Journal on Communications ›› 2021, Vol. 42 ›› Issue (3): 160-170.doi: 10.11959/j.issn.1000-436x.2021063

• Papers • Previous Articles     Next Articles

Fine-grained attribute update and outsourcing computing access control scheme in fog computing

Ruizhong DU1,2, Peiwen YAN1, Yan LIU1   

  1. 1 School of Cyber Security and Computer, Hebei University, Baoding 071000, China
    2 Key Lab on High Trusted Information System in Hebei Province, Baoding 071000, China
  • Revised:2020-12-07 Online:2021-03-25 Published:2021-03-01
  • Supported by:
    The National Natural Science Foundation of China(61572170);The Natural Science Foundation of Hebei Province(F2018201153);The Key Project of Natural Science Foundation of Hebei Province(F2019201290)

Abstract:

To slove the problem that in the fog computing environment with comparatively high low latency demand, ciphertext policy attribute based encryption (CP-ABE) faced the problems of high encryption and decryption overhead and low efficiency of attribute update, an fine-grained attribute update and outsourcing computing access control scheme in fog computing was proposed.The unanimous consent control by modular addition technique was used to construct an access control tree, and the computing operations of ecryption and decryption were outsourced to fog nodes in order to reduce user encryption and decryption overhead.Combined with the re-encryption mechanism, a group key binary tree was established at the fog node to re-encrypt the ciphertext so that user attribute can be updated flexibly.The security analysis shows that the proposed scheme is safe under the decision bilinear Diffie-Hellman hypothesis.Compared with other schemes, the results of simulation experiment prove that the time cost of user encryption and decryption in this scheme is lower and the efficiency of attribute update is higher.

Key words: access control, fog computing, outsourcing computing, attribute update, CP-ABE

CLC Number: 

No Suggested Reading articles found!