Cloud Computing, Smart Grid and Innovative Frontiers in Telecommunications. 9th EAI International Conference, CloudComp 2019, and 4th EAI International Conference, SmartGIFT 2019, Beijing, China, December 4-5, 2019, and December 21-22, 2019

Research Article

A Secure Data Access Control Scheme Without Bilinear Pairing in Edge Computing

Download
70 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-48513-9_46,
        author={Xiaofei Sheng and Junhua Wu and Guangshun Li and Qingyan Lin and Yonghui Yao},
        title={A Secure Data Access Control Scheme Without Bilinear Pairing in Edge Computing},
        proceedings={Cloud Computing, Smart Grid and Innovative Frontiers in Telecommunications. 9th EAI International Conference, CloudComp 2019, and 4th EAI International Conference, SmartGIFT 2019, Beijing, China, December 4-5, 2019, and December 21-22, 2019},
        proceedings_a={CLOUDCOMP},
        year={2020},
        month={6},
        keywords={Access control Edge computing Bilinear pairing Data encryption},
        doi={10.1007/978-3-030-48513-9_46}
    }
    
  • Xiaofei Sheng
    Junhua Wu
    Guangshun Li
    Qingyan Lin
    Yonghui Yao
    Year: 2020
    A Secure Data Access Control Scheme Without Bilinear Pairing in Edge Computing
    CLOUDCOMP
    Springer
    DOI: 10.1007/978-3-030-48513-9_46
Xiaofei Sheng1, Junhua Wu1, Guangshun Li,*, Qingyan Lin1, Yonghui Yao1
  • 1: Qufu Normal University
*Contact email: guangshunli@qfnu.edu.cn

Abstract

Edge computing, as an extension of cloud computing, subcontracts the personal private data to edge nodes on the edge network of Internet of Things (IoT) to decrease transmission delay and network congestion. So, a major security concern in edge computing is access control issues for shared data. In this paper we introduce a scheme without bilinear pairing encryption (Un-BPE) to provide access control in edge and cloud communication. To achieve confidentiality, verifiability and access control, the secret key is generated by Key Trust Authority (KTA), end users and edge node together, and saved in cloud platform; the operations of verification are performed by the adjacent edge node; and the operations of encryption and decryption are performed by the terminal device. We verify the efficiency of our scheme in terms of the security of the encryption algorithm and the performance of the system. The analysis of the proposed scheme reveals better computational efficiency.