基本信息来源于合作网站,原文需代理用户跳转至来源网站获取       
摘要:
Fog computing is a concept that extends the paradigm of cloud computing to the network edge. The goal of fog computing is to situate resources in the vicinity of end users. As with cloud computing, fog computing provides storage services. The data owners can store their confidential data in many fog nodes, which could cause more challenges for data sharing security. In this paper, we present a novel architecture for data sharing in a fog environment. We explore the benefits of fog computing in addressing one-to-many data sharing applications. This architecture sought to outperform the cloud-based architecture and to ensure further enhancements to system performance, especially from the perspective of security. We will address the security challenges of data sharing, such as fine-grained access control, data confidentiality, collusion resistance, scalability, and the issue of user revocation. Keeping these issues in mind, we will secure data sharing in fog computing by combining attributebased encryption and proxy re-encryption techniques. Findings of this study indicate that our system has the response and processing time faster than classical cloud systems. Further, experimental results show that our system has an efficient user revocation mechanism, and that it provides high scalability and sharing of data in real time with low latency.
推荐文章
基于时间序列分析方法的FOG随机漂移建模与辨识
参数估计
时间序列分析
光纤陀螺
卡尔曼滤波/平滑
SET协议和3-D Secure协议的比较与分析
SET协议
3-D Secure协议
安全性
数字签名
口令
I-FOG光电转换电路稳定性分析与设计
干涉式光纤陀螺
光电转换
稳定性
FOG SINS/GPS组合导航系统不同步时间的鉴定方法
FOG
SINS/GPS
时间同步
鉴定方法
零偏估计
内容分析
关键词云
关键词热度
相关文献总数  
(/次)
(/年)
文献信息
篇名 Attribute-Based Secure Data Sharing with Efficient Revocation in Fog Computing
来源期刊 信息安全(英文) 学科 工学
关键词 ATTRIBUTE-BASED Encryption FINE-GRAINED Access Control FOG COMPUTING PROXY Re-Encryption User REVOCATION
年,卷(期) 2017,(3) 所属期刊栏目
研究方向 页码范围 203-222
页数 20页 分类号 TP3
字数 语种
DOI
五维指标
传播情况
(/次)
(/年)
引文网络
引文网络
二级参考文献  (0)
共引文献  (0)
参考文献  (0)
节点文献
引证文献  (0)
同被引文献  (0)
二级引证文献  (0)
2017(0)
  • 参考文献(0)
  • 二级参考文献(0)
  • 引证文献(0)
  • 二级引证文献(0)
研究主题发展历程
节点文献
ATTRIBUTE-BASED
Encryption
FINE-GRAINED
Access
Control
FOG
COMPUTING
PROXY
Re-Encryption
User
REVOCATION
研究起点
研究来源
研究分支
研究去脉
引文网络交叉学科
相关学者/机构
期刊影响力
信息安全(英文)
季刊
2153-1234
武汉市江夏区汤逊湖北路38号光谷总部空间
出版文献量(篇)
230
总下载数(次)
0
总被引数(次)
0
论文1v1指导