Next Article in Journal
A Novel Dual Separate Paths (DSP) Algorithm Providing Fault-Tolerant Communication for Wireless Sensor Networks
Next Article in Special Issue
Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems
Previous Article in Journal
The Role of Heart-Rate Variability Parameters in Activity Recognition and Energy-Expenditure Estimation Using Wearable Sensors
Previous Article in Special Issue
A Fine-Grained and Privacy-Preserving Query Scheme for Fog Computing-Enhanced Location-Based Service
Article Menu
Issue 7 (July) cover image

Export Article

Open AccessArticle
Sensors 2017, 17(7), 1695; https://doi.org/10.3390/s17071695

A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing

1
State Key Laboratory of Integrated Service Networks, Xidian University, Xi’an 710071, China
2
Key Laboratory of the Ministry of Education for Wide Band-Gap Semiconductor Materials and Devices, Xidian University, Xi’an 710071, China
*
Author to whom correspondence should be addressed.
Received: 31 May 2017 / Revised: 19 July 2017 / Accepted: 21 July 2017 / Published: 24 July 2017
(This article belongs to the Special Issue Security and Privacy Challenges in Emerging Fog Computing)
View Full-Text   |   Download PDF [1781 KB, uploaded 24 July 2017]   |  

Abstract

With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient. View Full-Text
Keywords: fog computing; cloud computing; access control; attribute-based encryption; verifiable outsource; revocation fog computing; cloud computing; access control; attribute-based encryption; verifiable outsource; revocation
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Fan, K.; Wang, J.; Wang, X.; Li, H.; Yang, Y. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing. Sensors 2017, 17, 1695.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top