A Secure Data Access Control Scheme Without Bilinear Pairing in Edge Computing

Edge computing, as an extension of cloud computing, subcontracts the personal private data to edge nodes on the edge network of Internet of Things (IoT) to decrease transmission delay and network congestion. So, a major security concern in edge computing is access control issues for shared data. In this paper we introduce a scheme without bilinear pairing encryption (Un-BPE) to provide access control in edge and cloud communication. To achieve confidentiality, verifiability and access control, the secret key is generated by Key Trust Authority (KTA), end users and edge node together, and saved in cloud platform; the operations of verification are performed by the adjacent edge node; and the operations of encryption and decryption are performed by the terminal device. We verify the efficiency of our scheme in terms of the security of the encryption algorithm and the performance of the system. The analysis of the proposed scheme reveals better computational efficiency.

[1]  Shuzhen Xu,et al.  Resource Scheduling Based on Improved Spectral Clustering Algorithm in Edge Computing , 2018, Sci. Program..

[2]  Duncan S. Wong,et al.  Secure Outsourced Attribute-Based Signatures , 2014, IEEE Transactions on Parallel and Distributed Systems.

[3]  Zhipeng Cai,et al.  Task Scheduling in Deadline-Aware Mobile Edge Computing Systems , 2019, IEEE Internet of Things Journal.

[4]  T. Tuuva,et al.  Measurement of the inclusive tt¯$$ \mathrm{t}\overline{\mathrm{t}} $$ cross section in pp collisions at s=5.02$$ \sqrt{s}=5.02 $$ TeV using final states with at least one charged lepton , 2017 .

[5]  David Hutchison,et al.  The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog From a Security and Resilience Perspective , 2017, IEEE Journal on Selected Areas in Communications.

[6]  Hokeun Kim,et al.  Authentication and Authorization for the Internet of Things , 2017, IT Professional.

[7]  Yixian Yang,et al.  Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things , 2017, IEEE Access.

[8]  Siu Loon Hoe,et al.  Defining a smart nation: the case of Singapore , 2016, J. Inf. Commun. Ethics Soc..

[9]  Donghyun Kim,et al.  On security and privacy issues of fog computing supported Internet of Things environment , 2015, 2015 6th International Conference on the Network of the Future (NOF).

[10]  Bing Chen,et al.  Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues , 2018, IEEE Access.

[11]  Jiguo Li,et al.  Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing , 2017, IEEE Transactions on Services Computing.

[12]  Zhipeng Cai,et al.  A Private and Efficient Mechanism for Data Uploading in Smart Cyber-Physical Systems , 2020, IEEE Transactions on Network Science and Engineering.

[13]  Fagen Li,et al.  Certificateless hybrid signcryption , 2013, Math. Comput. Model..

[14]  Benjamin Philip Nachman,et al.  Bisection-based asymmetric MT2 computation: a higher precision calculator than existing symmetric methods , 2014, Journal of High Energy Physics.

[15]  Keke Gai,et al.  Blend Arithmetic Operations on Tensor-Based Fully Homomorphic Encryption Over Real Numbers , 2018, IEEE Transactions on Industrial Informatics.

[16]  Jian Shen,et al.  Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices , 2017, Soft Comput..

[17]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[18]  Arwa Alrawais,et al.  Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.

[19]  Ying-Hao Hung,et al.  Efficient Anonymous Multireceiver Certificateless Encryption , 2017, IEEE Systems Journal.

[20]  Muhammad Khurram Khan,et al.  Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing , 2015, Secur. Commun. Networks.

[21]  Da Li,et al.  Certificateless Signature Scheme without Random Oracles , 2009, ISA.

[22]  Awais Ahmad,et al.  IoT-Based Big Data: From Smart City towards Next Generation Super City Planning , 2017, Int. J. Semantic Web Inf. Syst..

[23]  Junhua Wu,et al.  Methods of Resource Scheduling Based on Optimized Fuzzy Clustering in Fog Computing , 2019, Sensors.

[24]  Xianghan Zheng,et al.  Lightweight distributed secure data management system for health internet of things , 2017, J. Netw. Comput. Appl..

[25]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[26]  C. Pandu Rangan,et al.  Efficient and Provably Secure Certificateless Multi-receiver Signcryption , 2008, ProvSec.