TITLE:
Attribute-Based Secure Data Sharing with Efficient Revocation in Fog Computing
AUTHORS:
Asma Alotaibi, Ahmed Barnawi, Mohammed Buhari
KEYWORDS:
Attribute-Based Encryption, Fine-Grained Access Control, Fog Computing, Proxy Re-Encryption, User Revocation
JOURNAL NAME:
Journal of Information Security,
Vol.8 No.3,
July
14,
2017
ABSTRACT:
Fog computing is a concept that extends the paradigm of cloud computing to
the network edge. The goal of fog computing is to situate resources in the vicinity
of end users. As with cloud computing, fog computing provides storage
services. The data owners can store their confidential data in many fog nodes,
which could cause more challenges for data sharing security. In this paper, we
present a novel architecture for data sharing in a fog environment. We explore
the benefits of fog computing in addressing one-to-many data sharing applications.
This architecture sought to outperform the cloud-based architecture
and to ensure further enhancements to system performance, especially from
the perspective of security. We will address the security challenges of data
sharing, such as fine-grained access control, data confidentiality, collusion resistance,
scalability, and the issue of user revocation. Keeping these issues in
mind, we will secure data sharing in fog computing by combining attributebased
encryption and proxy re-encryption techniques. Findings of this study
indicate that our system has the response and processing time faster than classical
cloud systems. Further, experimental results show that our system has an
efficient user revocation mechanism, and that it provides high scalability and
sharing of data in real time with low latency.