Skip to main content
Log in

A secure, efficient and verifiable multimedia data sharing scheme in fog networking system

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

As an emerging and efficient paradigm for multimedia systems, fog networking has attracted widespread attention over the last few years. However, an increasing number of attacks in the current virtualized environments underlines the importance of secure data sharing. Unfortunately, existing multimedia data sharing schemes are not suitable for the networking systems because of the heavy computational operations, latency-sensitive service, and resource-limited devices. Additionally, authenticated and secure communications are crucial issues related to privacy and trust. In this paper, we propose a secure and efficient data sharing scheme with the computation outsourcing capability in a fog networking system by employing ciphertext-policy attribute-based encryption. The scheme supports dynamic policy updating and delegates attribute revocation processes to the cloud and fog by proxy re-encryption. In particular, we build a secure communication protocol for the revocation parameter transmission. We adopt a chaotic map to generate a one-time key, by which the revocation parameters are encrypted. Then, to ensure legal user accessing to the system, we establish a privacy-preserving communication architecture between the user and cloud, which provides authentication. In addition, our scheme provides a verifiable auditing service for the decryption key and shared file, thus ensuring its correctness. Finally, we analyze the security of the scheme, evaluate its performance, and compare it with related works.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data availability

All data used to support the findings of this study are available from the corresponding author upon request.

References

  1. Wang, W., Wang, Q., Sohraby, K.: Multimedia Sensing as a Service (MSaaS): exploring resource saving potentials of at cloud-edge IoT and fogs. IEEE Int. Things J. 4(2), 487–495 (2017)

    Google Scholar 

  2. Rahman, M., Hossain, M., Hassanain, E., Muhammad, G.: Semantic multimedia fog computing and IoT environment: sustainability perspective. IEEE Commun. Mag. 56(5), 80–87 (2018)

    Article  Google Scholar 

  3. Ni, J., Zhang, K., Lin, X., Shen, X.: Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun. Surv. Tutorials 20(1), 601–628 (2018)

    Article  Google Scholar 

  4. Zhang, P., Zhou, M., Fortino, G.: Security and trust issues in Fog computing: A survey. Future Generation Computer Systems 88(1), 16–27 (2018)

    Google Scholar 

  5. Hassan, A., Hamza, R., Yan, H., Li, P.: An efficient outsourced privacy preserving machine learning scheme with public verifiability. IEEE Access 7, 146322–146330 (2019)

    Article  Google Scholar 

  6. Hamza, R., Yan, Z., Muhammad, K., Bellavista, P., Titouna, F.: A privacy-preserving cryptosystem for IoT E-healthcare. Inf. Sci. (2019). https://doi.org/10.1016/j.ins.2019.01.070

    Article  Google Scholar 

  7. Hamza, R., Hassan, A., Patil, A.S.: A lightweight secure IoT surveillance framework based on DCT-DFRT algorithms. Int. Conf. Mach. Learn. Cyber Secur. 2019, 271–278 (2019)

    Article  Google Scholar 

  8. Malek, B., Miri, A.: Combining attribute-based and access systems. Proc. Comput. Sci. Eng. 2009, 305–312 (2009)

    Google Scholar 

  9. Wan, Z., Liu, J., Deng, R.: HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 7(2), 743–754 (2012)

    Article  Google Scholar 

  10. Teng, W., Yang, G., Xiang, Y., Zhang, T., Wang, D.: Attribute-based access control with constant-size ciphertext in cloud computing. IEEE Trans. Cloud Comput. 5(4), 617–627 (2017)

    Article  Google Scholar 

  11. Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, pp. 53–70 (2011)

  12. Riad, K., Hamza, R., Yan, H.: Sensitive and energetic IoT access control for managing cloud electronic health records. IEEE Access 7, 86384–86393 (2019)

    Article  Google Scholar 

  13. Salonikias, S., Mavridis, I., Gritzalis, D.: Access control issues in utilizing fog computing for transport infrastructure. Proc. Crit. Inf. Infrastruct. Secur. 2015, 15–26 (2015)

    Google Scholar 

  14. Zaghdoudi, B., Ayed, H., Harizi, W.: Generic access control system for ad hoc MCC and fog computing. Proc. Cryptol. Netw. Secur. 2016, 400–415 (2016)

    Article  Google Scholar 

  15. Yang, K., Jia, X., Ren, K., Xie, R., Huang, L.: Enabling efficient access control with dynamic policy updating for big data in the cloud. IEEE INFOCOM 2014, 2013–2021 (2014)

    Google Scholar 

  16. Alrawais, A., Alhothaily, A., Hu, C., Xing, X., Cheng, X.: An attribute-based encryption scheme to secure fog communications. IEEE Access 5, 9131–9138 (2018)

    Article  Google Scholar 

  17. Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: Proceedings of the 20th USENIX conference on Security, pp. 34–50 (2011)

  18. Xia, Y., Chen, W., Liu, X., Zhang, L., Li, X., Xiang, Y.: Adaptive multimedia data forwarding for privacy preservation in vehicular ad-hoc networks. IEEE Trans. Intell. Transp. Syst. 18(10), 2629–2641 (2017)

    Article  Google Scholar 

  19. Fan, K., Wang, J., Wang, X., Li, H., Yang, Y.: Secure, efficient and revocable data sharing scheme for vehicular fogs. Peer-to-Peer Netw. Appl. 11(4), 766–777 (2018)

    Article  Google Scholar 

  20. Hohenberger, S., Waters, B.: Online/offline attribute-based encryption. In: Proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, pp. 293–310 (2014)

  21. Zhang, P., Liu, J., Liang, K., Liu, H.: An efficient access control scheme with outsourcing capability and attribute update for fog computing. Fut. Gener. Comput. Syst. 78(2), 753–762 (2018)

    Article  Google Scholar 

  22. Huang, Q., Yang, Y., Wang, L.: Secure data access control with ciphertext update and computation outsourcing in fog computing for Internet of Things. IEEE Access 5, 12941–12950 (2017)

    Article  Google Scholar 

  23. Fan, K., Wang, J., Wang, X.: A secure and verifiable outsourced access control scheme in fog-cloud computing. Sensors 17, 1695 (2017)

    Article  Google Scholar 

  24. Cheng, Z., Zhang, J., Qian, H., Xiang, M., Wu, D.: A privacy-preserving access control scheme with verifiable and outsourcing capabilities in fog-cloud computing. Proc. Intl. Conf. Algorithms Arch Parallel Process. 2019, 345–358 (2019)

    Google Scholar 

  25. Xue, K., Hong, J., Ma, Y., Wei, D., Hong, P., Yu, N.: Fog-aided verifiable privacy preserving access control for latency-sensitive data sharing in vehicular cloud computing. IEEE Netw. 32(3), 7–13 (2018)

    Article  Google Scholar 

  26. Fan, K., Liu, T., Zhang, K.: A secure and efficient outsourced computation on data sharing scheme for privacy computing. J. Parallel Distrib. Comput. 135, 169–176 (2020)

    Article  Google Scholar 

  27. Pirretti, M., Traynor, P., Mcdaniel, P., Waters, B.: Secure attribute-based systems. J. Comput. Secur. 18(5), 799–837 (2010)

    Article  Google Scholar 

  28. Yu, S., Wang, C., Ren, K., Lou, W. Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM Symposium on Information, pp. 261–270 (2010)

  29. Wang, H., Peng, Y.: A CP-ABE access control scheme based on proxy re-encryption in cloud storage. Proc. Cloud Comput. Secur. 2018, 413–425 (2018)

    Article  Google Scholar 

  30. Naruse, T., Mohri, M., Shiraishi, Y.: Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating. Human-Centric Comput. Inf. Sci. 5(8), 1–13 (2015)

    Google Scholar 

  31. Cao, Z., Tarasov, V., Raman, H.P., Hildebrand, D., Zadok, E.: On the performance variation in modern storage stacks. In: Proceedings of the 15th Usenix Conference on File and Storage Technologies, pp. 329–343 (2017)

  32. Hiremath, S., Kunte, S. A novel data auditing approach to achieve data privacy and data integrity in cloud computing. In: Proceedings of the 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques, pp. 306–310 (2017)

  33. The pairing-based cryptography library. https://crypto.stanford.edu/pbc/. Accessed 13 March 2018

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China [Grant Numbers 61572263, 61272084, 61972209], The Natural Science Foundation of the Jiangsu Higher Education Institutions of China [Grant Numbers 11KJA520002].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuanfei Tu.

Ethics declarations

Conflict of interest

The authors declare that there is no conflict of interest regarding the publication of this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tu, Y., Yang, G., Wang, J. et al. A secure, efficient and verifiable multimedia data sharing scheme in fog networking system. Cluster Comput 24, 225–247 (2021). https://doi.org/10.1007/s10586-020-03101-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-020-03101-6

Keywords

Navigation