Everything Under Control: Secure Data Sharing Mechanism for Cloud-Edge Computing

被引:8
|
作者
Song, Zishuai [1 ,2 ]
Ma, Hui [1 ,2 ]
Zhang, Rui [1 ,2 ]
Xu, Wenhan [1 ,2 ]
Li, Jianhao [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
基金
中国国家自然科学基金;
关键词
Access control; Encryption; Distributed databases; Security; Data processing; Data privacy; Servers; Cloud-edge computing; controllable delegation; bilateral access control; verifiability; WebAssembly; ATTRIBUTE-BASED ENCRYPTION; BILATERAL ACCESS-CONTROL; PROXY RE-ENCRYPTION;
D O I
10.1109/TIFS.2023.3266164
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud-edge computing is a new paradigm for data sharing. Many computation tasks are assigned to multiple edge nodes to mitigate the computing burden of the cloud and data is also outsourced to them to provide real-time services for IoT devices. However, two major issues remain, namely data privacy and real-world deployment. According to the data privacy rights and principles that stated by General Data Protection Regulation (GDPR), data access control, restriction of data processing and finding inaccuracy data are critical issues that should be tackled in cloud-edge computing. Besides, since there are various types of devices and many of them are resource-constrained, how to efficiently apply deployment in cloud-edge computing is challenging for practice. In this work, we propose a new cryptographic primitive Controllable Outsourced Attribute-Based Proxy Re-Encryption (COAB-PRE) and a universal WebAssembly-based implementation framework for cross-platform deployment. In particular, COAB-PRE achieves bilateral and distributed access control whereby data producers and data consumers can both specify policies the other party must satisfy without a centralized access control server. The property, that we called controllable delegation, restricts the data processing on the edge nodes. COAB-PRE also supports comprehensive verifiability to find out a wrong result produced by the edge nodes and locate the misbehaved one. Moreover, we further discussed the potential property of COAB-PRE and put forward an improved scheme with high efficiency on devices. We also implemented our scheme using the approach and deployed it on different devices for experiment. All theoretical and experimental results indicate that our solution is secure and practical, and our implementation is suitable for cloud-edge computing.
引用
收藏
页码:2234 / 2249
页数:16
相关论文
共 50 条
  • [31] Secure data sharing scheme for VANETs based on edge computing
    Jingwen Pan
    Jie Cui
    Lu Wei
    Yan Xu
    Hong Zhong
    EURASIP Journal on Wireless Communications and Networking, 2019
  • [32] Secure data sharing scheme for VANETs based on edge computing
    Pan, Jingwen
    Cui, Jie
    Wei, Lu
    Xu, Yan
    Zhong, Hong
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (1)
  • [33] SGX Based Cloud-Edge Collaborative Secure Deduplication
    Wu, Jian
    Fu, Yinjin
    53RD INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, ICPP 2024, 2024, : 112 - 113
  • [34] An incentive mechanism for crowdsourcing markets with social welfare maximization in cloud-edge computing
    Xu, Xiaolong
    Cai, Qing
    Zhang, Guoming
    Zhang, Jie
    Tian, Wei
    Zhang, Xiaorui
    Liu, Alex X.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (07):
  • [35] A Secure Cloud-Edge Collaborative Logistic Regression Model
    Wang, Chen
    Xu, Jian
    Yin, Long
    IEEE CONGRESS ON CYBERMATICS / 2021 IEEE INTERNATIONAL CONFERENCES ON INTERNET OF THINGS (ITHINGS) / IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) / IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) / IEEE SMART DATA (SMARTDATA), 2021, : 244 - 253
  • [36] Model of Cloud-Edge Cooperative Service for Maritime Edge Computing
    Yue G.-X.
    Dai Y.-S.
    Yang X.-H.
    Yang Z.-M.
    Ma B.-L.
    Liu J.-H.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2021, 49 (12): : 2407 - 2420
  • [37] An approach for the secure management of hybrid cloud-edge environments
    Celesti, Antonio
    Fazio, Maria
    Galletta, Antonino
    Carnevale, Lorenzo
    Wan, Jiafu
    Villari, Massimo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 90 : 1 - 19
  • [38] Secure sharing with cryptography in cloud computing
    Chachapara, Kajal
    Bhadlawala, Sunny
    2013 4TH NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2013), 2013,
  • [39] Attacks classification and data privacy protection in cloud-edge collaborative computing systems
    Devarajan, Mohanarangan Veerappermal
    Yallamelli, Akhil Raj Gaius
    Yalla, Rama Krishna Mani Kanta
    Mamidala, Vijaykumar
    Ganesan, Thirusubramanian
    Sambas, Aceng
    INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2024,
  • [40] A cloud-edge computing architecture for monitoring protective equipment
    Reaño, Carlos
    Riera, Jose V.
    Romero, Verónica
    Morillo, Pedro
    Casas-Yrurzum, Sergio
    Journal of Cloud Computing, 2024, 13 (01)