北京邮电大学学报

  • EI核心期刊

北京邮电大学学报 ›› 2020, Vol. 43 ›› Issue (6): 88-95.doi: 10.13190/j.jbupt.2020-092

• 论文 • 上一篇    下一篇

雾计算中用户和属性可撤销的访问控制方案

王峥1, 李玲1, 李娜2   

  1. 1. 太原理工大学 信息与计算机学院, 晋中 030600;
    2. 国网山西省电力公司, 太原 030024
  • 收稿日期:2020-07-17 出版日期:2020-12-28 发布日期:2020-11-30
  • 通讯作者: 李玲(1996-),女,硕士生,E-mail:liling_li_ling@163.com. E-mail:liling_li_ling@163.com
  • 作者简介:王峥(1974-),男,讲师.

Access Control Scheme Supporting Userand Attribute Revocation in Fog Computing

WANG Zheng1, LI Ling1, LI Na2   

  1. 1. College of Information and Computer, Taiyuan University of Technology, Jinzhong 030600, China;
    2. State Grid Shanxi Electric Power Company, Taiyuan 030024, China
  • Received:2020-07-17 Online:2020-12-28 Published:2020-11-30

摘要: 雾计算中的属性基加密技术在解决数据细粒度访问控制问题的同时也带来了用户和属性的撤销问题,对此,提出一种用户和属性可撤销的访问控制方案.改进了现有的基于属性组撤销属性的访问控制方案,使其适用于雾计算,同时提高了密钥更新效率.另外,利用雾节点实现了用户的撤销,同时为了降低用户端的负担,将部分计算和存储开销从用户端转移到了临近的雾节点.基于判定双线性diffie-hellman (DBDH)假设的安全性分析结果表明,所提方案可以抵抗选择明文攻击.对方案进行了理论和实验,分析结果表明,所提方案具有较高的撤销效率和实用价值.

关键词: 雾计算, 访问控制, 撤销, 外包, 属性基加密

Abstract: In fog computing, attribute-based encryption technology not only solves the problem of fine-grained access control of data, but also brings the problem of user and attribute revocation. To solve this problem, an access control scheme that supports user and attribute revocation in fog computing is proposed. The proposed scheme improves the existing access control scheme based on attribute group revocation attributes, making it used in fog computing and improving the efficiency of key update. In addition, users can be revoked by fog nodes. In order to reduce the burden on the user side, part of the calculation overhead is transferred from the user side to the adjacent fog node. The security analysis based on the decisional bilinear diffie-hellman (DBDH) assumption shows that the proposed scheme can resist chosen plaintext attack. Finally, the scheme is analyzed in both theory and experiment. The analysis results show that the proposed scheme has high revocation efficiency and practical value.

Key words: fog computing, access control, revocation, outsourcing, attribute-based encryption

中图分类号: