Journal of Information Security

Volume 8, Issue 3 (July 2017)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

Attribute-Based Secure Data Sharing with Efficient Revocation in Fog Computing

HTML  XML Download Download as PDF (Size: 1775KB)  PP. 203-222  
DOI: 10.4236/jis.2017.83014    1,763 Downloads   3,531 Views  Citations

ABSTRACT

Fog computing is a concept that extends the paradigm of cloud computing to the network edge. The goal of fog computing is to situate resources in the vicinity of end users. As with cloud computing, fog computing provides storage services. The data owners can store their confidential data in many fog nodes, which could cause more challenges for data sharing security. In this paper, we present a novel architecture for data sharing in a fog environment. We explore the benefits of fog computing in addressing one-to-many data sharing applications. This architecture sought to outperform the cloud-based architecture and to ensure further enhancements to system performance, especially from the perspective of security. We will address the security challenges of data sharing, such as fine-grained access control, data confidentiality, collusion resistance, scalability, and the issue of user revocation. Keeping these issues in mind, we will secure data sharing in fog computing by combining attributebased encryption and proxy re-encryption techniques. Findings of this study indicate that our system has the response and processing time faster than classical cloud systems. Further, experimental results show that our system has an efficient user revocation mechanism, and that it provides high scalability and sharing of data in real time with low latency.

Share and Cite:

Alotaibi, A. , Barnawi, A. and Buhari, M. (2017) Attribute-Based Secure Data Sharing with Efficient Revocation in Fog Computing. Journal of Information Security, 8, 203-222. doi: 10.4236/jis.2017.83014.

Cited by

[1] Security in Internet of Things: A review
IEEE Access, 2022
[2] A Comprehensive Survey of Security Challenges and Threats in Internet of Things
2021 5th International …, 2021
[3] Securing Fog Federation from Behavior of Rogue Nodes
2021
[4] Application of Computer Network Security Data Encryption Technology
Frontier Computing: Proceedings of FC 2020, 2021
[5] HIBAF: A data security scheme for fog computing
Journal of High …, 2021
[6] Comprehensive report on Homomorphic technique in Healthcare Domain
2021
[7] Secure Computing Resource Allocation Framework For Open Fog Computing
2020
[8] Survey on IoT: Security Threats and Applications
2020
[9] 포그 컴퓨팅 환경에서 IoT 보안에 관한 연구 동향
2019
[10] A survey on iot security: Application areas, security threats, and solution architectures
2019
[11] Security architecture for Fog-To-Cloud continuum system
2019
[12] A Review on various secure data access schemes and techniques in Fog for Internet of Things
2018
[13] Securing fog computing for internet of things applications: Challenges and solutions
2017

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.