Author Login Chief Editor Login Reviewer Login Editor Login Remote Office

Computer Engineering ›› 2021, Vol. 47 ›› Issue (6): 38-43. doi: 10.19678/j.issn.1000-3428.0060063

• Hot Topics and Reviews • Previous Articles     Next Articles

Distributed Attribute-Based Encryption Scheme Based on Fog Nodes

MA Jiajia1, ZHANG Zhiqiang1, CAO Suzhen1, DOU Fengge1, DING Xiaohui1, WANG Caifen2   

  1. 1. College of Computer Science and Engineering, Northwest Normal University, Lanzhou 730070, China;
    2. College of Big Data and Internet, Shenzhen University of Technology, Shenzhen, Guangdong 518118, China
  • Received:2020-11-20 Revised:2021-01-12 Published:2021-01-22
  • Contact: 国家自然科学基金(61662069,61662071)。 E-mail:576342353@qq.com

基于雾节点的分布式属性基加密方案

马佳佳1, 张志强1, 曹素珍1, 窦凤鸽1, 丁晓晖1, 王彩芬2   

  1. 1. 西北师范大学 计算机科学与工程学院, 兰州 730070;
    2. 深圳技术大学 大数据与互联网学院, 广东 深圳 518118
  • 作者简介:马佳佳(1997-),女,硕士研究生,主研方向为属性基加密;张志强,硕士研究生;曹素珍,副教授、硕士;窦凤鸽、丁晓晖,硕士研究生;王彩芬,教授、博士。

Abstract: The existing cloud storage schemes have multiple limitations, including the general division of user rights to access data, fine-grained control access permissions, and single point of failure in single authority.This paper proposes a distributed ciphertext-policy attribute-based encryption scheme based on fog nodes.In the scheme, part of the data decryption operations are outsourced to the fog nodes, reducing the computing overhead of the end users.Different attribute authorities generate attribute keys for users to meet the fine-grained access control requirements, and the attributes of a specific user are bundled together by using the global identity, which effectively prevents collusion attacks among various attribute agencies.At the same time, the introduction of the weight attribute simplifies the access structure and saves system storage space.The scheme is tested with the q-parallel BDHE deterministic problem, and the results have verified the security of the scheme.Compared with the blockchain-based multi-authority access control scheme and the attribute-based access control scheme of mHealth that can track multiple authorities, the proposed scheme reduces the computing overhead of the end users in the decryption phase.

Key words: fog computing, distributed authorization, ciphertext-policy, weight attribute, decryption outsourcing

摘要: 为解决云存储中对用户访问数据权限划分笼统、细粒度化控制访问权限受限以及单授权机构中存在的单点失效问题,提出基于雾节点的分布式密文策略属性基加密方案。将数据的部分解密运算外包给雾节点,减少终端用户的计算开销,并由不同的属性授权机构为用户生成属性密钥,以适用于细粒度的访问控制要求,使用全局身份将属于特定用户的各种属性进行“捆绑”,防止各属性机构间的共谋攻击,同时引入权重属性简化访问结构,节省系统的存储空间。实验结果表明,基于判定性q-parallel BDHE问题证明了该方案的安全性,与基于区块链的多授权机构访问控制方案和mHealth中可追踪多授权机构基于属性的访问控制方案相比,该方案终端用户在解密阶段具有更小的计算开销。

关键词: 雾计算, 分布式授权, 密文策略, 权重属性, 解密外包

CLC Number: