Journal on Communications ›› 2021, Vol. 42 ›› Issue (8): 139-150.doi: 10.11959/j.issn.1000-436x.2021162

• Papers • Previous Articles     Next Articles

Verifiable access control scheme based on unpaired CP-ABE in fog computing

Jiangtao DONG1, Peiwen YAN2, Ruizhong DU2   

  1. 1 The 54th Research Institute of CETC, Shijiazhuang 050081, China
    2 School of Cyber Security and Computer, Hebei University, Baoding 071002, China
  • Revised:2021-08-06 Online:2021-08-25 Published:2021-08-01
  • Supported by:
    The National Natural Science Foundation of China(61572170);The Natural Science Foundation of Hebei Province(F2018201153);Key Project of Natural Science Foundation of Hebei Province(F2019201290)

Abstract:

Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality and fine-grained access control.The excessive computational overhead of bilinear pairing restricts its application and development.In response to this, a verifiable access control scheme was proposed based on unpaired CP-ABE in fog computing.In order to make CP-ABE more efficient, simple scalar multiplication in elliptic curve encryption was used to replace bilinear pairing, thereby reducing the overall computational overhead.Decryption operations were outsourced to fog nodes to reduce user computational complexity, and based on the tamper-proof and traceable characteristics of the blockchain, the correctness of the access transaction was verified and the access authorization process was recorded.Security and performance analysis shows that the scheme is safe under the elliptic curve decision-making DBDH (Diffie-Hellman) assumption, and the calculation efficiency is higher.

Key words: access control, fog computing, CP-ABE, elliptic curve cryptography

CLC Number: 

No Suggested Reading articles found!