ABE scheme that supports encryption and decryption outsourcing and revocation in fog computing.A three-layer system model of "cloud-fog-terminal" is constructed,and by introducing the technology of the attribute group key,the key is dynamically updated,thus the requirement of immediate cancellation of the attribute is satisfied.Some complicated encryption and decryption operations in the terminal device are outsourced to the fog node,which greatly improves the calculation efficiency.Experimental results show that the scheme has better computational efficiency and reliability than KeyGen and Enc schemes.https://www.ecice06.com/fileup/1000-3428/PDF/20200505.pdffog computing|attribute-based encryption(abe)|encryption and decryption outsourcing|attribute revocation|attribute group key|ciphertext policy
spellingShingle HUANG Fengming, TU Shanshan, MENG Yuan
Attribute-Based Encryption Scheme Supporting Outsourcing and Revocation in Fog Computing
fog computing|attribute-based encryption(abe)|encryption and decryption outsourcing|attribute revocation|attribute group key|ciphertext policy
title Attribute-Based Encryption Scheme Supporting Outsourcing and Revocation in Fog Computing
title_full Attribute-Based Encryption Scheme Supporting Outsourcing and Revocation in Fog Computing
title_fullStr Attribute-Based Encryption Scheme Supporting Outsourcing and Revocation in Fog Computing
title_full_unstemmed Attribute-Based Encryption Scheme Supporting Outsourcing and Revocation in Fog Computing
title_short Attribute-Based Encryption Scheme Supporting Outsourcing and Revocation in Fog Computing
title_sort attribute based encryption scheme supporting outsourcing and revocation in fog computing
topic fog computing|attribute-based encryption(abe)|encryption and decryption outsourcing|attribute revocation|attribute group key|ciphertext policy
url https://www.ecice06.com/fileup/1000-3428/PDF/20200505.pdf
work_keys_str_mv AT huangfengmingtushanshanmengyuan attributebasedencryptionschemesupportingoutsourcingandrevocationinfogcomputing