Attribute-Based Secure Data Sharing with Efficient Revocation in Fog Computing

HTML  XML Download Download as PDF (Size: 1775KB)  PP. 203-222  
DOI: 10.4236/jis.2017.83014    1,747 Downloads   3,759 Views  Citations

ABSTRACT

Fog computing is a concept that extends the paradigm of cloud computing to the network edge. The goal of fog computing is to situate resources in the vicinity of end users. As with cloud computing, fog computing provides storage services. The data owners can store their confidential data in many fog nodes, which could cause more challenges for data sharing security. In this paper, we present a novel architecture for data sharing in a fog environment. We explore the benefits of fog computing in addressing one-to-many data sharing applications. This architecture sought to outperform the cloud-based architecture and to ensure further enhancements to system performance, especially from the perspective of security. We will address the security challenges of data sharing, such as fine-grained access control, data confidentiality, collusion resistance, scalability, and the issue of user revocation. Keeping these issues in mind, we will secure data sharing in fog computing by combining attributebased encryption and proxy re-encryption techniques. Findings of this study indicate that our system has the response and processing time faster than classical cloud systems. Further, experimental results show that our system has an efficient user revocation mechanism, and that it provides high scalability and sharing of data in real time with low latency.

Share and Cite:

Alotaibi, A. , Barnawi, A. and Buhari, M. (2017) Attribute-Based Secure Data Sharing with Efficient Revocation in Fog Computing. Journal of Information Security, 8, 203-222. doi: 10.4236/jis.2017.83014.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.