Verifiable access control scheme based on unpaired CP-ABE in fog computing

Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality an...

Full description

Saved in:
Bibliographic Details
Main Authors: Jiangtao DONG, Peiwen YAN, Ruizhong DU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2021-08-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021162/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539293710909440
author Jiangtao DONG
Peiwen YAN
Ruizhong DU
author_facet Jiangtao DONG
Peiwen YAN
Ruizhong DU
author_sort Jiangtao DONG
collection DOAJ
description Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality and fine-grained access control.The excessive computational overhead of bilinear pairing restricts its application and development.In response to this, a verifiable access control scheme was proposed based on unpaired CP-ABE in fog computing.In order to make CP-ABE more efficient, simple scalar multiplication in elliptic curve encryption was used to replace bilinear pairing, thereby reducing the overall computational overhead.Decryption operations were outsourced to fog nodes to reduce user computational complexity, and based on the tamper-proof and traceable characteristics of the blockchain, the correctness of the access transaction was verified and the access authorization process was recorded.Security and performance analysis shows that the scheme is safe under the elliptic curve decision-making DBDH (Diffie-Hellman) assumption, and the calculation efficiency is higher.
format Article
id doaj-art-9ed06302639c4ea2bd3484004650b6d1
institution Kabale University
issn 1000-436X
language zho
publishDate 2021-08-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-9ed06302639c4ea2bd3484004650b6d12025-01-14T07:22:22ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2021-08-014213915059743523Verifiable access control scheme based on unpaired CP-ABE in fog computingJiangtao DONGPeiwen YANRuizhong DUFog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality and fine-grained access control.The excessive computational overhead of bilinear pairing restricts its application and development.In response to this, a verifiable access control scheme was proposed based on unpaired CP-ABE in fog computing.In order to make CP-ABE more efficient, simple scalar multiplication in elliptic curve encryption was used to replace bilinear pairing, thereby reducing the overall computational overhead.Decryption operations were outsourced to fog nodes to reduce user computational complexity, and based on the tamper-proof and traceable characteristics of the blockchain, the correctness of the access transaction was verified and the access authorization process was recorded.Security and performance analysis shows that the scheme is safe under the elliptic curve decision-making DBDH (Diffie-Hellman) assumption, and the calculation efficiency is higher.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021162/access controlfog computingCP-ABEelliptic curve cryptography
spellingShingle Jiangtao DONG
Peiwen YAN
Ruizhong DU
Verifiable access control scheme based on unpaired CP-ABE in fog computing
Tongxin xuebao
access control
fog computing
CP-ABE
elliptic curve cryptography
title Verifiable access control scheme based on unpaired CP-ABE in fog computing
title_full Verifiable access control scheme based on unpaired CP-ABE in fog computing
title_fullStr Verifiable access control scheme based on unpaired CP-ABE in fog computing
title_full_unstemmed Verifiable access control scheme based on unpaired CP-ABE in fog computing
title_short Verifiable access control scheme based on unpaired CP-ABE in fog computing
title_sort verifiable access control scheme based on unpaired cp abe in fog computing
topic access control
fog computing
CP-ABE
elliptic curve cryptography
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021162/
work_keys_str_mv AT jiangtaodong verifiableaccesscontrolschemebasedonunpairedcpabeinfogcomputing
AT peiwenyan verifiableaccesscontrolschemebasedonunpairedcpabeinfogcomputing
AT ruizhongdu verifiableaccesscontrolschemebasedonunpairedcpabeinfogcomputing