A secure and verifiable outsourced access control scheme in fog-cloud computing

72Citations
Citations of this article
53Readers
Mendeley users who have this article in their library.

Abstract

With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.

Cite

CITATION STYLE

APA

Fan, K., Wang, J., Wang, X., Li, H., & Yang, Y. (2017). A secure and verifiable outsourced access control scheme in fog-cloud computing. Sensors (Switzerland), 17(7). https://doi.org/10.3390/s17071695

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free