Skip to main content

A Fine-Grained Access Control Scheme in Fog-IoT Based Environment

  • Conference paper
  • First Online:
Advanced Intelligent Systems for Sustainable Development (AI2SD’2020) (AI2SD 2020)

Abstract

Fog computing becomes an essential part in IoT-based environment, it offers computing and storage resources at the edge of the network making applications and services more efficient. However, it belongs to a system loaded with security challenges and it is expected to help with its characteristics. On the other side, attribute based encryption is a rising solution that offers a fine-grained access control over encrypted data. Nonetheless, the calculation costs remains heavy and hard to be performed especially in a constrained environment. In this paper, we propose an access control scheme based on cipher-text policy attribute based encryption (CP-ABE) in an IoT- fog based environment by outsourcing the bulk of the calculation to the fog computing layer after a symmetric encryption performed by the devices. Moreover, we propose a verifiability mechanism and an attribute based key management scheme to maintain a fine-grained access control. The tests show that compared to other outsourcing schemes, the execution times on the IoT devices in our work are shorter and tolerable.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rahmani, A.M., et al.: Exploiting smart e-health gateways at the edge of healthcare Internet-of-Things: A fog computing approach. Futur. Gener. Comput. Syst. 1(78), 641–658 (2018)

    Article  Google Scholar 

  2. Hou, X., Li, Y., Chen, M., Wu, D., Jin, D., Chen, S.: Vehicular fog computing: a viewpoint of vehicles as the infrastructures. IEEE Trans. Veh. Technol. 65(6), 3860–3873 (2016)

    Article  Google Scholar 

  3. Al Faruque, M.A., Vatanparvar, K.: Energy management-as-a-service over fog computing platform. IEEE Internet Things J. 3(2), 161–169 (2015)

    Article  Google Scholar 

  4. Alrawais, A., Alhothaily, A., Hu, C., Xing, X., Cheng, X.: An attribute-based encryption scheme to secure fog communications. IEEE Access. 23(5), 9131–9138 (2017)

    Article  Google Scholar 

  5. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) Advances in Cryptology – EUROCRYPT 2005, pp. 457–473. Springer Berlin Heidelberg, Berlin, Heidelberg (2005). https://doi.org/10.1007/11426639_27

    Chapter  Google Scholar 

  6. Li, J., Chen, X., Li, J., Jia, C., Ma, J., Lou, W.: Fine-grained access control system based on outsourced attribute-based encryption. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) Computer Security – ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 592–609. Springer Berlin Heidelberg, Berlin, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40203-6_33

    Chapter  Google Scholar 

  7. Lai, J., Deng, R.H., Guan, C., Weng, J.: Attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 8(8), 1343–1354 (2013)

    Article  Google Scholar 

  8. Li, J., Huang, X., Li, J., Chen, X., Xiang, Y.: Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25(8), 2201–2210 (2013)

    Article  Google Scholar 

  9. Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 22(7), 1214–1221 (2010)

    Article  Google Scholar 

  10. Xu, Q., Tan, C., Fan, Z., Zhu, W., Xiao, Y., Cheng, F.: Secure data access control for fog computing based on multi-authority attribute-based signcryption with computation outsourcing and attribute revocation. Sensors 18(5), 1609 (2018)

    Article  Google Scholar 

  11. Miao, Y., Ma, J., Liu, X., Weng, J., Li, H., Li, H.: Lightweight fine-grained search over encrypted data in fog computing. IEEE Trans. Serv. Comput. 12(5), 772–785 (2019). https://doi.org/10.1109/TSC.2018.2823309

    Article  Google Scholar 

  12. Lounis, A., Hadjidj, A., Bouabdallah, A., Challal, Y.: Healing on the cloud: secure cloud architecture for medical wireless sensor networks. Futur. Gener. Comput. Syst. 1(55), 266–277 (2016)

    Article  Google Scholar 

  13. Qin, B., Deng, R.H., Liu, S., Ma, S.: Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 10(7), 1384–1393 (2015)

    Article  Google Scholar 

  14. Li, J., Sha, F., Zhang, Y., Huang, X., Shen, J.: Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length. Secur. Commun. Netw. 2017, 1–11 (2017). https://doi.org/10.1155/2017/3596205

    Article  Google Scholar 

  15. Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of abe ciphertexts. In: USENIX Security Symposium, vol. 2011, no. 3, 8 August 2011

    Google Scholar 

  16. Ning, J., Cao, Z., Dong, X., Liang, K., Ma, H., Wei, L.: Auditable $\sigma $-time outsourced attribute-based encryption for access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 13(1), 94–105 (2017)

    Article  Google Scholar 

  17. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007) pp. 321–334. IEEE, 20, May 2007

    Google Scholar 

  18. Huang, Q., Yang, Y., Wang, L.: Secure data access control with ciphertext update and computation outsourcing in fog computing for Internet of Things. IEEE Access 14(5), 12941–12950 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Saddek Derki .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Derki, M.S., Taboudjemat-Nouali, N., Nouali, O. (2022). A Fine-Grained Access Control Scheme in Fog-IoT Based Environment. In: Kacprzyk, J., Balas, V.E., Ezziyyani, M. (eds) Advanced Intelligent Systems for Sustainable Development (AI2SD’2020). AI2SD 2020. Advances in Intelligent Systems and Computing, vol 1418. Springer, Cham. https://doi.org/10.1007/978-3-030-90639-9_38

Download citation

Publish with us

Policies and ethics