A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
AbstractWith the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient. View Full-Text
Share & Cite This Article
Fan, K.; Wang, J.; Wang, X.; Li, H.; Yang, Y. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing. Sensors 2017, 17, 1695.
Fan K, Wang J, Wang X, Li H, Yang Y. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing. Sensors. 2017; 17(7):1695.Chicago/Turabian Style
Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang. 2017. "A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing." Sensors 17, no. 7: 1695.
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.