University of Surrey

Test tubes in the lab Research in the ATI Dance Research

An efficient access control scheme with outsourcing capability and attribute update for fog computing

Zhang, Peng, Chen, Zehong, Liu, Joseph K, Liang, Kaitai and Liu, Hongwei (2016) An efficient access control scheme with outsourcing capability and attribute update for fog computing Future Generation Computer Systems, 78 (2). pp. 753-762.

Full text not available from this repository.

Abstract

Fog computing as an extension of cloud computing provides computation, storage and application services to end users. Ciphertext-policy attribute-based encryption (CP-ABE) is a well-known cryptographic technology for guaranteeing data confidentiality and fine-grained data access control. It enables data owners to define flexible access policy for data sharing. However, in CP-ABE systems, the problems of the time required to encrypt, decrypt and attribute update are long-standing unsolved in the literature. In this paper, we propose the first access control (CP-ABE) scheme supporting outsourcing capability and attribute update for fog computing. Specifically, the heavy computation operations of encryption and decryption are outsourced to fog nodes, thus the computation operations for data owners to encrypt and users to decrypt are irrelevant to the number of attributes in the access structure and secret keys, respectively. The cost brought by attribute update is efficient in the sense that we only concentrate on the update of the ciphertext associated with the corresponding updated attribute. The security analysis shows that the proposed scheme is secure under the decisional bilinear Diffie–Hellman assumption. The proposed scheme is efficient, and the time of encryption for data owners and decryption for users are small and constant. The computational ability of fog nodes are fully utilizing during the access control, so the tiny computing cost is left to end users with resource-constrained devices.

Item Type: Article
Divisions : Faculty of Engineering and Physical Sciences > Computing Science
Authors :
NameEmailORCID
Zhang, PengUNSPECIFIEDUNSPECIFIED
Chen, ZehongUNSPECIFIEDUNSPECIFIED
Liu, Joseph KUNSPECIFIEDUNSPECIFIED
Liang, Kaitaik.liang@surrey.ac.ukUNSPECIFIED
Liu, HongweiUNSPECIFIEDUNSPECIFIED
Date : 11 December 2016
Identification Number : 10.1016/j.future.2016.12.015
Copyright Disclaimer : © 2016 Elsevier B.V. All rights reserved
Uncontrolled Keywords : Fog computing; Access control; Attribute-based encryption; Outsourcing capability; Attribute update
Depositing User : Karen Garland
Date Deposited : 08 Nov 2017 14:20
Last Modified : 08 Nov 2017 14:20
URI: http://epubs.surrey.ac.uk/id/eprint/844863

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year


Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800