当前位置: X-MOL 学术Secur. Commun. Netw. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Practical Multiauthority Attribute-Based Access Control for Edge-Cloud-Aided Internet of Things
Security and Communication Networks ( IF 1.968 ) Pub Date : 2021-02-02 , DOI: 10.1155/2021/8872699
Kaiqing Huang 1, 2 , Xueli Wang 2 , Zhiqiang Lin 3
Affiliation  

With the assistance of edge computing which reduces the heavy burden of the cloud center server by using the network edge servers, the Internet of Things (IoTs) architectures enable low latency for real-time devices and applications. However, there still exist security challenges on data access control for the IoT. Multiauthority attribute-based encryption (MA-ABE) is a promising technique to achieve access control over encrypted data in cross-domain applications. Based on the characteristics and technical requirements of the IoT, we propose an efficient fine-grained revocable large universe multiauthority access control scheme. In the proposed scheme, the most expensive encryption operations have been executed in the user’s initialization phase by adding a reusable ciphertext pool besides splitting the encryption algorithm to online encryption and offline encryption. Massive decryption operations are outsourced to the near-edge servers for reducing the computation overhead of decryption. An efficient revocation mechanism is designed to change users’ access privileges dynamically. Moreover, the scheme supports ciphertext verification. Only valid ciphertext can be stored and transmitted, which saves system resources. With the help of the chameleon hash function, the proposed scheme is proven CCA2-secure under the q-DPBDHE2 assumption. The performance analysis results indicate that the proposed scheme is efficient and suitable in edge computing for the IoT.

中文翻译:

实用的基于多权限属性的边缘云辅助物联网访问控制

借助边缘计算的帮助,该边缘计算通过使用网络边缘服务器减轻了云中心服务器的沉重负担,物联网(IoT)体系结构为实时设备和应用程序提供了低延迟。但是,物联网的数据访问控制仍然存在安全挑战。基于多权限属性的加密(MA-ABE)是一种有前途的技术,可以在跨域应用程序中实现对加密数据的访问控制。根据物联网的特点和技术要求,我们提出了一种高效的细粒度可撤消的大宇宙多权限访问控制方案。在建议的方案中,除了将加密算法分为在线加密和离线加密之外,最昂贵的加密操作已在用户的初始化阶段通过添加可重用的密文池来执行。将大量解密操作外包给近端服务器,以减少解密的计算开销。一种有效的撤销机制旨在动态更改用户的访问权限。此外,该方案支持密文验证。只能存储和传输有效的密文,从而节省了系统资源。借助变色龙哈希函数,在q-DPBDHE2假设下,该方案被证明是CCA2安全的。性能分析结果表明,该方案是有效的,适用于物联网的边缘计算。大量解密操作外包给了近端服务器,以减少解密的计算开销。一种有效的撤销机制旨在动态更改用户的访问权限。此外,该方案支持密文验证。只能存储和传输有效的密文,从而节省了系统资源。借助变色龙哈希函数,在q-DPBDHE2假设下,该方案被证明是CCA2安全的。性能分析结果表明,该方案是有效的,适用于物联网的边缘计算。将大量解密操作外包给近端服务器,以减少解密的计算开销。一种有效的撤销机制旨在动态更改用户的访问权限。此外,该方案支持密文验证。只能存储和传输有效的密文,从而节省了系统资源。借助变色龙哈希函数,在q-DPBDHE2假设下,该方案被证明是CCA2安全的。性能分析结果表明,该方案是有效的,适用于物联网的边缘计算。只能存储和传输有效的密文,从而节省了系统资源。借助变色龙哈希函数,在q-DPBDHE2假设下,该方案被证明是CCA2安全的。性能分析结果表明,该方案是有效的,适用于物联网的边缘计算。只能存储和传输有效的密文,从而节省了系统资源。借助变色龙哈希函数,在q-DPBDHE2假设下,该方案被证明是CCA2安全的。性能分析结果表明,该方案是有效的,适用于物联网的边缘计算。
更新日期:2021-02-02
down
wechat
bug