Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Journal of Beijing University of Posts and Telecommunications ›› 2020, Vol. 43 ›› Issue (6): 88-95.doi: 10.13190/j.jbupt.2020-092

• PAPERS • Previous Articles     Next Articles

Access Control Scheme Supporting Userand Attribute Revocation in Fog Computing

WANG Zheng1, LI Ling1, LI Na2   

  1. 1. College of Information and Computer, Taiyuan University of Technology, Jinzhong 030600, China;
    2. State Grid Shanxi Electric Power Company, Taiyuan 030024, China
  • Received:2020-07-17 Online:2020-12-28 Published:2020-11-30

Abstract: In fog computing, attribute-based encryption technology not only solves the problem of fine-grained access control of data, but also brings the problem of user and attribute revocation. To solve this problem, an access control scheme that supports user and attribute revocation in fog computing is proposed. The proposed scheme improves the existing access control scheme based on attribute group revocation attributes, making it used in fog computing and improving the efficiency of key update. In addition, users can be revoked by fog nodes. In order to reduce the burden on the user side, part of the calculation overhead is transferred from the user side to the adjacent fog node. The security analysis based on the decisional bilinear diffie-hellman (DBDH) assumption shows that the proposed scheme can resist chosen plaintext attack. Finally, the scheme is analyzed in both theory and experiment. The analysis results show that the proposed scheme has high revocation efficiency and practical value.

Key words: fog computing, access control, revocation, outsourcing, attribute-based encryption

CLC Number: