Outsourced Attribute-Based Encryption Scheme Based on Semantic Technology in Fog Computing

Haiyang He,Jingsha He
DOI: https://doi.org/10.1109/icceic60201.2023.10426701
2023-01-01
Abstract:As a new computing paradigm, fog computing extends the ability of cloud computing to the edge of the network and is widely used in the Internet of Things scenario. However, with the rapid development of fog computing, the problem of data security is becoming more and more obvious. It is very important to establish an efficient access control mechanism in fog computing. CP-ABE is an effective encryption mechanism, which is very suitable for fine-grained access control in distributed scenarios. However, in the process of applying CPABE to fog computing, there are problems such as low computational efficiency and complex attribute management. According to the characteristics of fog computing scenarios, this paper makes theoretical research and algorithm improvement on the access control mechanism based on CP-ABE, and proposes an outsourced attribute-based encryption scheme supporting attribute semantic mapping. The scheme is established in the environment of multiple attribute authorization agencies, and realizes outsourcing encryption and outsourcing decryption, which greatly improves the computational efficiency of the terminal. In addition, semantic technology is used to manage the attributes in the system, and the user 's attribute key is semantically enhanced to realize the semantic mapping of attributes. Security and performance analysis show that the scheme is secure under the DBDH assumption and has high computational performance.
What problem does this paper attempt to address?