Authors
Yinhao Jiang, Willy Susilo, Yi Mu, Fuchun Guo
Publication date
2018/1/1
Journal
Future Generation Computer Systems
Volume
78
Pages
720-729
Publisher
North-Holland
Description
In Fog Computing, fragile connection between Fog and Cloud causes problems of the authentication and authorization. Recently, Stojmenovic, Wen, Huang and Luan introduced a potential solution by adopting the concept of Stand-Alone Authentication (SAA) and equipped it with Attribute-based encryption (ABE) for its security in a large and dynamic information system. In such a system, a user’s access right can be described as a set of attributes linking to his/her private key. In this paper, we note that if a user can generate a new private key for a portion of his/her access right, this could potentially lead to some undesirable situations, which violates the access control policy. Interestingly, to date, there is no work that looks into this matter in detail nor addresses it. We point out that this is a “property” that exists in ABE systems, which we refer to “key-delegation abuse”. ABE systems that suffer from key-delegation …
Total citations
2017201820192020202120222023202441330262316194
Scholar articles