| Literature DB >> 28737733 |
Kai Fan1, Junxiong Wang2, Xin Wang3, Hui Li4, Yintang Yang5.
Abstract
With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.Entities:
Keywords: access control; attribute-based encryption; cloud computing; fog computing; revocation; verifiable outsource
Year: 2017 PMID: 28737733 PMCID: PMC5551097 DOI: 10.3390/s17071695
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576