Abstract
As an emerging and efficient paradigm for multimedia systems, fog networking has attracted widespread attention over the last few years. However, an increasing number of attacks in the current virtualized environments underlines the importance of secure data sharing. Unfortunately, existing multimedia data sharing schemes are not suitable for the networking systems because of the heavy computational operations, latency-sensitive service, and resource-limited devices. Additionally, authenticated and secure communications are crucial issues related to privacy and trust. In this paper, we propose a secure and efficient data sharing scheme with the computation outsourcing capability in a fog networking system by employing ciphertext-policy attribute-based encryption. The scheme supports dynamic policy updating and delegates attribute revocation processes to the cloud and fog by proxy re-encryption. In particular, we build a secure communication protocol for the revocation parameter transmission. We adopt a chaotic map to generate a one-time key, by which the revocation parameters are encrypted. Then, to ensure legal user accessing to the system, we establish a privacy-preserving communication architecture between the user and cloud, which provides authentication. In addition, our scheme provides a verifiable auditing service for the decryption key and shared file, thus ensuring its correctness. Finally, we analyze the security of the scheme, evaluate its performance, and compare it with related works.
Similar content being viewed by others
Data availability
All data used to support the findings of this study are available from the corresponding author upon request.
References
Wang, W., Wang, Q., Sohraby, K.: Multimedia Sensing as a Service (MSaaS): exploring resource saving potentials of at cloud-edge IoT and fogs. IEEE Int. Things J. 4(2), 487–495 (2017)
Rahman, M., Hossain, M., Hassanain, E., Muhammad, G.: Semantic multimedia fog computing and IoT environment: sustainability perspective. IEEE Commun. Mag. 56(5), 80–87 (2018)
Ni, J., Zhang, K., Lin, X., Shen, X.: Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun. Surv. Tutorials 20(1), 601–628 (2018)
Zhang, P., Zhou, M., Fortino, G.: Security and trust issues in Fog computing: A survey. Future Generation Computer Systems 88(1), 16–27 (2018)
Hassan, A., Hamza, R., Yan, H., Li, P.: An efficient outsourced privacy preserving machine learning scheme with public verifiability. IEEE Access 7, 146322–146330 (2019)
Hamza, R., Yan, Z., Muhammad, K., Bellavista, P., Titouna, F.: A privacy-preserving cryptosystem for IoT E-healthcare. Inf. Sci. (2019). https://doi.org/10.1016/j.ins.2019.01.070
Hamza, R., Hassan, A., Patil, A.S.: A lightweight secure IoT surveillance framework based on DCT-DFRT algorithms. Int. Conf. Mach. Learn. Cyber Secur. 2019, 271–278 (2019)
Malek, B., Miri, A.: Combining attribute-based and access systems. Proc. Comput. Sci. Eng. 2009, 305–312 (2009)
Wan, Z., Liu, J., Deng, R.: HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 7(2), 743–754 (2012)
Teng, W., Yang, G., Xiang, Y., Zhang, T., Wang, D.: Attribute-based access control with constant-size ciphertext in cloud computing. IEEE Trans. Cloud Comput. 5(4), 617–627 (2017)
Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, pp. 53–70 (2011)
Riad, K., Hamza, R., Yan, H.: Sensitive and energetic IoT access control for managing cloud electronic health records. IEEE Access 7, 86384–86393 (2019)
Salonikias, S., Mavridis, I., Gritzalis, D.: Access control issues in utilizing fog computing for transport infrastructure. Proc. Crit. Inf. Infrastruct. Secur. 2015, 15–26 (2015)
Zaghdoudi, B., Ayed, H., Harizi, W.: Generic access control system for ad hoc MCC and fog computing. Proc. Cryptol. Netw. Secur. 2016, 400–415 (2016)
Yang, K., Jia, X., Ren, K., Xie, R., Huang, L.: Enabling efficient access control with dynamic policy updating for big data in the cloud. IEEE INFOCOM 2014, 2013–2021 (2014)
Alrawais, A., Alhothaily, A., Hu, C., Xing, X., Cheng, X.: An attribute-based encryption scheme to secure fog communications. IEEE Access 5, 9131–9138 (2018)
Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: Proceedings of the 20th USENIX conference on Security, pp. 34–50 (2011)
Xia, Y., Chen, W., Liu, X., Zhang, L., Li, X., Xiang, Y.: Adaptive multimedia data forwarding for privacy preservation in vehicular ad-hoc networks. IEEE Trans. Intell. Transp. Syst. 18(10), 2629–2641 (2017)
Fan, K., Wang, J., Wang, X., Li, H., Yang, Y.: Secure, efficient and revocable data sharing scheme for vehicular fogs. Peer-to-Peer Netw. Appl. 11(4), 766–777 (2018)
Hohenberger, S., Waters, B.: Online/offline attribute-based encryption. In: Proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, pp. 293–310 (2014)
Zhang, P., Liu, J., Liang, K., Liu, H.: An efficient access control scheme with outsourcing capability and attribute update for fog computing. Fut. Gener. Comput. Syst. 78(2), 753–762 (2018)
Huang, Q., Yang, Y., Wang, L.: Secure data access control with ciphertext update and computation outsourcing in fog computing for Internet of Things. IEEE Access 5, 12941–12950 (2017)
Fan, K., Wang, J., Wang, X.: A secure and verifiable outsourced access control scheme in fog-cloud computing. Sensors 17, 1695 (2017)
Cheng, Z., Zhang, J., Qian, H., Xiang, M., Wu, D.: A privacy-preserving access control scheme with verifiable and outsourcing capabilities in fog-cloud computing. Proc. Intl. Conf. Algorithms Arch Parallel Process. 2019, 345–358 (2019)
Xue, K., Hong, J., Ma, Y., Wei, D., Hong, P., Yu, N.: Fog-aided verifiable privacy preserving access control for latency-sensitive data sharing in vehicular cloud computing. IEEE Netw. 32(3), 7–13 (2018)
Fan, K., Liu, T., Zhang, K.: A secure and efficient outsourced computation on data sharing scheme for privacy computing. J. Parallel Distrib. Comput. 135, 169–176 (2020)
Pirretti, M., Traynor, P., Mcdaniel, P., Waters, B.: Secure attribute-based systems. J. Comput. Secur. 18(5), 799–837 (2010)
Yu, S., Wang, C., Ren, K., Lou, W. Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM Symposium on Information, pp. 261–270 (2010)
Wang, H., Peng, Y.: A CP-ABE access control scheme based on proxy re-encryption in cloud storage. Proc. Cloud Comput. Secur. 2018, 413–425 (2018)
Naruse, T., Mohri, M., Shiraishi, Y.: Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating. Human-Centric Comput. Inf. Sci. 5(8), 1–13 (2015)
Cao, Z., Tarasov, V., Raman, H.P., Hildebrand, D., Zadok, E.: On the performance variation in modern storage stacks. In: Proceedings of the 15th Usenix Conference on File and Storage Technologies, pp. 329–343 (2017)
Hiremath, S., Kunte, S. A novel data auditing approach to achieve data privacy and data integrity in cloud computing. In: Proceedings of the 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques, pp. 306–310 (2017)
The pairing-based cryptography library. https://crypto.stanford.edu/pbc/. Accessed 13 March 2018
Acknowledgements
This work was supported by the National Natural Science Foundation of China [Grant Numbers 61572263, 61272084, 61972209], The Natural Science Foundation of the Jiangsu Higher Education Institutions of China [Grant Numbers 11KJA520002].
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that there is no conflict of interest regarding the publication of this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Tu, Y., Yang, G., Wang, J. et al. A secure, efficient and verifiable multimedia data sharing scheme in fog networking system. Cluster Comput 24, 225–247 (2021). https://doi.org/10.1007/s10586-020-03101-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-020-03101-6