| Literature DB >> 28629131 |
Min Xiao1, Jing Zhou2, Xuejiao Liu3, Mingda Jiang4.
Abstract
In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At present, there is little research on this issue. In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users. Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities simultaneously, and index ciphertext and data ciphertext are constructed based on a single ciphertext-policy attribute based encryption (CP-ABE) primitive and share the same key pair, thus the data access efficiency is significantly improved and the cost of key management is greatly reduced. Moreover, in the proposed scheme, the resource constrained end devices are allowed to rapidly assemble ciphertexts online and securely outsource most of decryption task to fog nodes, and mediated encryption mechanism is also adopted to achieve instantaneous user revocation instead of re-encrypting ciphertexts with many copies in many fog nodes. The security and the performance analysis show that our scheme is suitable for a fog computing environment.Entities:
Keywords: attribute-based encryption; cloud computing; fog computing; mediated encryption; online/offline encryption; searchable encryption
Year: 2017 PMID: 28629131 PMCID: PMC5492313 DOI: 10.3390/s17061423
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Comparison of related works.
| References | Single User | Multiple Users | Index Encryption | Data Encryption | Instantaneous User |
|---|---|---|---|---|---|
| Revocation | |||||
| [ | √ | √ | |||
| [ | √ | √ | |||
| [ | √ | √ | |||
| [ | √ | √ | √ | ||
| [ | √ | √ | |||
| [ | √ | √ | √ |
Figure 1System Model.
Asymptotic Complexity Comparison of System Initialization.
| Schemes | System Setup | User Register | Mediator Register |
|---|---|---|---|
| our scheme | |||
| ABKS_UR |
Figure 2(a) Time for system setup. (b) Time for user register.
Asymptotic Complexity Comparison of Data Outsourcing Process.
| Schemes | Secure Index Generation | Ciphertext Generation | ||
|---|---|---|---|---|
| Online | Offline | Online | Offline | |
| our scheme | ||||
| ABKS_UR | ||||
Figure 3(a) Secure index generation time for 10,000 items. (b) Online and offline data encryption time for 10,000 items.
Asymptotic Complexity Comparison of Data Search and Access Process.
| Schemes | Trapdoor Generation | Per-Index Search | Data Decryption | ||
|---|---|---|---|---|---|
| User | Fog Node | User | Fog Node | ||
| our scheme | |||||
| ABKS_UR | |||||
Figure 4(a) User-side time for trapdoor generation on an Android smartphone. (b) Time for per-index search. (c) Time for pre-decryption on fog node side and decryption on user side.