Please use this identifier to cite or link to this item:
Title: Towards leakage-resilient fine-grained access control in fog computing
Authors: Yu, Z 
Au, MH 
Xu, Q
Yang, R 
Han, J
Keywords: Dual system methodology
Fog computing
Functional encryption
Leakage Resilient Cryptography
Pair encoding
Issue Date: 2018
Publisher: Elsevier
Source: Future generation computer systems, 2018, v. 78, p. 763-777 How to cite?
Journal: Future generation computer systems 
Abstract: Fog Computing, a technology that takes advantage of both the paradigms of Cloud Computing and the Internet of Things, has a great advantage in reducing the communication cost. Since its introduction, fog computing has found a lot of applications, including, for instance, connected vehicles, wireless sensors, smart cities and etc. One prominent problem in fog computing is how fine-grained access control can be imposed. Functional encryption, a new cryptographic primitive, is known to support fine-grained access control. However, when it comes to some new threats in the fog computing scenario, such as side channel attacks, functional encryption cannot maintain its security. Therefore, we need new cryptographic primitives that not only provide a way to securely share data with a fine-grained access control but also are able to resist those new threats. In this paper, we consider how to construct functional encryption schemes (FEs) adaptively secure in continual memory leakage model (CML), which is one of the strongest models that allows continuous leakage on both user and master secret keys. Besides providing privacy and fine-grained access control in fog computing, our scheme can also guarantee security against side channel attacks. More concretely, we propose a generic framework for constructing fully secure leakage-resilient FEs (LR-FEs) in the CML model results from leakage-resilient pair encoding, which is an extension of pair encoding presented in the recent work of Attrapadung. In this way, our framework simplifies the design and analysis of LR-FEs into the design and analysis of predicate encodings. Moreover, we discover new adaptively secure LR-FEs, including FE for regular languages, attribute-based encryption (ABE) for large universe and ABE with short ciphertext. Above all, leakage-resilient adaptively secure functional encryption schemes can equip fog computing with higher security and fine-grained access control.
ISSN: 0167-739X
DOI: 10.1016/j.future.2017.01.025
Appears in Collections:Journal/Magazine Article

View full-text via PolyU eLinks SFX Query
Show full item record


Last Week
Last month
Citations as of Mar 22, 2019


Last Week
Last month
Citations as of Apr 9, 2019

Page view(s)

Last Week
Last month
Citations as of Oct 22, 2019

Google ScholarTM



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.