TMO: Time Domain Outsourcing Attribute-Based Encryption Scheme for Data Acquisition in Edge Computing

With the rapid development of the Internet of Things and the ever-increasing demands of advanced services and applications, edge computing is proposed to move the computing and storage resources near the data source, which improves the response time and saves the bandwidth. However, due to the limited available resources and massive privacy-sensitive user data in edge nodes, there are huge challenges in data security and privacy protection in the edge computing environment. Hence, we propose an efficient time-domain multi-authority outsourcing attribute-based encryption (ABE) scheme (TMO) with a dynamic policy updating method for secure data acquisition and sharing in the edge computing. Specifically, considering that the time is a crucial factor in many real-world application scenarios, we add time-domain information in the encryption algorithm. Besides, to take full advantage of edge computing, TMO extends the multi-authority ABE approach by outsourcing the computation to edge nodes to enhance security and performance. Moreover, to tackle the mobility and frequently changing edge environment, TMO also provides an efficient online policy updating method to manage attribute information and to access policy with low overhead. The security analysis and the experimental results show that TMO can indeed efficiently enhance data security with low overhead in the edge computing environment.

[1]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[2]  Nenghai Yu,et al.  TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud , 2020, IEEE Transactions on Services Computing.

[3]  K. S. Naidu,et al.  Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds , 2017 .

[4]  Xuemin Shen,et al.  Securing Fog Computing for Internet of Things Applications: Challenges and Solutions , 2018, IEEE Communications Surveys & Tutorials.

[5]  Allison Bishop,et al.  Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..

[6]  Hongwei Liu,et al.  An efficient access control scheme with outsourcing capability and attribute update for fog computing , 2018, Future Gener. Comput. Syst..

[7]  Jin Li,et al.  Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems , 2009, SecureComm.

[8]  Zhuo Chen,et al.  Edge Analytics in the Internet of Things , 2015, IEEE Pervasive Computing.

[9]  Matthew Green,et al.  Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.

[10]  Zhen Liu,et al.  Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach , 2016, IEEE Transactions on Multimedia.

[11]  Sourya Joyee De,et al.  Efficient Decentralized Attribute Based Access Control for Mobile Clouds , 2020, IEEE Transactions on Cloud Computing.

[12]  Min Ji,et al.  CCA-secure ABE with outsourced decryption for fog computing , 2018, Future Gener. Comput. Syst..

[13]  Kang Zhang,et al.  Applying improved particle swarm optimization for dynamic service composition focusing on quality of service evaluations under hybrid networks , 2018, Int. J. Distributed Sens. Networks.

[14]  Hao Wang,et al.  Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing , 2016, Soft Computing.

[15]  Albert Y. Zomaya,et al.  Composition-Driven IoT Service Provisioning in Distributed Edges , 2018, IEEE Access.

[16]  Glenn Rolph,et al.  Real-time Environmental Applications and Display sYstem: READY , 2017, Environ. Model. Softw..

[17]  Mahadev Satyanarayanan,et al.  The Emergence of Edge Computing , 2017, Computer.

[18]  Ya Xiao,et al.  Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation , 2018, Sensors.

[19]  M. Laurent-Maknavicius,et al.  PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT , 2018, Comput. Networks.

[20]  Xiaohua Jia,et al.  DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems , 2013, IEEE Transactions on Information Forensics and Security.

[21]  Weisong Shi,et al.  On security challenges and open issues in Internet of Things , 2018, Future Gener. Comput. Syst..

[22]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[23]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[24]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[25]  Melissa Chase,et al.  Multi-authority Attribute Based Encryption , 2007, TCC.

[26]  G. Manoj Someswar,et al.  Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a Cloud Environment , 2015 .

[27]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[28]  Xiaohua Jia,et al.  Enabling efficient access control with dynamic policy updating for big data in the cloud , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[29]  Yucong Duan,et al.  Toward service selection for workflow reconfiguration: An interface-based computing solution , 2018, Future Gener. Comput. Syst..

[30]  Yucong Duan,et al.  An Approach to Data Consistency Checking for the Dynamic Replacement of Service Process , 2017, IEEE Access.

[31]  Cheng Zhang,et al.  A Density-Based Offloading Strategy for IoT Devices in Edge Computing Systems , 2018, IEEE Access.

[32]  Robert H. Deng,et al.  Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption , 2014, AsiaCCS.

[33]  Jin Li,et al.  Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..

[34]  Hui Ma,et al.  Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing , 2017, IEEE Transactions on Dependable and Secure Computing.

[35]  Brent Waters,et al.  Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption , 2015, Financial Cryptography.