17Fine-Grained Access Through Attribute-Based Encryption for Fog Computing

Malabika Das

Heramba Chandra College, Kolkata, West Bengal, India

Abstract

Attribute-based encryption is a generalization of public key cryptography based on one-to-many encryptions that allow users to encrypt and decrypt data based on user attributes. It is different from identity-based encryption, in which access control is based on the identities of users such as their email addresses, and usernames. In ABE, each user is associated with a set of attributes. These attributes can be various characteristics such as jobs, organizations, age groups, or any other criteria. In decentralized attribute-based encryption, any party can create a public key and private key for different users which reflect their attributes without any collaboration.

ABE has been widely used to impose fine-grained access control on encrypted data. Fine-grained access control is a method of controlling who can access certain data. It is essential because it sets access parameters for specific data even when data is stored together, which means it specifies the access rights of individual users. It is often used in cloud computing where a large amount of data is stored together and it gives each piece of data its own specified policy for access. For example, one individual may be given access to edit and make changes to a piece of data while another might be given access only to read the data without making any changes.

Fog computing ...

Get Fog Computing for Intelligent Cloud IoT Systems now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.