Distributed Access Control with Outsourced Computation in Fog Computing
Title | Distributed Access Control with Outsourced Computation in Fog Computing |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Wang, Qihua, Lv, Gaoyan, Sun, Xiuling |
Conference Name | 2019 Chinese Control And Decision Conference (CCDC) |
Date Published | jun |
Keywords | Access Control, attribute based-encryption, Big Data, big data transmission, cloud computing, computational complexity, Computational efficiency, cryptography, data storage, distributed access control, distributed processing, edge computing, Encryption, fine-grained access control, Fog Computing, Fog Computing and Security, fog device, Internet of Things, IoT, network terminal devices, outsourced computation, performance evaluation, pubcrawl, Resiliency, Scalability, security, security of data, traditional cloud computing |
Abstract | With the rapid development of Internet of things (IOT) and big data, the number of network terminal devices and big data transmission are increasing rapidly. Traditional cloud computing faces a great challenge in dealing with this massive amount of data. Fog computing which extends the computing at the edge of the network can provide computation and data storage. Attribute based-encryption can effectively achieve the fine-grained access control. However, the computational complexity of the encryption and decryption is growing linearly with the increase of the number of attributes. In order to reduce the computational cost and guarantee the confidentiality of data, distributed access control with outsourced computation in fog computing is proposed in this paper. In our proposed scheme, fog device takes most of computational cost in encryption and decryption phase. The computational cost of the receiver and sender can be reduced. Moreover, the private key of the user is generated by multi-authority which can enhance the security of data. The analysis of security and performance shows that our proposed scheme proves to be effective and secure. |
DOI | 10.1109/CCDC.2019.8833012 |
Citation Key | wang_distributed_2019 |
- encryption
- traditional cloud computing
- security of data
- Scalability
- Resiliency
- pubcrawl
- performance evaluation
- outsourced computation
- network terminal devices
- IoT
- Internet of Things
- fog device
- Fog Computing and Security
- fine-grained access control
- Fog computing
- edge computing
- distributed processing
- distributed access control
- data storage
- Cryptography
- Computational efficiency
- computational complexity
- Cloud Computing
- big data transmission
- Big Data
- attribute based-encryption
- Access Control
- security