通信学报 ›› 2021, Vol. 42 ›› Issue (8): 139-150.doi: 10.11959/j.issn.1000-436x.2021162

• 学术论文 • 上一篇    下一篇

雾计算中基于无配对CP-ABE可验证的访问控制方案

董江涛1, 闫沛文2, 杜瑞忠2   

  1. 1 中国电子科技集团公司第五十四研究所,河北 石家庄 050081
    2 河北大学网络空间安全与计算机学院,河北 保定 071002
  • 修回日期:2021-08-06 出版日期:2021-08-25 发布日期:2021-08-01
  • 作者简介:董江涛(1981- ),男,河北石家庄人,中国电子科技集团公司第五十四研究所高级工程师,主要研究方向为航天地面运控应用
    闫沛文(1994- ),男,河北张家口人,河北大学硕士生,主要研究方向为信息安全、访问控制、雾计算等
    杜瑞忠(1975- ),男,河北保定人,博士,河北大学教授、博士生导师,主要研究方向为可信计算、信息安全等
  • 基金资助:
    国家自然科学基金资助项目(61572170);河北省自然科学基金资助项目(F2018201153);河北省自然科学基金重点资助项目(F2019201290)

Verifiable access control scheme based on unpaired CP-ABE in fog computing

Jiangtao DONG1, Peiwen YAN2, Ruizhong DU2   

  1. 1 The 54th Research Institute of CETC, Shijiazhuang 050081, China
    2 School of Cyber Security and Computer, Hebei University, Baoding 071002, China
  • Revised:2021-08-06 Online:2021-08-25 Published:2021-08-01
  • Supported by:
    The National Natural Science Foundation of China(61572170);The Natural Science Foundation of Hebei Province(F2018201153);Key Project of Natural Science Foundation of Hebei Province(F2019201290)

摘要:

雾计算将计算能力和数据分析应用扩展至网络边缘,解决了云计算的时延问题,也为数据的安全性带来新的挑战。基于密文策略的属性加密(CP-ABE)是保证数据机密性与细粒度访问控制的技术,其中双线性配对的计算开销过大制约了其应用与发展。针对此,提出了一种雾计算中基于无配对CP-ABE可验证的访问控制方案,为了使CP-ABE更加高效,使用椭圆曲线加密中的简单标量乘法代替双线性配对,从而减少总体计算开销;将解密操作外包给雾节点来降低用户计算复杂度,根据区块链防篡改可溯源的特性实现了对访问事务的正确性验证并记录访问授权过程。安全性与性能分析表明,所提方案在椭圆曲线的决策DBDH假设下是安全的,且计算效率更高。

关键词: 访问控制, 雾计算, 基于密文策略属性加密, 椭圆曲线加密

Abstract:

Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality and fine-grained access control.The excessive computational overhead of bilinear pairing restricts its application and development.In response to this, a verifiable access control scheme was proposed based on unpaired CP-ABE in fog computing.In order to make CP-ABE more efficient, simple scalar multiplication in elliptic curve encryption was used to replace bilinear pairing, thereby reducing the overall computational overhead.Decryption operations were outsourced to fog nodes to reduce user computational complexity, and based on the tamper-proof and traceable characteristics of the blockchain, the correctness of the access transaction was verified and the access authorization process was recorded.Security and performance analysis shows that the scheme is safe under the elliptic curve decision-making DBDH (Diffie-Hellman) assumption, and the calculation efficiency is higher.

Key words: access control, fog computing, CP-ABE, elliptic curve cryptography

中图分类号: 

No Suggested Reading articles found!