4.5 Article

PAC-FIT: An efficient privacy preserving access control scheme for fog-enabled IoT

期刊

出版社

ELSEVIER
DOI: 10.1016/j.suscom.2021.100527

关键词

IoT; Fog computing; Cloud computing; Access control; Outsourcing; Attribute-based encryption; Attribute revocation; Attribute addition; Key-escrow resistance

向作者/读者索取更多资源

This paper proposes a CP-ABE scheme named PAC-FIT that supports key-escrow resistance, attribute revocation, and attribute addition features. Additionally, expensive encryption and decryption operations are outsourced to fog nodes, reducing computational overhead for resource constrained IoT devices. Attribute revocation and addition tasks are also outsourced to third parties efficiently.
With the proliferation of data produced by IoT devices, a new paradigm called fog computing has developed that allows processing and analysis of data at the edge. Together with fog, cloud computing co-exists for purposes such as enormous storage, processing resources, etc. However, storage and computation of data at various levels increase the risk of data privacy. Therefore, an access control mechanism is necessary for the fog-cloud framework in an IoT environment. Ciphertext-policy attribute-based encryption (CP-ABE) is a well-known cryptographic mechanism that provides confidentiality and fine-grained access control. Unfortunately, the existing CPABE schemes are not well suited for the cloud-fog-IoT environment as they do not provide the following functionalities together: key-escrow resistance, attribute revocation, attribute addition, and outsourcing of expensive operations. Therefore, this paper proposes a CP-ABE scheme named PAC-FIT that supports key-escrow resistance, attribute revocation, and attribute addition features. Additionally, the expensive encryption and decryption operations are outsourced to fog nodes, which greatly reduces the computational overhead from resource constrained IoT devices. Further, the tasks of attribute revocation and addition are also outsourced to third parties. The cost incurred during attribute revocation and addition are efficient as only those key components and ciphertexts are updated, which are associated with revoked or added attributes. Meanwhile, unlike existing CP-ABE schemes, the user holds a constant size secret key, which remains unchanged throughout. The security analysis proves that PAC-FIT is secure against Chosen-Plaintext Attack under Decisional Bilinear Diffie-Hellman assumption. The performance analysis shows that PAC-FIT is efficient and suitable for IoT devices.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据