Expressive bilateral access control for Internet-of-Things in cloud-fog computing

As a versatile system architecture, cloud-fog Internet-of-Things (IoT) enables multiple resource-constrained devices to communicate and collaborate with each other. By outsourcing local data and immigrating expensive workloads to cloud service providers and fog nodes (FNs), resource-constrained devi...

Full description

Saved in:
Bibliographic Details
Main Authors: XU, Shengmin, NING, Jianting, MA, Jinhua, HUANG, Xinyi, PANG, Hwee Hwa, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2021
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/6739
https://ink.library.smu.edu.sg/context/sis_research/article/7742/viewcontent/3450569.3463561.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-7742
record_format dspace
spelling sg-smu-ink.sis_research-77422022-01-27T10:53:17Z Expressive bilateral access control for Internet-of-Things in cloud-fog computing XU, Shengmin NING, Jianting MA, Jinhua HUANG, Xinyi PANG, Hwee Hwa DENG, Robert H. As a versatile system architecture, cloud-fog Internet-of-Things (IoT) enables multiple resource-constrained devices to communicate and collaborate with each other. By outsourcing local data and immigrating expensive workloads to cloud service providers and fog nodes (FNs), resource-constrained devices can enjoy data services with low latency and minimal cost. To protect data security and privacy in the untrusted cloud-fog environment, many cryptographic mechanisms have been invented. Unfortunately, most of them are impractical when directly applied to cloud-fog IoT computing, mainly due to the large number of resource-constrained end-devices (EDs). In this paper, we present a secure cloud-fog IoT data sharing system with bilateral access control based on a new cryptographic tool called lightweight matchmaking encryption. Our system enforces both sender access control and receiver access control simultaneously and adapts to resource-constrained EDs by outsourcing costly workloads to FNs. We conduct extensive experiments to demonstrate the superior performance of our system to the most relevant solutions in the literature. 2021-06-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/6739 info:doi/10.1145/3450569.3463561 https://ink.library.smu.edu.sg/context/sis_research/article/7742/viewcontent/3450569.3463561.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Internet-of-Things Bilateral Access Control Cloud-Fog Computing Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Internet-of-Things
Bilateral Access Control
Cloud-Fog Computing
Information Security
spellingShingle Internet-of-Things
Bilateral Access Control
Cloud-Fog Computing
Information Security
XU, Shengmin
NING, Jianting
MA, Jinhua
HUANG, Xinyi
PANG, Hwee Hwa
DENG, Robert H.
Expressive bilateral access control for Internet-of-Things in cloud-fog computing
description As a versatile system architecture, cloud-fog Internet-of-Things (IoT) enables multiple resource-constrained devices to communicate and collaborate with each other. By outsourcing local data and immigrating expensive workloads to cloud service providers and fog nodes (FNs), resource-constrained devices can enjoy data services with low latency and minimal cost. To protect data security and privacy in the untrusted cloud-fog environment, many cryptographic mechanisms have been invented. Unfortunately, most of them are impractical when directly applied to cloud-fog IoT computing, mainly due to the large number of resource-constrained end-devices (EDs). In this paper, we present a secure cloud-fog IoT data sharing system with bilateral access control based on a new cryptographic tool called lightweight matchmaking encryption. Our system enforces both sender access control and receiver access control simultaneously and adapts to resource-constrained EDs by outsourcing costly workloads to FNs. We conduct extensive experiments to demonstrate the superior performance of our system to the most relevant solutions in the literature.
format text
author XU, Shengmin
NING, Jianting
MA, Jinhua
HUANG, Xinyi
PANG, Hwee Hwa
DENG, Robert H.
author_facet XU, Shengmin
NING, Jianting
MA, Jinhua
HUANG, Xinyi
PANG, Hwee Hwa
DENG, Robert H.
author_sort XU, Shengmin
title Expressive bilateral access control for Internet-of-Things in cloud-fog computing
title_short Expressive bilateral access control for Internet-of-Things in cloud-fog computing
title_full Expressive bilateral access control for Internet-of-Things in cloud-fog computing
title_fullStr Expressive bilateral access control for Internet-of-Things in cloud-fog computing
title_full_unstemmed Expressive bilateral access control for Internet-of-Things in cloud-fog computing
title_sort expressive bilateral access control for internet-of-things in cloud-fog computing
publisher Institutional Knowledge at Singapore Management University
publishDate 2021
url https://ink.library.smu.edu.sg/sis_research/6739
https://ink.library.smu.edu.sg/context/sis_research/article/7742/viewcontent/3450569.3463561.pdf
_version_ 1770576057394528256