메뉴 건너뛰기




Volumn 78, Issue , 2018, Pages 763-777

Towards leakage-resilient fine-grained access control in fog computing

Author keywords

Dual system methodology; Fog computing; Functional encryption; Leakage Resilient Cryptography; Pair encoding

Indexed keywords

CRYPTOGRAPHY; ENCODING (SYMBOLS); FOG; SIDE CHANNEL ATTACK; SMART CITY;

EID: 85011802339     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2017.01.025     Document Type: Article
Times cited : (43)

References (83)
  • 3
    • 78649302229 scopus 로고    scopus 로고
    • Cloud computing: state-of-the-art and research challenges
    • Zhang, Q., Cheng, L., Boutaba, R., Cloud computing: state-of-the-art and research challenges. J. Internet Serv. Appl. 1:1 (2010), 7–18.
    • (2010) J. Internet Serv. Appl. , vol.1 , Issue.1 , pp. 7-18
    • Zhang, Q.1    Cheng, L.2    Boutaba, R.3
  • 4
    • 84991042624 scopus 로고    scopus 로고
    • Cloud cryptography: Theory, practice and future research directions
    • Choo, K.-K.R., Domingo-Ferrer, J., Zhang, L., Cloud cryptography: Theory, practice and future research directions. Future Gener. Comput. Syst. 62 (2016), 51–53.
    • (2016) Future Gener. Comput. Syst. , vol.62 , pp. 51-53
    • Choo, K.-K.R.1    Domingo-Ferrer, J.2    Zhang, L.3
  • 7
    • 84967214668 scopus 로고    scopus 로고
    • A taxonomy of cloud attack consequences and mitigation strategies: The role of access control and privileged access management
    • IEEE
    • Tep, K.S., Martini, B., Hunt, R., Choo, K.-K.R., A taxonomy of cloud attack consequences and mitigation strategies: The role of access control and privileged access management. Trustcom/BigDataSE/ISPA, 2015 IEEE, Vol. 1, 2015, IEEE, 1073–1080.
    • (2015) Trustcom/BigDataSE/ISPA, 2015 IEEE, Vol. 1 , pp. 1073-1080
    • Tep, K.S.1    Martini, B.2    Hunt, R.3    Choo, K.-K.R.4
  • 8
    • 85029608498 scopus 로고    scopus 로고
    • Segoac: A tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing
    • Ren, W., Liu, R., Lei, M., Choo, K.-K.R., Segoac: A tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing. Comput. Stand. Interfaces, 2016.
    • (2016) Comput. Stand. Interfaces
    • Ren, W.1    Liu, R.2    Lei, M.3    Choo, K.-K.R.4
  • 9
    • 80955160447 scopus 로고    scopus 로고
    • That ‘internet of things’ thing
    • Ashton, K., That ‘internet of things’ thing. RFiD J. 22:7 (2009), 97–114.
    • (2009) RFiD J. , vol.22 , Issue.7 , pp. 97-114
    • Ashton, K.1
  • 10
    • 77956877124 scopus 로고    scopus 로고
    • The Internet of things: A survey
    • Atzori, L., Iera, A., Morabito, G., The Internet of things: A survey. Comput. Netw. 54:15 (2010), 2787–2805.
    • (2010) Comput. Netw. , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 13
    • 73649137161 scopus 로고    scopus 로고
    • The path of the smart grid
    • Farhangi, H., The path of the smart grid. IEEE Power Energy Mag. 8:1 (2010), 18–28.
    • (2010) IEEE Power Energy Mag. , vol.8 , Issue.1 , pp. 18-28
    • Farhangi, H.1
  • 14
    • 27744595750 scopus 로고    scopus 로고
    • Toward a smart grid: power delivery for the 21st century
    • Amin, S.M., Wollenberg, B.F., Toward a smart grid: power delivery for the 21st century. IEEE Power Energy Mag. 3:5 (2005), 34–41.
    • (2005) IEEE Power Energy Mag. , vol.3 , Issue.5 , pp. 34-41
    • Amin, S.M.1    Wollenberg, B.F.2
  • 17
    • 84950986038 scopus 로고    scopus 로고
    • Distributed analytics and edge intelligence: Pervasive health monitoring at the era of fog computing
    • ACM
    • Cao, Y., Hou, P., Brown, D., Wang, J., Chen, S., Distributed analytics and edge intelligence: Pervasive health monitoring at the era of fog computing. Proceedings of the 2015 Workshop on Mobile Big Data, 2015, ACM, 43–48.
    • (2015) Proceedings of the 2015 Workshop on Mobile Big Data , pp. 43-48
    • Cao, Y.1    Hou, P.2    Brown, D.3    Wang, J.4    Chen, S.5
  • 21
    • 84874108116 scopus 로고    scopus 로고
    • Beyond lightning: A survey on security challenges in cloud computing
    • Rong, C., Nguyen, S.T., Jaatun, M.G., Beyond lightning: A survey on security challenges in cloud computing. Comput. Electr. Eng. 39:1 (2013), 47–54.
    • (2013) Comput. Electr. Eng. , vol.39 , Issue.1 , pp. 47-54
    • Rong, C.1    Nguyen, S.T.2    Jaatun, M.G.3
  • 22
    • 84951994695 scopus 로고    scopus 로고
    • Cloud Security: Issues and Concerns
    • Wiley New York
    • Samarati, P., di Vimercati, S.D.C., Cloud Security: Issues and Concerns. 2016, Wiley, New York.
    • (2016)
    • Samarati, P.1    di Vimercati, S.D.C.2
  • 23
    • 84910149653 scopus 로고    scopus 로고
    • Security of the Internet of things: Perspectives and challenges
    • Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D., Security of the Internet of things: Perspectives and challenges. Wirel. Netw. 20:8 (2014), 2481–2501.
    • (2014) Wirel. Netw. , vol.20 , Issue.8 , pp. 2481-2501
    • Jing, Q.1    Vasilakos, A.V.2    Wan, J.3    Lu, J.4    Qiu, D.5
  • 24
    • 84879225866 scopus 로고    scopus 로고
    • On the features and challenges of security and privacy in distributed Internet of things
    • Roman, R., Zhou, J., Lopez, J., On the features and challenges of security and privacy in distributed Internet of things. Comput. Netw. 57:10 (2013), 2266–2279.
    • (2013) Comput. Netw. , vol.57 , Issue.10 , pp. 2266-2279
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 25
    • 84906834039 scopus 로고    scopus 로고
    • Internet of things in industries: A survey
    • Da Xu, L., He, W., Li, S., Internet of things in industries: A survey. IEEE Trans. Ind. Inf. 10:4 (2014), 2233–2243.
    • (2014) IEEE Trans. Ind. Inf. , vol.10 , Issue.4 , pp. 2233-2243
    • Da Xu, L.1    He, W.2    Li, S.3
  • 27
    • 84902429611 scopus 로고    scopus 로고
    • Cloud Storage Forensics
    • Syngress
    • Quick, D., Martini, B., Choo, R., Cloud Storage Forensics. 2013, Syngress.
    • (2013)
    • Quick, D.1    Martini, B.2    Choo, R.3
  • 30
    • 84995549442 scopus 로고    scopus 로고
    • Remote wiping and secure deletion on mobile devices: a review
    • Leom, M.D., Choo, K.-K.R., Hunt, R., Remote wiping and secure deletion on mobile devices: a review. J. Forensic Sci., 2016.
    • (2016) J. Forensic Sci.
    • Leom, M.D.1    Choo, K.-K.R.2    Hunt, R.3
  • 31
    • 84942465510 scopus 로고    scopus 로고
    • A cloud-focused mobile forensics methodology
    • Do, Q., Martini, B., Choo, K.-K.R., A cloud-focused mobile forensics methodology. IEEE Cloud Comput. 2:4 (2015), 60–65.
    • (2015) IEEE Cloud Comput. , vol.2 , Issue.4 , pp. 60-65
    • Do, Q.1    Martini, B.2    Choo, K.-K.R.3
  • 32
    • 84920152770 scopus 로고    scopus 로고
    • Distributed filesystem forensics: Xtreemfs as a case study
    • Martini, B., Choo, K.-K.R., Distributed filesystem forensics: Xtreemfs as a case study. Digit. Investig. 11:4 (2014), 295–313.
    • (2014) Digit. Investig. , vol.11 , Issue.4 , pp. 295-313
    • Martini, B.1    Choo, K.-K.R.2
  • 34
    • 85029637110 scopus 로고    scopus 로고
    • Data exfiltration from Internet of things devices: ios devices as case studies.
    • C.J. DOrazio, K.-K.R. Choo, L.T. Yang, Data exfiltration from Internet of things devices: ios devices as case studies.
    • DOrazio, C.J.1    Choo, K.-K.R.2    Yang, L.T.3
  • 35
    • 84889083567 scopus 로고    scopus 로고
    • Cloud storage forensics: owncloud as a case study
    • Martini, B., Choo, K.-K.R., Cloud storage forensics: owncloud as a case study. Digit. Investig. 10:4 (2013), 287–299.
    • (2013) Digit. Investig. , vol.10 , Issue.4 , pp. 287-299
    • Martini, B.1    Choo, K.-K.R.2
  • 36
    • 84870243026 scopus 로고    scopus 로고
    • An integrated conceptual digital forensic framework for cloud computing
    • Martini, B., Choo, K.-K.R., An integrated conceptual digital forensic framework for cloud computing. Digit. Investig. 9:2 (2012), 71–80.
    • (2012) Digit. Investig. , vol.9 , Issue.2 , pp. 71-80
    • Martini, B.1    Choo, K.-K.R.2
  • 37
    • 84916888408 scopus 로고    scopus 로고
    • Impacts of increasing volume of digital forensic data: A survey and future research challenges
    • Quick, D., Choo, K.-K.R., Impacts of increasing volume of digital forensic data: A survey and future research challenges. Digit. Investig. 11:4 (2014), 273–294.
    • (2014) Digit. Investig. , vol.11 , Issue.4 , pp. 273-294
    • Quick, D.1    Choo, K.-K.R.2
  • 38
    • 84896319180 scopus 로고    scopus 로고
    • Google drive: forensic analysis of data remnants
    • Quick, D., Choo, K.-K.R., Google drive: forensic analysis of data remnants. J. Netw. Comput. Appl. 40 (2014), 179–193.
    • (2014) J. Netw. Comput. Appl. , vol.40 , pp. 179-193
    • Quick, D.1    Choo, K.-K.R.2
  • 39
    • 84877809583 scopus 로고    scopus 로고
    • Dropbox analysis: Data remnants on user machines
    • Quick, D., Choo, K.-K.R., Dropbox analysis: Data remnants on user machines. Digit. Investig. 10:1 (2013), 3–18.
    • (2013) Digit. Investig. , vol.10 , Issue.1 , pp. 3-18
    • Quick, D.1    Choo, K.-K.R.2
  • 40
    • 84884589497 scopus 로고    scopus 로고
    • Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?
    • Quick, D., Choo, K.-K.R., Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?. Digit. Investig. 10:3 (2013), 266–277.
    • (2013) Digit. Investig. , vol.10 , Issue.3 , pp. 266-277
    • Quick, D.1    Choo, K.-K.R.2
  • 41
    • 84875147433 scopus 로고    scopus 로고
    • Digital droplets: Microsoft skydrive forensic data remnants
    • Quick, D., Choo, K.-K.R., Digital droplets: Microsoft skydrive forensic data remnants. Future Gener. Comput. Syst. 29:6 (2013), 1378–1394.
    • (2013) Future Gener. Comput. Syst. , vol.29 , Issue.6 , pp. 1378-1394
    • Quick, D.1    Choo, K.-K.R.2
  • 44
    • 84870885441 scopus 로고    scopus 로고
    • Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
    • Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W., Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24:1 (2013), 131–143.
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.1 , pp. 131-143
    • Li, M.1    Yu, S.2    Zheng, Y.3    Ren, K.4    Lou, W.5
  • 45
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • IEEE
    • Yu, S., Wang, C., Ren, K., Lou, W., Achieving secure, scalable, and fine-grained data access control in cloud computing. Infocom, 2010 proceedings IEEE, 2010, IEEE, 1–9.
    • (2010) Infocom, 2010 proceedings IEEE , pp. 1-9
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 46
    • 84906492508 scopus 로고    scopus 로고
    • Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks
    • Springer
    • Yuen, T.H., Zhang, Y., Yiu, S.M., Liu, J.K., Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks. European Symposium on Research in Computer Security, 2014, Springer, 130–147.
    • (2014) European Symposium on Research in Computer Security , pp. 130-147
    • Yuen, T.H.1    Zhang, Y.2    Yiu, S.M.3    Liu, J.K.4
  • 47
    • 84939245573 scopus 로고    scopus 로고
    • times attribute-based anonymous access control for cloud computing
    • Yuen, T.H., Liu, J.K., Au, M.H., Huang, X., Susilo, W., Zhou, J., -times attribute-based anonymous access control for cloud computing. IEEE Trans. Comput. 64:9 (2015), 2595–2608.
    • (2015) IEEE Trans. Comput. , vol.64 , Issue.9 , pp. 2595-2608
    • Yuen, T.H.1    Liu, J.K.2    Au, M.H.3    Huang, X.4    Susilo, W.5    Zhou, J.6
  • 48
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Springer
    • Kocher, P.C., Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. Annual International Cryptology Conference, 1996, Springer, 104–113.
    • (1996) Annual International Cryptology Conference , pp. 104-113
    • Kocher, P.C.1
  • 53
    • 79953188689 scopus 로고    scopus 로고
    • Signatures resilient to continual leakage on memory and computation
    • Springer
    • Malkin, T., Teranishi, I., Vahlis, Y., Yung, M., Signatures resilient to continual leakage on memory and computation. Theory of Cryptography, 2011, Springer, 89–106.
    • (2011) Theory of Cryptography , pp. 89-106
    • Malkin, T.1    Teranishi, I.2    Vahlis, Y.3    Yung, M.4
  • 57
    • 79953164949 scopus 로고    scopus 로고
    • Achieving leakage resilience through dual system encryption
    • Springer
    • Lewko, A., Rouselakis, Y., Waters, B., Achieving leakage resilience through dual system encryption. Theory of Cryptography, 2011, Springer, 70–88.
    • (2011) Theory of Cryptography , pp. 70-88
    • Lewko, A.1    Rouselakis, Y.2    Waters, B.3
  • 59
    • 84901650094 scopus 로고    scopus 로고
    • Dual system encryption via doubly selective security: Framework, fully secure functional encryption for regular languages, and more
    • Springer
    • Attrapadung, N., Dual system encryption via doubly selective security: Framework, fully secure functional encryption for regular languages, and more. Advances in Cryptology–EUROCRYPT 2014, 2014, Springer, 557–577.
    • (2014) Advances in Cryptology–EUROCRYPT 2014 , pp. 557-577
    • Attrapadung, N.1
  • 60
    • 0001827537 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Springer
    • Shamir, A., Identity-based cryptosystems and signature schemes. Advances in Cryptology, 1984, Springer, 47–53.
    • (1984) Advances in Cryptology , pp. 47-53
    • Shamir, A.1
  • 62
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-id secure identity-based encryption without random oracles
    • Springer
    • Boneh, D., Boyen, X., Efficient selective-id secure identity-based encryption without random oracles. Advances in Cryptology-EUROCRYPT 2004, 2004, Springer, 223–238.
    • (2004) Advances in Cryptology-EUROCRYPT 2004 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 63
    • 35048835319 scopus 로고    scopus 로고
    • Secure identity based encryption without random oracles
    • Springer
    • Boneh, D., Boyen, X., Secure identity based encryption without random oracles. Advances in Cryptology–Crypto 2004, 2004, Springer, 443–459.
    • (2004) Advances in Cryptology–Crypto 2004 , pp. 443-459
    • Boneh, D.1    Boyen, X.2
  • 64
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Springer
    • Boneh, D., Boyen, X., Goh, E.-J., Hierarchical identity based encryption with constant size ciphertext. Advances in Cryptology–EUROCRYPT 2005, 2005, Springer, 440–456.
    • (2005) Advances in Cryptology–EUROCRYPT 2005 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 67
    • 70350345210 scopus 로고    scopus 로고
    • Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions
    • Springer
    • Waters, B., Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions. Advances in Cryptology-CRYPTO 2009, 2009, Springer, 619–636.
    • (2009) Advances in Cryptology-CRYPTO 2009 , pp. 619-636
    • Waters, B.1
  • 68
    • 77949581448 scopus 로고    scopus 로고
    • New techniques for dual system encryption and fully secure hibe with short ciphertexts
    • Springer
    • Lewko, A., Waters, B., New techniques for dual system encryption and fully secure hibe with short ciphertexts. Theory of Cryptography, 2010, Springer, 455–479.
    • (2010) Theory of Cryptography , pp. 455-479
    • Lewko, A.1    Waters, B.2
  • 70
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
    • Springer
    • Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B., Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. Advances in Cryptology–EUROCRYPT 2010, 2010, Springer, 62–91.
    • (2010) Advances in Cryptology–EUROCRYPT 2010 , pp. 62-91
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 71
    • 77957011503 scopus 로고    scopus 로고
    • Fully secure functional encryption with general relations from the decisional linear assumption
    • Springer
    • Okamoto, T., Takashima, K., Fully secure functional encryption with general relations from the decisional linear assumption. Advances in Cryptology–CRYPTO 2010, 2010, Springer, 191–208.
    • (2010) Advances in Cryptology–CRYPTO 2010 , pp. 191-208
    • Okamoto, T.1    Takashima, K.2
  • 72
    • 79952511284 scopus 로고    scopus 로고
    • Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation
    • Springer
    • Attrapadung, N., Libert, B., Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation. Public Key Cryptography–PKC 2010, 2010, Springer, 384–402.
    • (2010) Public Key Cryptography–PKC 2010 , pp. 384-402
    • Attrapadung, N.1    Libert, B.2
  • 73
    • 84860009960 scopus 로고    scopus 로고
    • Adaptively attribute-hiding (hierarchical) inner product encryption
    • Springer
    • Okamoto, T., Takashima, K., Adaptively attribute-hiding (hierarchical) inner product encryption. Advances in Cryptology–EUROCRYPT 2012, 2012, Springer, 591–608.
    • (2012) Advances in Cryptology–EUROCRYPT 2012 , pp. 591-608
    • Okamoto, T.1    Takashima, K.2
  • 74
    • 84859952520 scopus 로고    scopus 로고
    • Tools for simulating features of composite order bilinear groups in the prime order setting
    • Springer
    • Lewko, A., Tools for simulating features of composite order bilinear groups in the prime order setting. Advances in Cryptology–EUROCRYPT 2012, 2012, Springer, 318–335.
    • (2012) Advances in Cryptology–EUROCRYPT 2012 , pp. 318-335
    • Lewko, A.1
  • 75
    • 84958548032 scopus 로고    scopus 로고
    • Dual system encryption via predicate encodings
    • Springer
    • Wee, H., Dual system encryption via predicate encodings. Theory of Cryptography, 2014, Springer, 616–637.
    • (2014) Theory of Cryptography , pp. 616-637
    • Wee, H.1
  • 76
    • 85029649342 scopus 로고    scopus 로고
    • Dual system encryption framework in prime-order groups. IACR Cryptology ePrint Archive, 2015:390
    • N. Attrapadung, Dual system encryption framework in prime-order groups. IACR Cryptology ePrint Archive, 2015:390, 2015.
    • (2015)
    • Attrapadung, N.1
  • 77
    • 84942606727 scopus 로고    scopus 로고
    • Improved dual system abe in prime-order groups via predicate encodings
    • Springer
    • Chen, J., Gay, R., Wee, H., Improved dual system abe in prime-order groups via predicate encodings. Advances in Cryptology-EUROCRYPT 2015, 2015, Springer, 595–624.
    • (2015) Advances in Cryptology-EUROCRYPT 2015 , pp. 595-624
    • Chen, J.1    Gay, R.2    Wee, H.3
  • 79
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-dnf formulas on ciphertexts
    • Springer
    • Boneh, D., Goh, E.-J., Nissim, K., Evaluating 2-dnf formulas on ciphertexts. Theory of Cryptography, 2005, Springer, 325–341.
    • (2005) Theory of Cryptography , pp. 325-341
    • Boneh, D.1    Goh, E.-J.2    Nissim, K.3
  • 80
    • 84865452842 scopus 로고    scopus 로고
    • Functional encryption for regular languages
    • Springer
    • Waters, B., Functional encryption for regular languages. Advances in Cryptology–CRYPTO 2012, 2012, Springer, 218–235.
    • (2012) Advances in Cryptology–CRYPTO 2012 , pp. 218-235
    • Waters, B.1
  • 82
    • 79952510987 scopus 로고    scopus 로고
    • Expressive key-policy attribute-based encryption with constant-size ciphertexts
    • Springer
    • Attrapadung, N., Libert, B., De Panafieu, E., Expressive key-policy attribute-based encryption with constant-size ciphertexts. Public Key Cryptography–PKC 2011, 2011, Springer, 90–108.
    • (2011) Public Key Cryptography–PKC 2011 , pp. 90-108
    • Attrapadung, N.1    Libert, B.2    De Panafieu, E.3
  • 83
    • 84865462674 scopus 로고    scopus 로고
    • Spatial Encryption
    • (Ph.D. thesis) Stanford University
    • Hamburg, M., Spatial Encryption. (Ph.D. thesis), 2011, Stanford University.
    • (2011)
    • Hamburg, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.