• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Tu, Shanshan (Tu, Shanshan.) | Waqas, Muhammad (Waqas, Muhammad.) | Huang, Fengming (Huang, Fengming.) | Abbas, Ghulam (Abbas, Ghulam.) | Abbas, Ziaul Haq (Abbas, Ziaul Haq.)

收录:

EI Scopus SCIE

摘要:

Fog computing is a revolutionary technology for the next generation to bridge the gap between cloud data centers and end-users. Fog computing is not a counterfeit for cloud computing but a persuasive counterpart. It also accredits by utilizing the network edge while still rendering the possibility to interact with the cloud. Nevertheless, the features of fog computing are encountering several security challenges. The security of end-users and/or fog servers brings a significant dilemma in implementing fog computing. Moreover, in conventional cloud computing, the attribute-based encryption (ABE) technology is not appropriate for end users due to restricted computing resources, i.e., limited resources, high end-to-end delay, and transmission capability. Hence, the revocation and outsourcing mechanisms become inappropriate between end-users and cloud servers. In this regard, this paper recommends a multi-authority attribute-based encryption (MA-ABE) technique to support revocation and outsource the attributes to fog computation. We present an attribute revocation scheme based on cipher-text attribute-based encryption by introducing the attribute group keys. In this process, the secret keys are dynamically altered and realized the requirement of immediate attribute revocations. Hence, we provide the complete encryption and decryption process for end-users and fog servers based on multi-authority, attribute revocation, and outsourcing computation, while most of the existing scheme lack to incorporate all these parameters. Our scheme also outsources the complicated encryption and decryption tasks to the fog server that significantly improves the overall computation efficiency compared to the state-of-the-art work.

关键词:

Attribute revocation Mobile fog computing Multi-authority attribute-based encryption

作者机构:

  • [ 1 ] [Tu, Shanshan]Beijing Univ Technol, Fac Informat Technol, Engn Res Ctr Intelligent Percept & Autonomous Con, Beijing 100124, Peoples R China
  • [ 2 ] [Waqas, Muhammad]Beijing Univ Technol, Fac Informat Technol, Engn Res Ctr Intelligent Percept & Autonomous Con, Beijing 100124, Peoples R China
  • [ 3 ] [Huang, Fengming]Beijing Univ Technol, Fac Informat Technol, Engn Res Ctr Intelligent Percept & Autonomous Con, Beijing 100124, Peoples R China
  • [ 4 ] [Waqas, Muhammad]Ghulam Ishaq Khan Inst Engn Sci & Technol, Fac Comp Sci & Engn, Topi 23460, Pakistan
  • [ 5 ] [Abbas, Ghulam]Ghulam Ishaq Khan Inst Engn Sci & Technol, Fac Comp Sci & Engn, Topi 23460, Pakistan
  • [ 6 ] [Abbas, Ziaul Haq]Ghulam Ishaq Khan Inst Engn Sci & Technol, Fac Elect Engn, Topi 23460, Pakistan

通讯作者信息:

  • [Huang, Fengming]Beijing Univ Technol, Fac Informat Technol, Engn Res Ctr Intelligent Percept & Autonomous Con, Beijing 100124, Peoples R China

查看成果更多字段

相关关键词:

来源 :

COMPUTER NETWORKS

ISSN: 1389-1286

年份: 2021

卷: 195

5 . 6 0 0

JCR@2022

ESI学科: COMPUTER SCIENCE;

ESI高被引阀值:87

JCR分区:1

被引次数:

WoS核心集被引频次: 39

SCOPUS被引频次: 56

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 2

归属院系:

在线人数/总访问数:1117/3892536
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司