Efficient CP-ABE Scheme Resistant to Key Leakage for Secure Cloud-Fog Computing

Fengwei Cheng,
Sai Ji,
Chin-Feng Lai,

Abstract


With the evolution of the Internet, people’s lives are growing increasingly intelligent, and massive amounts of data are also generated. The combination of cloud computing and fog computing can store and process it efficiently. However, a new and urgent challenge has emerged about how to ensure that data in cloud and fog nodes are accessed securely. In order to address this issue, we propose an efficient anti-key leakage CP-ABE (EAL-CP-ABE) scheme based on cloud-fog computing. In our scheme, we achieve the identity tracing of the authorized user who leaked the private key by means of white-box tracing and the maximum number of user accesses. Meanwhile, we design a reward and punishment mechanism which rewards those with a good reputation and revokes authorized users who have exceeded the access limit or sold private keys to further reduce the possibility of key leakage. Due to limited local resources, we use fog nodes to achieve outsourced decryption of ciphertext. In addition, the detailed security analysis is provided to prove that the EAL-CP-ABE scheme is IND-CPA secure and traceable based on the hardness assumptions. Finally, we demonstrate that the EAL-CP-ABE scheme is efficient through the performance analysis.

Keywords


Access control, CP-ABE, Traceability, Privacy-preserving

Citation Format:
Fengwei Cheng, Sai Ji, Chin-Feng Lai, "Efficient CP-ABE Scheme Resistant to Key Leakage for Secure Cloud-Fog Computing," Journal of Internet Technology, vol. 23, no. 7 , pp. 1461-1471, Dec. 2022.

Full Text:

PDF

Refbacks

  • There are currently no refbacks.





Published by Executive Committee, Taiwan Academic Network, Ministry of Education, Taipei, Taiwan, R.O.C
JIT Editorial Office, Office of Library and Information Services, National Dong Hwa University
No. 1, Sec. 2, Da Hsueh Rd., Shoufeng, Hualien 974301, Taiwan, R.O.C.
Tel: +886-3-931-7314  E-mail: jit.editorial@gmail.com