{"title":"Securing Fog and Cloud Communication Using Attribute Based Access Control and Re-encryption","authors":"Kunal Vohra, M. Dave","doi":"10.1109/ICICCT.2018.8473045","DOIUrl":null,"url":null,"abstract":"Fog Computing is a type of distributed computing that reduces computation on the cloud by creating a new layer between the Internet of Things (IoTs) devices and the cloud. This helps to deliver the services more efficiently and effectively. The security concerns in fog computing are inherited from the cloud itself as the fog computing is derived from cloud computing. So, a major security concern in fog computing is during sharing of data, as illegitimate users could get access while the data is being shared. Attribute Based Encryption (ABE) method is proved to be beneficial for securing the data, but ABE method alone is not sufficient as there are various security concerns such as forward issue and backward issue. Various methods have been proposed by researchers to solve the problem, one such efficient solution is re-encryption. In this paper we propose a scheme that uses Ciphertext-policy Attribute based Encryption along with re-encryption for providing access control in fog and cloud communication. The analysis of the proposed scheme reveals better security and performance. We have also implemented the proposed scheme to show its effectiveness.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICCT.2018.8473045","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
Fog Computing is a type of distributed computing that reduces computation on the cloud by creating a new layer between the Internet of Things (IoTs) devices and the cloud. This helps to deliver the services more efficiently and effectively. The security concerns in fog computing are inherited from the cloud itself as the fog computing is derived from cloud computing. So, a major security concern in fog computing is during sharing of data, as illegitimate users could get access while the data is being shared. Attribute Based Encryption (ABE) method is proved to be beneficial for securing the data, but ABE method alone is not sufficient as there are various security concerns such as forward issue and backward issue. Various methods have been proposed by researchers to solve the problem, one such efficient solution is re-encryption. In this paper we propose a scheme that uses Ciphertext-policy Attribute based Encryption along with re-encryption for providing access control in fog and cloud communication. The analysis of the proposed scheme reveals better security and performance. We have also implemented the proposed scheme to show its effectiveness.
雾计算是一种分布式计算,通过在物联网(iot)设备和云之间创建一个新的层来减少云上的计算。这有助于更高效、更有效地提供服务。雾计算的安全问题从云本身继承而来,因为雾计算来源于云计算。因此,雾计算中的一个主要安全问题是在共享数据期间,因为非法用户可能在共享数据时访问数据。事实证明,基于属性的加密(Attribute Based Encryption, ABE)方法有利于数据的安全,但由于存在前向问题和后向问题等各种安全问题,仅使用ABE方法是不够的。研究人员提出了各种方法来解决这个问题,其中一种有效的方法是重新加密。本文提出了一种使用基于密文策略属性的加密和再加密来提供雾和云通信中的访问控制的方案。分析表明,该方案具有较好的安全性和性能。我们亦已实施建议计划,以显示其成效。