• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Tu, Shanshan (Tu, Shanshan.) | Waqas, Muhammad (Waqas, Muhammad.) | Huang, Fengming (Huang, Fengming.) | Abbas, Ghulam (Abbas, Ghulam.) | Abbas, Ziaul Haq (Abbas, Ziaul Haq.)

Indexed by:

EI Scopus SCIE

Abstract:

Fog computing is a revolutionary technology for the next generation to bridge the gap between cloud data centers and end-users. Fog computing is not a counterfeit for cloud computing but a persuasive counterpart. It also accredits by utilizing the network edge while still rendering the possibility to interact with the cloud. Nevertheless, the features of fog computing are encountering several security challenges. The security of end-users and/or fog servers brings a significant dilemma in implementing fog computing. Moreover, in conventional cloud computing, the attribute-based encryption (ABE) technology is not appropriate for end users due to restricted computing resources, i.e., limited resources, high end-to-end delay, and transmission capability. Hence, the revocation and outsourcing mechanisms become inappropriate between end-users and cloud servers. In this regard, this paper recommends a multi-authority attribute-based encryption (MA-ABE) technique to support revocation and outsource the attributes to fog computation. We present an attribute revocation scheme based on cipher-text attribute-based encryption by introducing the attribute group keys. In this process, the secret keys are dynamically altered and realized the requirement of immediate attribute revocations. Hence, we provide the complete encryption and decryption process for end-users and fog servers based on multi-authority, attribute revocation, and outsourcing computation, while most of the existing scheme lack to incorporate all these parameters. Our scheme also outsources the complicated encryption and decryption tasks to the fog server that significantly improves the overall computation efficiency compared to the state-of-the-art work.

Keyword:

Attribute revocation Mobile fog computing Multi-authority attribute-based encryption

Author Community:

  • [ 1 ] [Tu, Shanshan]Beijing Univ Technol, Fac Informat Technol, Engn Res Ctr Intelligent Percept & Autonomous Con, Beijing 100124, Peoples R China
  • [ 2 ] [Waqas, Muhammad]Beijing Univ Technol, Fac Informat Technol, Engn Res Ctr Intelligent Percept & Autonomous Con, Beijing 100124, Peoples R China
  • [ 3 ] [Huang, Fengming]Beijing Univ Technol, Fac Informat Technol, Engn Res Ctr Intelligent Percept & Autonomous Con, Beijing 100124, Peoples R China
  • [ 4 ] [Waqas, Muhammad]Ghulam Ishaq Khan Inst Engn Sci & Technol, Fac Comp Sci & Engn, Topi 23460, Pakistan
  • [ 5 ] [Abbas, Ghulam]Ghulam Ishaq Khan Inst Engn Sci & Technol, Fac Comp Sci & Engn, Topi 23460, Pakistan
  • [ 6 ] [Abbas, Ziaul Haq]Ghulam Ishaq Khan Inst Engn Sci & Technol, Fac Elect Engn, Topi 23460, Pakistan

Reprint Author's Address:

  • [Huang, Fengming]Beijing Univ Technol, Fac Informat Technol, Engn Res Ctr Intelligent Percept & Autonomous Con, Beijing 100124, Peoples R China

Show more details

Related Keywords:

Source :

COMPUTER NETWORKS

ISSN: 1389-1286

Year: 2021

Volume: 195

5 . 6 0 0

JCR@2022

ESI Discipline: COMPUTER SCIENCE;

ESI HC Threshold:87

JCR Journal Grade:1

Cited Count:

WoS CC Cited Count: 44

SCOPUS Cited Count: 64

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 4

Online/Total:752/10689596
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.