Expressive bilateral access control for Internet-of-Things in cloud-fog computing
As a versatile system architecture, cloud-fog Internet-of-Things (IoT) enables multiple resource-constrained devices to communicate and collaborate with each other. By outsourcing local data and immigrating expensive workloads to cloud service providers and fog nodes (FNs), resource-constrained devi...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2021
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/6739 https://ink.library.smu.edu.sg/context/sis_research/article/7742/viewcontent/3450569.3463561.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-7742 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-77422022-01-27T10:53:17Z Expressive bilateral access control for Internet-of-Things in cloud-fog computing XU, Shengmin NING, Jianting MA, Jinhua HUANG, Xinyi PANG, Hwee Hwa DENG, Robert H. As a versatile system architecture, cloud-fog Internet-of-Things (IoT) enables multiple resource-constrained devices to communicate and collaborate with each other. By outsourcing local data and immigrating expensive workloads to cloud service providers and fog nodes (FNs), resource-constrained devices can enjoy data services with low latency and minimal cost. To protect data security and privacy in the untrusted cloud-fog environment, many cryptographic mechanisms have been invented. Unfortunately, most of them are impractical when directly applied to cloud-fog IoT computing, mainly due to the large number of resource-constrained end-devices (EDs). In this paper, we present a secure cloud-fog IoT data sharing system with bilateral access control based on a new cryptographic tool called lightweight matchmaking encryption. Our system enforces both sender access control and receiver access control simultaneously and adapts to resource-constrained EDs by outsourcing costly workloads to FNs. We conduct extensive experiments to demonstrate the superior performance of our system to the most relevant solutions in the literature. 2021-06-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/6739 info:doi/10.1145/3450569.3463561 https://ink.library.smu.edu.sg/context/sis_research/article/7742/viewcontent/3450569.3463561.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Internet-of-Things Bilateral Access Control Cloud-Fog Computing Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Internet-of-Things Bilateral Access Control Cloud-Fog Computing Information Security |
spellingShingle |
Internet-of-Things Bilateral Access Control Cloud-Fog Computing Information Security XU, Shengmin NING, Jianting MA, Jinhua HUANG, Xinyi PANG, Hwee Hwa DENG, Robert H. Expressive bilateral access control for Internet-of-Things in cloud-fog computing |
description |
As a versatile system architecture, cloud-fog Internet-of-Things (IoT) enables multiple resource-constrained devices to communicate and collaborate with each other. By outsourcing local data and immigrating expensive workloads to cloud service providers and fog nodes (FNs), resource-constrained devices can enjoy data services with low latency and minimal cost. To protect data security and privacy in the untrusted cloud-fog environment, many cryptographic mechanisms have been invented. Unfortunately, most of them are impractical when directly applied to cloud-fog IoT computing, mainly due to the large number of resource-constrained end-devices (EDs). In this paper, we present a secure cloud-fog IoT data sharing system with bilateral access control based on a new cryptographic tool called lightweight matchmaking encryption. Our system enforces both sender access control and receiver access control simultaneously and adapts to resource-constrained EDs by outsourcing costly workloads to FNs. We conduct extensive experiments to demonstrate the superior performance of our system to the most relevant solutions in the literature. |
format |
text |
author |
XU, Shengmin NING, Jianting MA, Jinhua HUANG, Xinyi PANG, Hwee Hwa DENG, Robert H. |
author_facet |
XU, Shengmin NING, Jianting MA, Jinhua HUANG, Xinyi PANG, Hwee Hwa DENG, Robert H. |
author_sort |
XU, Shengmin |
title |
Expressive bilateral access control for Internet-of-Things in cloud-fog computing |
title_short |
Expressive bilateral access control for Internet-of-Things in cloud-fog computing |
title_full |
Expressive bilateral access control for Internet-of-Things in cloud-fog computing |
title_fullStr |
Expressive bilateral access control for Internet-of-Things in cloud-fog computing |
title_full_unstemmed |
Expressive bilateral access control for Internet-of-Things in cloud-fog computing |
title_sort |
expressive bilateral access control for internet-of-things in cloud-fog computing |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2021 |
url |
https://ink.library.smu.edu.sg/sis_research/6739 https://ink.library.smu.edu.sg/context/sis_research/article/7742/viewcontent/3450569.3463561.pdf |
_version_ |
1770576057394528256 |