Fine-grained attribute update and outsourcing computing access control scheme in fog computing

To slove the problem that in the fog computing environment with comparatively high low latency demand, ciphertext policy attribute based encryption (CP-ABE) faced the problems of high encryption and decryption overhead and low efficiency of attribute update, an fine-grained attribute update and outs...

Full description

Bibliographic Details
Main Authors: Ruizhong DU, Peiwen YAN, Yan LIU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2021-03-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021063/
_version_ 1826874814362550272
author Ruizhong DU
Peiwen YAN
Yan LIU
author_facet Ruizhong DU
Peiwen YAN
Yan LIU
author_sort Ruizhong DU
collection DOAJ
description To slove the problem that in the fog computing environment with comparatively high low latency demand, ciphertext policy attribute based encryption (CP-ABE) faced the problems of high encryption and decryption overhead and low efficiency of attribute update, an fine-grained attribute update and outsourcing computing access control scheme in fog computing was proposed.The unanimous consent control by modular addition technique was used to construct an access control tree, and the computing operations of ecryption and decryption were outsourced to fog nodes in order to reduce user encryption and decryption overhead.Combined with the re-encryption mechanism, a group key binary tree was established at the fog node to re-encrypt the ciphertext so that user attribute can be updated flexibly.The security analysis shows that the proposed scheme is safe under the decision bilinear Diffie-Hellman hypothesis.Compared with other schemes, the results of simulation experiment prove that the time cost of user encryption and decryption in this scheme is lower and the efficiency of attribute update is higher.
first_indexed 2025-02-17T00:39:26Z
format Article
id doaj.art-2c2e52f50e1b49ac82b6bc64e94e11e9
institution Directory Open Access Journal
issn 1000-436X
language zho
last_indexed 2025-02-17T00:39:26Z
publishDate 2021-03-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj.art-2c2e52f50e1b49ac82b6bc64e94e11e92025-01-14T07:21:51ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2021-03-014216017059741026Fine-grained attribute update and outsourcing computing access control scheme in fog computingRuizhong DUPeiwen YANYan LIUTo slove the problem that in the fog computing environment with comparatively high low latency demand, ciphertext policy attribute based encryption (CP-ABE) faced the problems of high encryption and decryption overhead and low efficiency of attribute update, an fine-grained attribute update and outsourcing computing access control scheme in fog computing was proposed.The unanimous consent control by modular addition technique was used to construct an access control tree, and the computing operations of ecryption and decryption were outsourced to fog nodes in order to reduce user encryption and decryption overhead.Combined with the re-encryption mechanism, a group key binary tree was established at the fog node to re-encrypt the ciphertext so that user attribute can be updated flexibly.The security analysis shows that the proposed scheme is safe under the decision bilinear Diffie-Hellman hypothesis.Compared with other schemes, the results of simulation experiment prove that the time cost of user encryption and decryption in this scheme is lower and the efficiency of attribute update is higher.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021063/access controlfog computingoutsourcing computingattribute updateCP-ABE
spellingShingle Ruizhong DU
Peiwen YAN
Yan LIU
Fine-grained attribute update and outsourcing computing access control scheme in fog computing
Tongxin xuebao
access control
fog computing
outsourcing computing
attribute update
CP-ABE
title Fine-grained attribute update and outsourcing computing access control scheme in fog computing
title_full Fine-grained attribute update and outsourcing computing access control scheme in fog computing
title_fullStr Fine-grained attribute update and outsourcing computing access control scheme in fog computing
title_full_unstemmed Fine-grained attribute update and outsourcing computing access control scheme in fog computing
title_short Fine-grained attribute update and outsourcing computing access control scheme in fog computing
title_sort fine grained attribute update and outsourcing computing access control scheme in fog computing
topic access control
fog computing
outsourcing computing
attribute update
CP-ABE
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021063/
work_keys_str_mv AT ruizhongdu finegrainedattributeupdateandoutsourcingcomputingaccesscontrolschemeinfogcomputing
AT peiwenyan finegrainedattributeupdateandoutsourcingcomputingaccesscontrolschemeinfogcomputing
AT yanliu finegrainedattributeupdateandoutsourcingcomputingaccesscontrolschemeinfogcomputing