计算机工程 ›› 2020, Vol. 46 ›› Issue (5): 34-40.doi: 10.19678/j.issn.1000-3428.0055025

• 热点与综述 • 上一篇    下一篇

雾计算中支持外包与撤销的属性基加密方案

黄凤鸣, 涂山山, 孟远   

  1. 北京工业大学 信息学部, 北京 100124
  • 收稿日期:2019-05-27 修回日期:2019-07-25 发布日期:2019-07-03
  • 作者简介:黄凤鸣(1995-),女,硕士研究生,主研方向为雾计算、信息安全;涂山山,副教授;孟远,硕士研究生。
  • 基金项目:
    国家自然科学基金(61801008);国家重点研发计划(2018YFB0803600);北京市自然科学基金(L172049);北京市教育委员会科技计划一般项目(KM201910005025)。

Attribute-Based Encryption Scheme Supporting Outsourcing and Revocation in Fog Computing

HUANG Fengming, TU Shanshan, MENG Yuan   

  1. Department of Information, Beijing University of Technology, Beijing 100124, China
  • Received:2019-05-27 Revised:2019-07-25 Published:2019-07-03

摘要: 雾计算将云计算的计算能力、数据分析应用等扩展到网络边缘,可满足物联网设备的低时延、移动性等要求,但同时也存在数据安全和隐私保护问题。传统云计算中的属性基加密技术不适用于雾环境中计算资源有限的物联网设备,并且难以管理属性变更。为此,提出一种支持加解密外包和撤销的属性基加密方案,构建"云-雾-终端"的三层系统模型,通过引入属性组密钥的技术,实现动态密钥更新,满足雾计算中属性即时撤销的要求。在此基础上,将终端设备中部分复杂的加解密运算外包给雾节点,以提高计算效率。实验结果表明,与KeyGen、Enc等方案相比,该方案具有更优的计算高效性和可靠性。

关键词: 雾计算, 属性基加密, 加解密外包, 属性撤销, 属性组密钥, 密文策略

Abstract: Fog computing extends the computing power and data analysis applications of cloud computing to the edge of the network,meeting the requirements of low latency and mobility of the Internet of Things(IoT) devices,but at the same time generating new data security and privacy protection problems.The Attribute-Based Encryption(ABE) technology in the traditional cloud computing is not suitable for the IoT devices with limited computing resources in the fog environment,and the attribute change is difficult to manage.Therefore,this paper proposes an ABE scheme that supports encryption and decryption outsourcing and revocation in fog computing.A three-layer system model of "cloud-fog-terminal" is constructed,and by introducing the technology of the attribute group key,the key is dynamically updated,thus the requirement of immediate cancellation of the attribute is satisfied.Some complicated encryption and decryption operations in the terminal device are outsourced to the fog node,which greatly improves the calculation efficiency.Experimental results show that the scheme has better computational efficiency and reliability than KeyGen and Enc schemes.

Key words: fog computing, Attribute-Based Encryption(ABE), encryption and decryption outsourcing, attribute revocation, attribute group key, ciphertext policy

中图分类号: