首页 | 本学科首页   官方微博 | 高级检索  
     

雾计算中用户和属性可撤销的访问控制方案
引用本文:王峥,李玲,李娜. 雾计算中用户和属性可撤销的访问控制方案[J]. 北京邮电大学学报, 2020, 43(6): 88-95. DOI: 10.13190/j.jbupt.2020-092
作者姓名:王峥  李玲  李娜
作者单位:1. 太原理工大学 信息与计算机学院, 晋中 030600;2. 国网山西省电力公司, 太原 030024
摘    要:雾计算中的属性基加密技术在解决数据细粒度访问控制问题的同时也带来了用户和属性的撤销问题,对此,提出一种用户和属性可撤销的访问控制方案.改进了现有的基于属性组撤销属性的访问控制方案,使其适用于雾计算,同时提高了密钥更新效率.另外,利用雾节点实现了用户的撤销,同时为了降低用户端的负担,将部分计算和存储开销从用户端转移到了临近的雾节点.基于判定双线性diffie-hellman (DBDH)假设的安全性分析结果表明,所提方案可以抵抗选择明文攻击.对方案进行了理论和实验,分析结果表明,所提方案具有较高的撤销效率和实用价值.

关 键 词:雾计算  访问控制  撤销  外包  属性基加密  
收稿时间:2020-07-17

Access Control Scheme Supporting Userand Attribute Revocation in Fog Computing
WANG Zheng,LI Ling,LI Na. Access Control Scheme Supporting Userand Attribute Revocation in Fog Computing[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(6): 88-95. DOI: 10.13190/j.jbupt.2020-092
Authors:WANG Zheng  LI Ling  LI Na
Affiliation:1. College of Information and Computer, Taiyuan University of Technology, Jinzhong 030600, China;2. State Grid Shanxi Electric Power Company, Taiyuan 030024, China
Abstract:In fog computing, attribute-based encryption technology not only solves the problem of fine-grained access control of data, but also brings the problem of user and attribute revocation. To solve this problem, an access control scheme that supports user and attribute revocation in fog computing is proposed. The proposed scheme improves the existing access control scheme based on attribute group revocation attributes, making it used in fog computing and improving the efficiency of key update. In addition, users can be revoked by fog nodes. In order to reduce the burden on the user side, part of the calculation overhead is transferred from the user side to the adjacent fog node. The security analysis based on the decisional bilinear diffie-hellman (DBDH) assumption shows that the proposed scheme can resist chosen plaintext attack. Finally, the scheme is analyzed in both theory and experiment. The analysis results show that the proposed scheme has high revocation efficiency and practical value.
Keywords:fog computing  access control  revocation  outsourcing  attribute-based encryption  
点击此处可从《北京邮电大学学报》浏览原始摘要信息
点击此处可从《北京邮电大学学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号