Back
 JIS  Vol.8 No.3 , July 2017
Attribute-Based Secure Data Sharing with Efficient Revocation in Fog Computing
Abstract:
Fog computing is a concept that extends the paradigm of cloud computing to the network edge. The goal of fog computing is to situate resources in the vicinity of end users. As with cloud computing, fog computing provides storage services. The data owners can store their confidential data in many fog nodes, which could cause more challenges for data sharing security. In this paper, we present a novel architecture for data sharing in a fog environment. We explore the benefits of fog computing in addressing one-to-many data sharing applications. This architecture sought to outperform the cloud-based architecture and to ensure further enhancements to system performance, especially from the perspective of security. We will address the security challenges of data sharing, such as fine-grained access control, data confidentiality, collusion resistance, scalability, and the issue of user revocation. Keeping these issues in mind, we will secure data sharing in fog computing by combining attributebased encryption and proxy re-encryption techniques. Findings of this study indicate that our system has the response and processing time faster than classical cloud systems. Further, experimental results show that our system has an efficient user revocation mechanism, and that it provides high scalability and sharing of data in real time with low latency.
Cite this paper: Alotaibi, A. , Barnawi, A. and Buhari, M. (2017) Attribute-Based Secure Data Sharing with Efficient Revocation in Fog Computing. Journal of Information Security, 8, 203-222. doi: 10.4236/jis.2017.83014.
References

[1]   Firdhous, M., Ghazali, O. and Hassan, S. (2014) Fog Computing: Will It Be the Future of Cloud Computing. Proceedings of the 3rd International Conference on Informatics & Applications, Kuala Terengganu, Malaysia, 8-15.

[2]   Bonomi, F., Milito, R., Zhu, J. and Addepalli, S. (2012) Fog Computing and Its Role in the Internet of Things. Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, Helsinki, Finland, 17 August 2012, 13-16.
https://doi.org/10.1145/2342509.2342513

[3]   Stojmenovic, J. (2014) Fog Computing: A Cloud to the Ground Support for Smart Things and Machine-to-Machine Networks. Australasian Telecommunication Networks and Applications Conference (ATNAC), Southbank, VIC, 26-28 November 2014, 117-122.
https://doi.org/10.1109/atnac.2014.7020884

[4]   Luan, T., Gao, L., Li, Z., Xiang, Y., We, G. and Sun, L. (2016) A View of Fog Computing from Networking Perspective. ArXivPrepr. ArXiv160201509.

[5]   Dastjerdi, A., Gupta, H., Calheiros, R., Ghosh, S. and Buyya, R. (2016) Fog Computing: Principals, Architectures, and Applications. ArXivPrepr. ArXiv160102752.

[6]   Yi, S., Hao, Z., Qin, Z. and Li, Q. (2015) Fog Computing: Platform and Applications. 2015 3rd IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb), Washington DC, 12-13 November 2015, 73-78.
https://doi.org/10.1109/hotweb.2015.22

[7]   Scale, M. (2009) Cloud Computing and Collaboration. Library Hi Tech News, 26, 10-13.
https://doi.org/10.1108/07419050911010741

[8]   Thilakanathan, D., Chen, S., Nepal, S. and Calvo, R. (2014) Secure Data Sharing in the Cloud. In: Nepal, S. and Pathan, M., Eds., Security, Privacy and Trust in Cloud Systems, Springer, Berlin, Heidelberg, 45-72.
https://doi.org/10.1007/978-3-642-38586-5_2

[9]   Yu, S., Wang, C., Ren, K. and Lou, W. (2010) Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing. 2010 Proceedings IEEE INFOCOM, San Diego, CA, 14-19 March 2010, 1-9.
https://doi.org/10.1109/infcom.2010.5462174

[10]   Wu, Y., Wei, Z. and Deng, R. (2013) Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks. IEEE Transactions on Multimedia, 15, 778-788.
https://doi.org/10.1109/TMM.2013.2238910

[11]   Liu, Q., Wang, G. and Wu, J. (2014) Time-Based Proxy Re-Encryption Scheme for Secure Data Sharing in a Cloud Environment. Information Sciences, 258, 355-370.
https://doi.org/10.1016/j.ins.2012.09.034

[12]   Tu, S., Niu, S., Li, H., Yun, X.-M. and Li, M. (2012) Fine-Grained Access Control and Revocation for Sharing Data on Clouds. 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW), Shanghai, 21-25 May 2012, 2146-2155.
https://doi.org/10.1109/ipdpsw.2012.265

[13]   Yang, Y. and Zhang, Y. (2011) A Generic Scheme for Secure Data Sharing in Cloud. 2011 40th International Conference on Parallel Processing Workshops (ICPPW), Taipei City, 13-16 September 2011, 145-153.
https://doi.org/10.1109/ICPPW.2011.51

[14]   Hur, J. (2013) Improving Security and Efficiency in Attribute-Based Data Sharing. IEEE Transactions on Knowledge and Data Engineering, 25, 2271-2282.
https://doi.org/10.1109/TKDE.2011.78

[15]   Samanthula, B., Howser, G., Elmehdwi, Y. and Madria, S. (2012) An Efficient and Secure Data Sharing Framework Using Homomorphic Encryption in the Cloud. Proceedings of the 1st International Workshop on Cloud Intelligence, Istanbul, Turkey, 31 August 2012, Article No. 8.
https://doi.org/10.1145/2347673.2347681

[16]   Zhang, R. and Chen, P. (2012) A Dynamic Cryptographic Access Control Scheme in Cloud Storage Services. 8th International Conference on Computing and Networking Technology (ICCNT), Gueongju, 27-29 August 2012, 50-55.

[17]   Do, J., Song, Y. and Park, N. (2011) Attribute Based Proxy Re-Encryption for Data Confidentiality in Cloud Computing Environments. 2011 First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering (CNSI), Jeju Island, 23-25 May 2011, 248-251.
https://doi.org/10.1109/cnsi.2011.34

[18]   Qiao, Z., Liang, S., Davis, S. and Jiang, H. (2014) Survey of Attribute Based Encryption. 2014 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), Las Vegas, NV, 30 June-2 July 2014, 1-6.

[19]   Ateniese, G., Fu, K., Green, M. and Hohenberger, S. (2006) Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. ACM Transactions on Information and System Security, 9, 1-30.
https://doi.org/10.1145/1127345.1127346

[20]   Yu, S. (2010) Data Sharing on Untrusted Storage with Attribute-Based Encryption. Ph.D. Thesis, University of Massachusetts, Lowell.

[21]   Butterfield, E. (2016) Fog Computing with Go: A Comparative Study. CMC Senior Theses, Paper 1348.

[22]   Li, J., Yao, W., Zhang, W., Qian, H. and Han, J. (2016) Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing. IEEE Transactions on Services Computing, PP, 1.
https://doi.org/10.1109/tsc.2016.2520932

[23]   Ahmed, M. Xiang, Y. and Ali, S. (2010) Above the Trust and Security in Cloud Computing: A Notion Towards Innovation. 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), Hong Kong, 11-13 December 2010, 723-730.
https://doi.org/10.1109/euc.2010.114

[24]   Ibrahim, I., El-Din, S., Elgohary, R., Faheem, H. and Mostafa, M. (2013) A Generic, Scalable and Fine-Grained Data Access System for Sharing Digital Objects in Honest but Curious Cloud Environments. 2013 International Conference on Cloud Computing and Big Data (CloudCom-Asia), Fuzhou, 16-19 December 2013, 15-22.
https://doi.org/10.1109/CLOUDCOM-ASIA.2013.21

[25]   He, H., Li, R., Dong, X. and Zhang, Z. (2014) Secure, Efficient and Fine-Grained Data Access Control Mechanism for P2P Storage Cloud. IEEE Transactions on Cloud Computing, 2, 471-484.
https://doi.org/10.1109/TCC.2014.2378788

 
 
Top