...
首页> 外文期刊>IEEE transactions on dependable and secure computing >Service Outsourcing in F2C Architecture with Attribute-based Anonymous Access Control and Bounded Service Number
【24h】

Service Outsourcing in F2C Architecture with Attribute-based Anonymous Access Control and Bounded Service Number

机译:使用基于属性的匿名访问控制和有界服务号码的F2C架构中的服务外包

获取原文
获取原文并翻译 | 示例
           

摘要

F2C (fog-to-cloud) enables service providers to rent the low-cost cloud/fog resources to publish their services, and the fog nodes, which are deployed at the edge, can provide short-latency service to users. However, new security threats come along with this new computing paradigm, where the access control and trusted payment are concerned in this work. We propose a privacy-preserving authentication scheme. By integrating k-times anonymous authentication (k-TAA) and attribute-based access control, in our proposed scheme, service providers can autonomously determine a fine-grained access policy and the maximal access times for authorized users. Thus, users who satisfy the access policy can receive benefits of this service for certain number of times without leaking any private information. Our authentication phase has a low latency because it is offloaded to the fog as what the service does. This paper presents a lightweight and trusted billing mechanism using Merkle Hash Tree (MHT), which can detect the cloud's service forgery with high probability, without costing too much of service provider's bandwidth and computation. Rigorous security analysis proves that the proposed scheme is secure against malicious users, fogs, and cloud, and the experimental results show the significant performance advantage on both the delay reduction and service providers' cost saving.
机译:F2C(雾到云)使服务提供商能够租用低成本的云/雾资源来发布其服务,而部署在边缘的雾节点可以为用户提供短期延迟服务。然而,新的安全威胁与这种新的计算范例相同,其中访问控制和可信支付在这项工作中关注。我们提出了一种隐私保留的身份验证方案。通过集成K次匿名认证(K-TAA)和基于属性的访问控制,在我们所提出的方案中,服务提供商可以自主地确定授权用户的细粒度访问策略和最大访问时间。因此,满足访问策略的用户可以在不泄露任何私人信息的情况下为某个次服务接收该服务的益处。我们的身份验证阶段具有低延迟,因为它将其卸载到FOG,以及服务的确实。本文介绍了使用Merkle哈希树(MHT)的轻量级和可信的结算机制,它可以通过高概率检测云的服务伪造,而不会降低过多的服务提供商的带宽和计算。严格的安全分析证明,拟议的计划是防止恶意用户,雾和云的安全性,实验结果表明了延迟减少和服务提供商节省成本的显着性能优势。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号