Fine-grained attribute update and outsourcing computing access control scheme in fog computing
To slove the problem that in the fog computing environment with comparatively high low latency demand, ciphertext policy attribute based encryption (CP-ABE) faced the problems of high encryption and decryption overhead and low efficiency of attribute update, an fine-grained attribute update and outs...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2021-03-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021063/ |
_version_ | 1826874814362550272 |
---|---|
author | Ruizhong DU Peiwen YAN Yan LIU |
author_facet | Ruizhong DU Peiwen YAN Yan LIU |
author_sort | Ruizhong DU |
collection | DOAJ |
description | To slove the problem that in the fog computing environment with comparatively high low latency demand, ciphertext policy attribute based encryption (CP-ABE) faced the problems of high encryption and decryption overhead and low efficiency of attribute update, an fine-grained attribute update and outsourcing computing access control scheme in fog computing was proposed.The unanimous consent control by modular addition technique was used to construct an access control tree, and the computing operations of ecryption and decryption were outsourced to fog nodes in order to reduce user encryption and decryption overhead.Combined with the re-encryption mechanism, a group key binary tree was established at the fog node to re-encrypt the ciphertext so that user attribute can be updated flexibly.The security analysis shows that the proposed scheme is safe under the decision bilinear Diffie-Hellman hypothesis.Compared with other schemes, the results of simulation experiment prove that the time cost of user encryption and decryption in this scheme is lower and the efficiency of attribute update is higher. |
first_indexed | 2025-02-17T00:39:26Z |
format | Article |
id | doaj.art-2c2e52f50e1b49ac82b6bc64e94e11e9 |
institution | Directory Open Access Journal |
issn | 1000-436X |
language | zho |
last_indexed | 2025-02-17T00:39:26Z |
publishDate | 2021-03-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj.art-2c2e52f50e1b49ac82b6bc64e94e11e92025-01-14T07:21:51ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2021-03-014216017059741026Fine-grained attribute update and outsourcing computing access control scheme in fog computingRuizhong DUPeiwen YANYan LIUTo slove the problem that in the fog computing environment with comparatively high low latency demand, ciphertext policy attribute based encryption (CP-ABE) faced the problems of high encryption and decryption overhead and low efficiency of attribute update, an fine-grained attribute update and outsourcing computing access control scheme in fog computing was proposed.The unanimous consent control by modular addition technique was used to construct an access control tree, and the computing operations of ecryption and decryption were outsourced to fog nodes in order to reduce user encryption and decryption overhead.Combined with the re-encryption mechanism, a group key binary tree was established at the fog node to re-encrypt the ciphertext so that user attribute can be updated flexibly.The security analysis shows that the proposed scheme is safe under the decision bilinear Diffie-Hellman hypothesis.Compared with other schemes, the results of simulation experiment prove that the time cost of user encryption and decryption in this scheme is lower and the efficiency of attribute update is higher.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021063/access controlfog computingoutsourcing computingattribute updateCP-ABE |
spellingShingle | Ruizhong DU Peiwen YAN Yan LIU Fine-grained attribute update and outsourcing computing access control scheme in fog computing Tongxin xuebao access control fog computing outsourcing computing attribute update CP-ABE |
title | Fine-grained attribute update and outsourcing computing access control scheme in fog computing |
title_full | Fine-grained attribute update and outsourcing computing access control scheme in fog computing |
title_fullStr | Fine-grained attribute update and outsourcing computing access control scheme in fog computing |
title_full_unstemmed | Fine-grained attribute update and outsourcing computing access control scheme in fog computing |
title_short | Fine-grained attribute update and outsourcing computing access control scheme in fog computing |
title_sort | fine grained attribute update and outsourcing computing access control scheme in fog computing |
topic | access control fog computing outsourcing computing attribute update CP-ABE |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021063/ |
work_keys_str_mv | AT ruizhongdu finegrainedattributeupdateandoutsourcingcomputingaccesscontrolschemeinfogcomputing AT peiwenyan finegrainedattributeupdateandoutsourcingcomputingaccesscontrolschemeinfogcomputing AT yanliu finegrainedattributeupdateandoutsourcingcomputingaccesscontrolschemeinfogcomputing |