An environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing.
Environmental monitoring plays a vital role in environmental protection, especially for the management and conservation of natural resources. However, environmental monitoring data is usually difficult to resist malicious attacks because it is transmitted in an open and insecure channel. In our pape...
Guardado en:
Autores principales: | , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Public Library of Science (PLoS)
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/97974fb7ee9042f4b0f5c33d5abcea5e |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:97974fb7ee9042f4b0f5c33d5abcea5e |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:97974fb7ee9042f4b0f5c33d5abcea5e2021-12-02T20:13:53ZAn environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing.1932-620310.1371/journal.pone.0258062https://doaj.org/article/97974fb7ee9042f4b0f5c33d5abcea5e2021-01-01T00:00:00Zhttps://doi.org/10.1371/journal.pone.0258062https://doaj.org/toc/1932-6203Environmental monitoring plays a vital role in environmental protection, especially for the management and conservation of natural resources. However, environmental monitoring data is usually difficult to resist malicious attacks because it is transmitted in an open and insecure channel. In our paper, a new data sharing scheme is proposed by using attribute-based encryption, identity-based signature and cloud computing technology to meet the requirements of confidentiality, integrity, verifiability, and unforgerability of environmental monitoring data. The monitoring equipment encrypts the monitored environmental data and uploads it to the environmental cloud server. Then, monitoring users can request access to the environmental cloud server. If the monitoring user meets the access policy, the plaintext is finally obtained through the fog node decryption. Our proposal mainly uses attribute-based encryption technology to realize the privacy protection and fine-grained access control of monitoring data. The integrity and unforgeability of the monitoring data are ensured by the digital signature. In addition, outsourcing computing technology saves the computing overhead of monitoring equipment and monitoring users. The security analysis illustrates that our proposal can achieve security purposes. Finally, the performance of our proposal and related schemes is evaluated from the aspects of communication overhead and computing overhead. The results indicate that our proposal is secure and efficient in environmental monitoring.Xiaodong YangWanting XiAijia ChenCaifen WangPublic Library of Science (PLoS)articleMedicineRScienceQENPLoS ONE, Vol 16, Iss 9, p e0258062 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Medicine R Science Q |
spellingShingle |
Medicine R Science Q Xiaodong Yang Wanting Xi Aijia Chen Caifen Wang An environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing. |
description |
Environmental monitoring plays a vital role in environmental protection, especially for the management and conservation of natural resources. However, environmental monitoring data is usually difficult to resist malicious attacks because it is transmitted in an open and insecure channel. In our paper, a new data sharing scheme is proposed by using attribute-based encryption, identity-based signature and cloud computing technology to meet the requirements of confidentiality, integrity, verifiability, and unforgerability of environmental monitoring data. The monitoring equipment encrypts the monitored environmental data and uploads it to the environmental cloud server. Then, monitoring users can request access to the environmental cloud server. If the monitoring user meets the access policy, the plaintext is finally obtained through the fog node decryption. Our proposal mainly uses attribute-based encryption technology to realize the privacy protection and fine-grained access control of monitoring data. The integrity and unforgeability of the monitoring data are ensured by the digital signature. In addition, outsourcing computing technology saves the computing overhead of monitoring equipment and monitoring users. The security analysis illustrates that our proposal can achieve security purposes. Finally, the performance of our proposal and related schemes is evaluated from the aspects of communication overhead and computing overhead. The results indicate that our proposal is secure and efficient in environmental monitoring. |
format |
article |
author |
Xiaodong Yang Wanting Xi Aijia Chen Caifen Wang |
author_facet |
Xiaodong Yang Wanting Xi Aijia Chen Caifen Wang |
author_sort |
Xiaodong Yang |
title |
An environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing. |
title_short |
An environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing. |
title_full |
An environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing. |
title_fullStr |
An environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing. |
title_full_unstemmed |
An environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing. |
title_sort |
environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing. |
publisher |
Public Library of Science (PLoS) |
publishDate |
2021 |
url |
https://doaj.org/article/97974fb7ee9042f4b0f5c33d5abcea5e |
work_keys_str_mv |
AT xiaodongyang anenvironmentalmonitoringdatasharingschemebasedonattributeencryptionincloudfogcomputing AT wantingxi anenvironmentalmonitoringdatasharingschemebasedonattributeencryptionincloudfogcomputing AT aijiachen anenvironmentalmonitoringdatasharingschemebasedonattributeencryptionincloudfogcomputing AT caifenwang anenvironmentalmonitoringdatasharingschemebasedonattributeencryptionincloudfogcomputing AT xiaodongyang environmentalmonitoringdatasharingschemebasedonattributeencryptionincloudfogcomputing AT wantingxi environmentalmonitoringdatasharingschemebasedonattributeencryptionincloudfogcomputing AT aijiachen environmentalmonitoringdatasharingschemebasedonattributeencryptionincloudfogcomputing AT caifenwang environmentalmonitoringdatasharingschemebasedonattributeencryptionincloudfogcomputing |
_version_ |
1718374721949532160 |