Javascript must be enabled to continue!
Efficient CP-ABE Scheme Resistant to Key Leakage for Secure Cloud-Fog Computing
View through CrossRef
<p>With the evolution of the Internet, people’s lives are growing increasingly intelligent, and massive amounts of data are also generated. The combination of cloud computing and fog computing can store and process it efficiently. However, a new and urgent challenge has emerged about how to ensure that data in cloud and fog nodes are accessed securely. In order to address this issue, we propose an efficient anti-key leakage CP-ABE (EAL-CP-ABE) scheme based on cloud-fog computing. In our scheme, we achieve the identity tracing of the authorized user who leaked the private key by means of white-box tracing and the maximum number of user accesses. Meanwhile, we design a reward and punishment mechanism which rewards those with a good reputation and revokes authorized users who have exceeded the access limit or sold private keys to further reduce the possibility of key leakage. Due to limited local resources, we use fog nodes to achieve outsourced decryption of ciphertext. In addition, the detailed security analysis is provided to prove that the EAL-CP-ABE scheme is IND-CPA secure and traceable based on the hardness assumptions. Finally, we demonstrate that the EAL-CP-ABE scheme is efficient through the performance analysis.</p>
<p> </p>
Journal of Internet Technology
Title: Efficient CP-ABE Scheme Resistant to Key Leakage for Secure Cloud-Fog Computing
Description:
<p>With the evolution of the Internet, people’s lives are growing increasingly intelligent, and massive amounts of data are also generated.
The combination of cloud computing and fog computing can store and process it efficiently.
However, a new and urgent challenge has emerged about how to ensure that data in cloud and fog nodes are accessed securely.
In order to address this issue, we propose an efficient anti-key leakage CP-ABE (EAL-CP-ABE) scheme based on cloud-fog computing.
In our scheme, we achieve the identity tracing of the authorized user who leaked the private key by means of white-box tracing and the maximum number of user accesses.
Meanwhile, we design a reward and punishment mechanism which rewards those with a good reputation and revokes authorized users who have exceeded the access limit or sold private keys to further reduce the possibility of key leakage.
Due to limited local resources, we use fog nodes to achieve outsourced decryption of ciphertext.
In addition, the detailed security analysis is provided to prove that the EAL-CP-ABE scheme is IND-CPA secure and traceable based on the hardness assumptions.
Finally, we demonstrate that the EAL-CP-ABE scheme is efficient through the performance analysis.
</p>
<p> </p>.
Related Results
Fog dissipation through ground warming monitored by satellite image : an approach to support regional forecasting 
Fog dissipation through ground warming monitored by satellite image : an approach to support regional forecasting 
<p>By reducing the atmospheric visibility, fog events have strong impacts on several humans activities. Transport security, military operations, air quality forecast ...
A Study of Moving from Cloud Computing to Fog Computing
A Study of Moving from Cloud Computing to Fog Computing
The exponential growth of the Internet of Things (IoT) technology poses various challenges to the classic centralized cloud computing paradigm, including high latency, limited capa...
Load Balancing at Fog Nodes using Scheduling Algorithms
Load Balancing at Fog Nodes using Scheduling Algorithms
Cloud Computing proves to be most predominant innovative field in the area of Information technology. Cloud is best suited for small scale to large scale businesses and personal pu...
Dense Fog Burst Reinforcement over Eastern China
Dense Fog Burst Reinforcement over Eastern China
<p>Fog can be hazardous weather. Dense and polluted fog is especially known to impact transportation, air quality, and public health. Low visibilities on fog days thr...
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
Cloud computing is the delivery of computing services, such as storage, processing power, and software applications, via the internet. Cloud computing offers various advantages and...
Fog in Sofia 2010–2019: Objective Circulation Classification and Fog Indices
Fog in Sofia 2010–2019: Objective Circulation Classification and Fog Indices
Low visibility caused by fog events can lead to disruption of every type of public transportation, and even loss of life. The focus of this study is the synoptic conditions associa...
Fog climatology at Shanghai Pudong International Airport
Fog climatology at Shanghai Pudong International Airport
AbstractUsing 22‐year ground observations on meteorological variables, we conducted a statistical analysis to reveal fog characteristics at Shanghai Pudong International Airport (S...
Edge/Fog Computing Networks
Edge/Fog Computing Networks
AbstractAs a main driver of 5G, the future mobile network is going to create a hyper‐connected Internet of Everything (IoE) world which requires the network to be scalable, versati...


