Everything Under Control: Secure Data Sharing Mechanism for Cloud-Edge Computing

被引:8
|
作者
Song, Zishuai [1 ,2 ]
Ma, Hui [1 ,2 ]
Zhang, Rui [1 ,2 ]
Xu, Wenhan [1 ,2 ]
Li, Jianhao [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
基金
中国国家自然科学基金;
关键词
Access control; Encryption; Distributed databases; Security; Data processing; Data privacy; Servers; Cloud-edge computing; controllable delegation; bilateral access control; verifiability; WebAssembly; ATTRIBUTE-BASED ENCRYPTION; BILATERAL ACCESS-CONTROL; PROXY RE-ENCRYPTION;
D O I
10.1109/TIFS.2023.3266164
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud-edge computing is a new paradigm for data sharing. Many computation tasks are assigned to multiple edge nodes to mitigate the computing burden of the cloud and data is also outsourced to them to provide real-time services for IoT devices. However, two major issues remain, namely data privacy and real-world deployment. According to the data privacy rights and principles that stated by General Data Protection Regulation (GDPR), data access control, restriction of data processing and finding inaccuracy data are critical issues that should be tackled in cloud-edge computing. Besides, since there are various types of devices and many of them are resource-constrained, how to efficiently apply deployment in cloud-edge computing is challenging for practice. In this work, we propose a new cryptographic primitive Controllable Outsourced Attribute-Based Proxy Re-Encryption (COAB-PRE) and a universal WebAssembly-based implementation framework for cross-platform deployment. In particular, COAB-PRE achieves bilateral and distributed access control whereby data producers and data consumers can both specify policies the other party must satisfy without a centralized access control server. The property, that we called controllable delegation, restricts the data processing on the edge nodes. COAB-PRE also supports comprehensive verifiability to find out a wrong result produced by the edge nodes and locate the misbehaved one. Moreover, we further discussed the potential property of COAB-PRE and put forward an improved scheme with high efficiency on devices. We also implemented our scheme using the approach and deployed it on different devices for experiment. All theoretical and experimental results indicate that our solution is secure and practical, and our implementation is suitable for cloud-edge computing.
引用
收藏
页码:2234 / 2249
页数:16
相关论文
共 50 条
  • [21] Enabling efficient and secure data sharing in cloud computing
    Li, Jingwei
    Li, Jin
    Liu, Zheli
    Jia, Chunfu
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1052 - 1066
  • [22] Secure Distributed Storage on Cloud-Edge Infrastructures
    Kontodimas, Konstantinos
    Soumplis, Polyzois
    Kretsis, Aristotelis
    Kokkinos, Panagiotis
    Varvarigos, Emmanouel
    2021 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (IEEE CLOUDNET), 2021, : 127 - 132
  • [23] Safe: Synergic Data Filtering for Federated Learning in Cloud-Edge Computing
    Xu, Xiaolong
    Li, Haoyuan
    Li, Zheng
    Zhou, Xiaokang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (02) : 1655 - 1665
  • [24] Collaborative Resource Sharing Game Based Cloud-Edge Offload Computing Orchestration Scheme
    Kim, Sungwook
    IEEE ACCESS, 2022, 10 : 74523 - 74532
  • [25] Cloud-Edge Collaboration-Based Knowledge Sharing Mechanism for Manufacturing Resources
    Wang, Xixiang
    Wan, Jiafu
    APPLIED SCIENCES-BASEL, 2021, 11 (07):
  • [26] Cloud control for IIoT in a cloud-edge environment
    Yan, Ce
    Xia, Yuanqing
    Yang, Hongjiu
    Zhan, Yufeng
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2024, 35 (04) : 1013 - 1027
  • [27] A Parallel Secure Flow Control Framework for Private Data Sharing in Mobile Edge Cloud
    Huang, Qinlong
    Chen, Lixuan
    Wang, Chao
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2022, 33 (12) : 4638 - 4653
  • [28] Cloud control for IIoT in a cloud-edge environment
    YAN Ce
    XIA Yuanqing
    YANG Hongjiu
    ZHAN Yufeng
    Journal of Systems Engineering and Electronics, 2024, 35 (04) : 1013 - 1027
  • [29] A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
    Li, Ruixuan
    Shen, Chenglin
    He, Heng
    Gu, Xiwu
    Xu, Zhiyong
    Xu, Cheng-Zhong
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (02) : 344 - 357
  • [30] A secure and efficient data aggregation scheme for cloud-edge collaborative smart meters
    Kang, Wenjie
    Zhang, Li
    Hu, Zhenzhen
    Xia, Zhuoqun
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2024, 162