Everything Under Control: Secure Data Sharing Mechanism for Cloud-Edge Computing

被引:8
|
作者
Song, Zishuai [1 ,2 ]
Ma, Hui [1 ,2 ]
Zhang, Rui [1 ,2 ]
Xu, Wenhan [1 ,2 ]
Li, Jianhao [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
基金
中国国家自然科学基金;
关键词
Access control; Encryption; Distributed databases; Security; Data processing; Data privacy; Servers; Cloud-edge computing; controllable delegation; bilateral access control; verifiability; WebAssembly; ATTRIBUTE-BASED ENCRYPTION; BILATERAL ACCESS-CONTROL; PROXY RE-ENCRYPTION;
D O I
10.1109/TIFS.2023.3266164
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud-edge computing is a new paradigm for data sharing. Many computation tasks are assigned to multiple edge nodes to mitigate the computing burden of the cloud and data is also outsourced to them to provide real-time services for IoT devices. However, two major issues remain, namely data privacy and real-world deployment. According to the data privacy rights and principles that stated by General Data Protection Regulation (GDPR), data access control, restriction of data processing and finding inaccuracy data are critical issues that should be tackled in cloud-edge computing. Besides, since there are various types of devices and many of them are resource-constrained, how to efficiently apply deployment in cloud-edge computing is challenging for practice. In this work, we propose a new cryptographic primitive Controllable Outsourced Attribute-Based Proxy Re-Encryption (COAB-PRE) and a universal WebAssembly-based implementation framework for cross-platform deployment. In particular, COAB-PRE achieves bilateral and distributed access control whereby data producers and data consumers can both specify policies the other party must satisfy without a centralized access control server. The property, that we called controllable delegation, restricts the data processing on the edge nodes. COAB-PRE also supports comprehensive verifiability to find out a wrong result produced by the edge nodes and locate the misbehaved one. Moreover, we further discussed the potential property of COAB-PRE and put forward an improved scheme with high efficiency on devices. We also implemented our scheme using the approach and deployed it on different devices for experiment. All theoretical and experimental results indicate that our solution is secure and practical, and our implementation is suitable for cloud-edge computing.
引用
收藏
页码:2234 / 2249
页数:16
相关论文
共 50 条
  • [41] An Efficient FHE-Enabled Secure Cloud-Edge Computing Architecture for IoMT Data Protection With its Application to Pandemic Modeling
    Zhang, Linru
    Wang, Xiangning
    Wang, Jiabo
    Pung, Rachael
    Wang, Huaxiong
    Lam, Kwok-Yan
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (09): : 15272 - 15284
  • [42] A cloud-edge computing architecture for monitoring protective equipment
    Reano, Carlos
    Riera, Jose V.
    Romero, Veronica
    Morillo, Pedro
    Casas-Yrurzum, Sergio
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [43] A cloud-edge computing architecture for monitoring protective equipment
    Carlos Reaño
    Jose V. Riera
    Verónica Romero
    Pedro Morillo
    Sergio Casas-Yrurzum
    Journal of Cloud Computing, 13
  • [44] Secure data sharing scheme with two level revocations in cloud computing
    Zhao S.
    Jiang R.
    Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2018, 48 (04): : 596 - 604
  • [45] Secure Map Reduce Data Transmission Mechanism in Cloud Computing Using Threshold Secret Sharing Scheme
    Lin, Hua Yi
    Yang, Che-Yu
    Hsieh, Meng-Yen
    SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING: THEORY AND PRACTICE, VOL 2, 2012, 115 : 761 - +
  • [46] Secure and Flexible Data Sharing via Ciphertext Retrieval for Cloud Computing
    Tian, Wenqing
    Xu, Heng
    Komi, Messan
    Zhang, Junxing
    PROCEEDINGS OF 2017 IEEE 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2017, : 161 - 166
  • [47] An efficient and secure data sharing scheme for mobile devices in cloud computing
    Xiuqing Lu
    Zhenkuan Pan
    Hequn Xian
    Journal of Cloud Computing, 9
  • [48] Forward and backward secure fuzzy encryption for data sharing in cloud computing
    Wei, Jianghong
    Hu, Xuexian
    Liu, Wenfen
    Zhang, Qihui
    SOFT COMPUTING, 2019, 23 (02) : 497 - 506
  • [49] Forward and backward secure fuzzy encryption for data sharing in cloud computing
    Jianghong Wei
    Xuexian Hu
    Wenfen Liu
    Qihui Zhang
    Soft Computing, 2019, 23 : 497 - 506
  • [50] Secure Data Sharing and Search for Cloud-Edge-Collaborative Storage
    Tao, Ye
    Xu, Peng
    Jin, Hai
    IEEE ACCESS, 2020, 8 : 15963 - 15972