File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Towards leakage-resilient fine-grained access control in fog computing

TitleTowards leakage-resilient fine-grained access control in fog computing
Authors
KeywordsDual system methodology
Pair encoding
Fog computing
Functional encryption
Leakage Resilient Cryptography
Issue Date2018
Citation
Future Generation Computer Systems, 2018, v. 78, pt. 2, p. 763-777 How to Cite?
Abstract© 2017 Elsevier B.V. Fog Computing, a technology that takes advantage of both the paradigms of Cloud Computing and the Internet of Things, has a great advantage in reducing the communication cost. Since its introduction, fog computing has found a lot of applications, including, for instance, connected vehicles, wireless sensors, smart cities and etc. One prominent problem in fog computing is how fine-grained access control can be imposed. Functional encryption, a new cryptographic primitive, is known to support fine-grained access control. However, when it comes to some new threats in the fog computing scenario, such as side channel attacks, functional encryption cannot maintain its security. Therefore, we need new cryptographic primitives that not only provide a way to securely share data with a fine-grained access control but also are able to resist those new threats. In this paper, we consider how to construct functional encryption schemes (FEs) adaptively secure in continual memory leakage model (CML), which is one of the strongest models that allows continuous leakage on both user and master secret keys. Besides providing privacy and fine-grained access control in fog computing, our scheme can also guarantee security against side channel attacks. More concretely, we propose a generic framework for constructing fully secure leakage-resilient FEs (LR-FEs) in the CML model results from leakage-resilient pair encoding, which is an extension of pair encoding presented in the recent work of Attrapadung. In this way, our framework simplifies the design and analysis of LR-FEs into the design and analysis of predicate encodings. Moreover, we discover new adaptively secure LR-FEs, including FE for regular languages, attribute-based encryption (ABE) for large universe and ABE with short ciphertext. Above all, leakage-resilient adaptively secure functional encryption schemes can equip fog computing with higher security and fine-grained access control.
Persistent Identifierhttp://hdl.handle.net/10722/280618
ISSN
2023 Impact Factor: 6.2
2023 SCImago Journal Rankings: 1.946
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorYu, Zuoxia-
dc.contributor.authorAu, Man Ho-
dc.contributor.authorXu, Qiuliang-
dc.contributor.authorYang, Rupeng-
dc.contributor.authorHan, Jinguang-
dc.date.accessioned2020-02-17T14:34:29Z-
dc.date.available2020-02-17T14:34:29Z-
dc.date.issued2018-
dc.identifier.citationFuture Generation Computer Systems, 2018, v. 78, pt. 2, p. 763-777-
dc.identifier.issn0167-739X-
dc.identifier.urihttp://hdl.handle.net/10722/280618-
dc.description.abstract© 2017 Elsevier B.V. Fog Computing, a technology that takes advantage of both the paradigms of Cloud Computing and the Internet of Things, has a great advantage in reducing the communication cost. Since its introduction, fog computing has found a lot of applications, including, for instance, connected vehicles, wireless sensors, smart cities and etc. One prominent problem in fog computing is how fine-grained access control can be imposed. Functional encryption, a new cryptographic primitive, is known to support fine-grained access control. However, when it comes to some new threats in the fog computing scenario, such as side channel attacks, functional encryption cannot maintain its security. Therefore, we need new cryptographic primitives that not only provide a way to securely share data with a fine-grained access control but also are able to resist those new threats. In this paper, we consider how to construct functional encryption schemes (FEs) adaptively secure in continual memory leakage model (CML), which is one of the strongest models that allows continuous leakage on both user and master secret keys. Besides providing privacy and fine-grained access control in fog computing, our scheme can also guarantee security against side channel attacks. More concretely, we propose a generic framework for constructing fully secure leakage-resilient FEs (LR-FEs) in the CML model results from leakage-resilient pair encoding, which is an extension of pair encoding presented in the recent work of Attrapadung. In this way, our framework simplifies the design and analysis of LR-FEs into the design and analysis of predicate encodings. Moreover, we discover new adaptively secure LR-FEs, including FE for regular languages, attribute-based encryption (ABE) for large universe and ABE with short ciphertext. Above all, leakage-resilient adaptively secure functional encryption schemes can equip fog computing with higher security and fine-grained access control.-
dc.languageeng-
dc.relation.ispartofFuture Generation Computer Systems-
dc.subjectDual system methodology-
dc.subjectPair encoding-
dc.subjectFog computing-
dc.subjectFunctional encryption-
dc.subjectLeakage Resilient Cryptography-
dc.titleTowards leakage-resilient fine-grained access control in fog computing-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1016/j.future.2017.01.025-
dc.identifier.scopuseid_2-s2.0-85011802339-
dc.identifier.volume78-
dc.identifier.issuept. 2-
dc.identifier.spage763-
dc.identifier.epage777-
dc.identifier.isiWOS:000413060400024-
dc.identifier.issnl0167-739X-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats