通信学报 ›› 2021, Vol. 42 ›› Issue (3): 160-170.doi: 10.11959/j.issn.1000-436x.2021063

• 学术论文 • 上一篇    下一篇

雾计算中细粒度属性更新的外包计算访问控制方案

杜瑞忠1,2, 闫沛文1, 刘妍1   

  1. 1 河北大学网络空间安全与计算机学院,河北 保定 071000
    2 河北省高可信信息系统重点实验室,河北 保定 071000
  • 修回日期:2020-12-07 出版日期:2021-03-25 发布日期:2021-03-01
  • 作者简介:杜瑞忠(1975- ),男,河北献县人,博士,河北大学教授、博士生导师,主要研究方向为可信计算、信息安全等。
    闫沛文(1994- ),男,河北张家口人,河北大学硕士生,主要研究方向为信息安全、访问控制、雾计算等。
    刘妍(1994- ),女,河北保定人,河北大学硕士生,主要研究方向为网络安全、物联网安全、边缘计算等。
  • 基金资助:
    国家自然科学基金资助项目(61572170);河北省自然科学基金资助项目(F2018201153);河北省自然科学基金重点资助项目(F2019201290)

Fine-grained attribute update and outsourcing computing access control scheme in fog computing

Ruizhong DU1,2, Peiwen YAN1, Yan LIU1   

  1. 1 School of Cyber Security and Computer, Hebei University, Baoding 071000, China
    2 Key Lab on High Trusted Information System in Hebei Province, Baoding 071000, China
  • Revised:2020-12-07 Online:2021-03-25 Published:2021-03-01
  • Supported by:
    The National Natural Science Foundation of China(61572170);The Natural Science Foundation of Hebei Province(F2018201153);The Key Project of Natural Science Foundation of Hebei Province(F2019201290)

摘要:

针对基于密文策略的属性加密(CP-ABE)在低时延需求较高的雾计算环境中,存在加解密开销大、属性更新效率低的问题,提出了一种雾计算中细粒度属性更新的外包计算访问控制方案,使用模加法一致性秘密(密钥)分享技术构建访问控制树,将加解密计算操作外包给雾节点,降低用户加解密开销;结合重加密机制,在雾节点建立组密钥二叉树对密文进行重加密,实现对用户属性的灵活更新。安全性分析表明,所提方案在决策双线性 Diffie-Hellman 假设下是安全的。仿真实验结果表明,所提方案中用户加解密时间开销相比其他方案更小,属性更新效率更高。

关键词: 访问控制, 雾计算, 外包计算, 属性更新, 基于密文策略属性加密

Abstract:

To slove the problem that in the fog computing environment with comparatively high low latency demand, ciphertext policy attribute based encryption (CP-ABE) faced the problems of high encryption and decryption overhead and low efficiency of attribute update, an fine-grained attribute update and outsourcing computing access control scheme in fog computing was proposed.The unanimous consent control by modular addition technique was used to construct an access control tree, and the computing operations of ecryption and decryption were outsourced to fog nodes in order to reduce user encryption and decryption overhead.Combined with the re-encryption mechanism, a group key binary tree was established at the fog node to re-encrypt the ciphertext so that user attribute can be updated flexibly.The security analysis shows that the proposed scheme is safe under the decision bilinear Diffie-Hellman hypothesis.Compared with other schemes, the results of simulation experiment prove that the time cost of user encryption and decryption in this scheme is lower and the efficiency of attribute update is higher.

Key words: access control, fog computing, outsourcing computing, attribute update, CP-ABE

中图分类号: 

No Suggested Reading articles found!