Abstract
Fog computing becomes an essential part in IoT-based environment, it offers computing and storage resources at the edge of the network making applications and services more efficient. However, it belongs to a system loaded with security challenges and it is expected to help with its characteristics. On the other side, attribute based encryption is a rising solution that offers a fine-grained access control over encrypted data. Nonetheless, the calculation costs remains heavy and hard to be performed especially in a constrained environment. In this paper, we propose an access control scheme based on cipher-text policy attribute based encryption (CP-ABE) in an IoT- fog based environment by outsourcing the bulk of the calculation to the fog computing layer after a symmetric encryption performed by the devices. Moreover, we propose a verifiability mechanism and an attribute based key management scheme to maintain a fine-grained access control. The tests show that compared to other outsourcing schemes, the execution times on the IoT devices in our work are shorter and tolerable.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rahmani, A.M., et al.: Exploiting smart e-health gateways at the edge of healthcare Internet-of-Things: A fog computing approach. Futur. Gener. Comput. Syst. 1(78), 641–658 (2018)
Hou, X., Li, Y., Chen, M., Wu, D., Jin, D., Chen, S.: Vehicular fog computing: a viewpoint of vehicles as the infrastructures. IEEE Trans. Veh. Technol. 65(6), 3860–3873 (2016)
Al Faruque, M.A., Vatanparvar, K.: Energy management-as-a-service over fog computing platform. IEEE Internet Things J. 3(2), 161–169 (2015)
Alrawais, A., Alhothaily, A., Hu, C., Xing, X., Cheng, X.: An attribute-based encryption scheme to secure fog communications. IEEE Access. 23(5), 9131–9138 (2017)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) Advances in Cryptology – EUROCRYPT 2005, pp. 457–473. Springer Berlin Heidelberg, Berlin, Heidelberg (2005). https://doi.org/10.1007/11426639_27
Li, J., Chen, X., Li, J., Jia, C., Ma, J., Lou, W.: Fine-grained access control system based on outsourced attribute-based encryption. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) Computer Security – ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 592–609. Springer Berlin Heidelberg, Berlin, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40203-6_33
Lai, J., Deng, R.H., Guan, C., Weng, J.: Attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 8(8), 1343–1354 (2013)
Li, J., Huang, X., Li, J., Chen, X., Xiang, Y.: Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25(8), 2201–2210 (2013)
Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 22(7), 1214–1221 (2010)
Xu, Q., Tan, C., Fan, Z., Zhu, W., Xiao, Y., Cheng, F.: Secure data access control for fog computing based on multi-authority attribute-based signcryption with computation outsourcing and attribute revocation. Sensors 18(5), 1609 (2018)
Miao, Y., Ma, J., Liu, X., Weng, J., Li, H., Li, H.: Lightweight fine-grained search over encrypted data in fog computing. IEEE Trans. Serv. Comput. 12(5), 772–785 (2019). https://doi.org/10.1109/TSC.2018.2823309
Lounis, A., Hadjidj, A., Bouabdallah, A., Challal, Y.: Healing on the cloud: secure cloud architecture for medical wireless sensor networks. Futur. Gener. Comput. Syst. 1(55), 266–277 (2016)
Qin, B., Deng, R.H., Liu, S., Ma, S.: Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 10(7), 1384–1393 (2015)
Li, J., Sha, F., Zhang, Y., Huang, X., Shen, J.: Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length. Secur. Commun. Netw. 2017, 1–11 (2017). https://doi.org/10.1155/2017/3596205
Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of abe ciphertexts. In: USENIX Security Symposium, vol. 2011, no. 3, 8 August 2011
Ning, J., Cao, Z., Dong, X., Liang, K., Ma, H., Wei, L.: Auditable $\sigma $-time outsourced attribute-based encryption for access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 13(1), 94–105 (2017)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007) pp. 321–334. IEEE, 20, May 2007
Huang, Q., Yang, Y., Wang, L.: Secure data access control with ciphertext update and computation outsourcing in fog computing for Internet of Things. IEEE Access 14(5), 12941–12950 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Derki, M.S., Taboudjemat-Nouali, N., Nouali, O. (2022). A Fine-Grained Access Control Scheme in Fog-IoT Based Environment. In: Kacprzyk, J., Balas, V.E., Ezziyyani, M. (eds) Advanced Intelligent Systems for Sustainable Development (AI2SD’2020). AI2SD 2020. Advances in Intelligent Systems and Computing, vol 1418. Springer, Cham. https://doi.org/10.1007/978-3-030-90639-9_38
Download citation
DOI: https://doi.org/10.1007/978-3-030-90639-9_38
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-90638-2
Online ISBN: 978-3-030-90639-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)