2017
DOI: 10.3390/s17071695
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing

Abstract: With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
41
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 65 publications
(41 citation statements)
references
References 32 publications
0
41
0
Order By: Relevance
“…Fan et al [58] also designed a CP-ABE-based verifiable multi-authority outsourced access control scheme in a fogcloud network. This scheme offloads most encryption and decryption computations to fog devices in order to reduce computational overhead of user side.…”
Section: Secure Data Storage In Edge Computingmentioning
confidence: 99%
See 1 more Smart Citation
“…Fan et al [58] also designed a CP-ABE-based verifiable multi-authority outsourced access control scheme in a fogcloud network. This scheme offloads most encryption and decryption computations to fog devices in order to reduce computational overhead of user side.…”
Section: Secure Data Storage In Edge Computingmentioning
confidence: 99%
“…However, encryption and decryption are performed in user devices [58] and [83]. Due to limited resources of end devices, the schemes bring huge computing cost to user devices with the increase of attributes.…”
Section: Secure Data Storage In Edge Computingmentioning
confidence: 99%
“…Fan et al [7] proposed an outsourced, secure and verifiable multi-authority access control system called VO-MAACS. In their construction, most encryption and decryption computations are outsourced to Fog devices, and the result can be verified by signed the message.…”
Section: Related Workmentioning
confidence: 99%
“…To ensure the privacy of patients, access control policies IOTbased were proposed [25,26]. Fan et al [27] proposed a multiauthority mechanism in fog computing and cloud data center. Data owners and users can encrypt and decrypt data with only a small amount of computation.…”
Section: Introductionmentioning
confidence: 99%
“…The authorized institutions in this scheme are independent of each other, and there is no information interaction among them. Based on literature [9,27], we propose a distributed fine-grained access control scheme with outsourced computation in fog computing for electronic health records. Gope et al [28] proposed a new secure communication architecture for fog computing.…”
Section: Introductionmentioning
confidence: 99%