A Secure Data-Sharing Scheme for Privacy-Preserving Supporting Node–Edge–Cloud Collaborative Computation
-
Published:2023-06-19
Issue:12
Volume:12
Page:2737
-
ISSN:2079-9292
-
Container-title:Electronics
-
language:en
-
Short-container-title:Electronics
Author:
Zheng Kaifa1ORCID, Ding Caiyang2, Wang Jinchen3
Affiliation:
1. School of Cyber Science and Technology, Beihang University, Beijing 100191, China 2. School of Computer Science and Engineering, Beihang University, Beijing 100191, China 3. North Information Control Research Academy Group Co., Ltd., Nanjing 211100, China
Abstract
The node–edge–cloud collaborative computation paradigm has introduced new security challenges to data sharing. Existing data-sharing schemes suffer from limitations such as low efficiency and inflexibility and are not easily integrated with the node–edge–cloud environment. Additionally, they do not provide hierarchical access control or dynamic changes to access policies for data privacy preservation, leading to a poor user experience and lower security. To address these issues, we propose a data-sharing scheme using attribute-based encryption (ABE) that supports node–edge–cloud collaborative computation (DS-ABE-CC). Our scheme incorporates access policies into ciphertext, achieving fine-grained access control and data privacy preservation. Firstly, considering node–edge–cloud collaborative computation, it outsources the significant computational overhead of data sharing from the owner and user to the edge nodes and the cloud. Secondly, integrating deeply with the “node–edge–cloud” scenario, the key distribution and agreement between all entities embedded in the encryption and decryption process, with a data privacy-preserving mechanism, improve the efficiency and security. Finally, our scheme supports flexible and dynamic access control policies and realizes hierarchical access control, thereby enhancing the user experience of data sharing. The theoretical analysis confirmed the security of our scheme, while the comparison experiments with other schemes demonstrated the practical feasibility and efficiency of our approach in node–edge–cloud collaborative computation.
Funder
Student Innovation Grant Program of the School of Cybersecurity
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference37 articles.
1. Song, D.X.D., Wagner, D., and Perrig, A. (2000, January 14–17). Practical Techniques For Searches On Encrypted Data. Proceedings of the 2000 IEEE Symposium on Security And Privacy, Berkeley, CA, USA. 2. An efficient multikeyword fuzzy ciphertext retrieval scheme based on distributed transmission for internet of things;Zheng;Int. J. Intell. Syst.,2022 3. Shamir, A. Identity-Based Cryptosystems And Signature Schemes. Proceedings of the Advances in Cryptology: Proceedings of CRYPTO 84. 4. Boneh, D., and Franklin, M. (2001, January 19–23). Identity-Based Encryption from the Weil pairing. Proceedings of the Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Barbara, CA, USA. 5. Sahai, A., and Waters, B. (2005, January 22–26). Fuzzy identity-based encryption. Proceedings of Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|