Next Article in Journal
A Framework of Covariance Projection on Constraint Manifold for Data Fusion
Next Article in Special Issue
Influence of Different Coupling Modes on the Robustness of Smart Grid under Targeted Attack
Previous Article in Journal
Determination of the Maximum Temperature in a Non-Uniform Hot Zone by Line-of-Site Absorption Spectroscopy with a Single Diode Laser
Previous Article in Special Issue
Trusted Operations on Sensor Data
Article Menu
Issue 5 (May) cover image

Export Article

Open AccessArticle
Sensors 2018, 18(5), 1609; https://doi.org/10.3390/s18051609

Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation

Department of Computer Science and Technology, Tongji University, Cao An Highway, Shanghai 201804, China
*
Author to whom correspondence should be addressed.
Received: 23 April 2018 / Revised: 15 May 2018 / Accepted: 16 May 2018 / Published: 17 May 2018
(This article belongs to the Special Issue Security in IoT Enabled Sensors)
View Full-Text   |   Download PDF [4672 KB, uploaded 22 May 2018]   |  

Abstract

Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional “encrypt-then-sign” or “sign-then-encrypt” strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation. View Full-Text
Keywords: Internet of Things; fog computing; Attribute Based Signcryption; multi-authority; access control; anonymous authentication Internet of Things; fog computing; Attribute Based Signcryption; multi-authority; access control; anonymous authentication
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Xu, Q.; Tan, C.; Fan, Z.; Zhu, W.; Xiao, Y.; Cheng, F. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation. Sensors 2018, 18, 1609.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top