A Scalable Access Control Method for Fog Computing

An access control and fog computing technology, which is applied in the transmission system, electrical components, etc., can solve the problem that the access control strategy cannot be directly applied, and achieve the effect of integrity protection and reduction of computing overhead

Active Publication Date: 2021-07-27
NANJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although access control technology in cloud computing has been widely studied, considering the differences in network architecture and system model of fog computing, the existing access control strategies suitable for cloud computing cannot be directly applied to the field of fog computing.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Scalable Access Control Method for Fog Computing
  • A Scalable Access Control Method for Fog Computing
  • A Scalable Access Control Method for Fog Computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to describe the technical solutions disclosed in the present invention in detail, further elaboration will be made below in conjunction with the accompanying drawings and embodiments.

[0043] What the present invention discloses is an extensible access control method oriented to fog computing. The schematic diagram of the model of multi-keyword sortable ciphertext retrieval method oriented to cloud computing is as follows figure 1 As shown, it specifically includes the following steps:

[0044] Step1: Enter security parameters 1 λ , the number of attributes N set in the access policy, the system parameter m and the master key mk are generated by the trusted institution, where the system parameter m is arbitrarily disclosed, and the master key mk is kept by the trusted institution. The specific determination methods include the following:

[0045] The system parameter m is (PG, g, u, g 1 , g 2 ,..., g N , h, g α , e(h, h) α ,(E,D));

[0046] master key ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an extensible access control method oriented to fog computing. The method adopts a linear secret sharing matrix as an access structure to realize attribute-based access control, uses fog nodes as edge service nodes, and reasonably distributes encryption and decryption in access control. computing to reduce the computing overhead of end users in access control. Moreover, the present invention can add new legal members to form a new access policy on the basis of maintaining the original access policy, and can also detect whether the access user has tampered with the original data when uploading the new access policy, and realizes the original data. Integrity protection.

Description

technical field [0001] The invention belongs to computer application technology, and in particular relates to an extensible access control method oriented to fog computing. Background technique [0002] Cloud computing technology brings users unprecedented computing power and almost unlimited storage space. Users can use the cloud platform to realize a series of massive data analysis, processing, storage and other work. However, because the core network where the cloud platform server is located is often far away from the end users, this has led to the inability of cloud computing to provide reliable real-time responses in practical applications, especially in applications that require high real-time requirements. Bottlenecks that limit cloud computing applications. Among them, fog computing, as a typical edge computing model, has gradually become a research hotspot in recent years. Fog computing has the advantages of low latency, mobility, and distribution, so it can well...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 许建雷喆杨庚戴华陈燕俐陈蕾
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products