{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T12:34:39Z","timestamp":1769690079117,"version":"3.49.0"},"reference-count":35,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2017,7,24]],"date-time":"2017-07-24T00:00:00Z","timestamp":1500854400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61303216"],"award-info":[{"award-number":["61303216"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272457"],"award-info":[{"award-number":["61272457"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Research Project of the State Key Laboratory of Industrial Control Technology, Zhejiang University, China","award":["ICT170312"],"award-info":[{"award-number":["ICT170312"]}]},{"name":"National 111 Program of China","award":["B16037"],"award-info":[{"award-number":["B16037"]}]},{"name":"National 111 Program of China","award":["B08038"],"award-info":[{"award-number":["B08038"]}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program","doi-asserted-by":"publisher","award":["2017YFB0802304"],"award-info":[{"award-number":["2017YFB0802304"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Basic Research Plan in Shaanxi Province of China","award":["2017JM6004"],"award-info":[{"award-number":["2017JM6004"]}]},{"name":"the Research Project of National Time Service Center, Chinese Academy of Sciences, China","award":["2017FWCGCZ0124"],"award-info":[{"award-number":["2017FWCGCZ0124"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.<\/jats:p>","DOI":"10.3390\/s17071695","type":"journal-article","created":{"date-parts":[[2017,7,24]],"date-time":"2017-07-24T10:04:13Z","timestamp":1500890653000},"page":"1695","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":69,"title":["A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6870-6657","authenticated-orcid":false,"given":"Kai","family":"Fan","sequence":"first","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an 710071, China"}]},{"given":"Junxiong","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an 710071, China"}]},{"given":"Xin","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an 710071, China"}]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an 710071, China"}]},{"given":"Yintang","family":"Yang","sequence":"additional","affiliation":[{"name":"Key Laboratory of the Ministry of Education for Wide Band-Gap Semiconductor Materials and Devices, Xidian University, Xi\u2019an 710071, China"}]}],"member":"1968","published-online":{"date-parts":[[2017,7,24]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Bonomi, F., Milito, R., Zhu, J., and Addepalli, S. (2012, January 17). Fog computing and its role in the internet of things. Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, Helsinki, Finland.","DOI":"10.1145\/2342509.2342513"},{"key":"ref_2","first-page":"1","article-title":"Energy-efficient adaptive resource management for real-time vehicular cloud services","volume":"99","author":"Shojafar","year":"2016","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Zaghdoudi, B., Ayed, H.K.B., and Harizi, W. (2016, January 14\u201316). Generic Access Control System for Ad Hoc MCC and Fog Computing. Proceedings of the International Conference on Cryptology and Network Security, Milan, Italy.","DOI":"10.1007\/978-3-319-48965-0_24"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"9882","DOI":"10.1109\/ACCESS.2017.2702013","article-title":"Fog of Everything: Energy-efficient Networked Computing Architectures, Research Challenges, and a Case Study","volume":"5","author":"Baccarelli","year":"2017","journal-title":"IEEE Access"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"69","DOI":"10.2498\/cit.1002381","article-title":"A review on modern distributed computing paradigms: Cloud computing, jungle computing and fog computing","volume":"22","author":"Hajibaba","year":"2014","journal-title":"J. Comput. Inf. Technol."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Aazam, M., and Huh, E.N. (2014, January 27\u201329). Fog Computing and Smart Gateway Based Communication for Cloud of Things. Proceedings of the International Conference on Future Internet of Things and Cloud IEEE, Barcelona, Spain.","DOI":"10.1109\/FiCloud.2014.83"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2991","DOI":"10.1002\/cpe.3485","article-title":"An overview of Fog computing and its security issues","volume":"28","author":"Stojmenovic","year":"2015","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Yi, S., Qin, Z., and Li, Q. (2015, January 10\u201312). Security and privacy issues of fog computing: A survey. Proceedings of the International Conference on Wireless Algorithms, Systems, and Applications, Qufu, China.","DOI":"10.1007\/978-3-319-21837-3_67"},{"key":"ref_9","first-page":"1","article-title":"Security and Privacy Challenges in Vehicular Cloud Computing","volume":"2016","author":"Lu","year":"2016","journal-title":"Mob. Inf. Syst."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"3302","DOI":"10.1109\/ACCESS.2017.2677520","article-title":"A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT","volume":"5","author":"Lu","year":"2017","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., and Waters, B. (2007, January 20\u201323). Ciphertext-policy attribute-based encryption. Proceedings of the Security and Privacy, Berkeley, CA, USA.","DOI":"10.1109\/SP.2007.11"},{"key":"ref_12","first-page":"515","article-title":"Multi-authority attribute based encryption","volume":"4392","author":"Chase","year":"2007","journal-title":"Theory Cryptogr. Conf."},{"key":"ref_13","first-page":"53","article-title":"Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization","volume":"6571","author":"Waters","year":"2011","journal-title":"Public Key Cryptogr. PKC"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Lewko, A., and Waters, B. (2011, January 15\u201319). Decentralizing attribute-based encryption. Proceedings of the Advances in Cryptology\u2013EUROCRYPT, Tallinn, Estonia.","DOI":"10.1007\/978-3-642-20465-4_31"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Ruj, S., Nayak, A., and Stojmenovic, I. (2011, January 16\u201318). DACC: Distributed access control in Clouds. Proceedings of the TrustCom, Changsha, China.","DOI":"10.1109\/TrustCom.2011.15"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1109\/TC.2013.200","article-title":"Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption","volume":"64","author":"Zhou","year":"2015","journal-title":"IEEE Trans. Comput."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1265","DOI":"10.1109\/TIFS.2016.2523941","article-title":"An efficient file hierarchy attribute-based encryption scheme in cloud computing","volume":"11","author":"Wang","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_18","unstructured":"Green, M., Hohenberger, S., and Waters, B. (2011, January 8\u201312). Outsourcing the decryption of abe ciphertexts. Proceedings of the USENIX Security Symposium, San Francisco, CA, USA."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Yang, K., and Jia, X. (2012, January 18\u201321). Attributed-based access control for multi-authority systems in cloud storage. Proceedings of the 32nd International Conference on Distributed Computing Systems (ICDCS), Macau, China.","DOI":"10.1109\/ICDCS.2012.42"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1109\/TPDS.2013.253","article-title":"Expressive, efficient, and revocable data access control for multi-authority cloud storage","volume":"25","author":"Yang","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Li, J., Chen, X., Li, J., Jia, C., Ma, J., and Lou, W. (2013, January 9\u201313). Fine-grained access control system based on outsourced attribute-based encryption. Proceedings of the European Symposium on Research in Computer Security, Egham, UK.","DOI":"10.1007\/978-3-642-40203-6_33"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1343","DOI":"10.1109\/TIFS.2013.2271848","article-title":"Attribute-based encryption with verifiable outsourced decryption","volume":"8","author":"Lai","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2201","DOI":"10.1109\/TPDS.2013.271","article-title":"Securely outsourcing attribute-based encryption with checkability","volume":"25","author":"Li","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_24","first-page":"146","article-title":"Attribute-Based Access Control for Multi-Authority Systems with Constant Size Ciphertext in Cloud Computing","volume":"13","author":"Chen","year":"2016","journal-title":"China Commun."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1109\/ACCESS.2016.2609884","article-title":"Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems","volume":"5","author":"Li","year":"2017","journal-title":"IEEE Access"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1109\/TDSC.2015.2423669","article-title":"Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption","volume":"13","author":"Mao","year":"2016","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_27","unstructured":"Ostrovsky, R., Sahai, A., and Waters, B. (November, January 29). Attribute-based encryption with non-monotonic access structures. Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Ibraimi, L., Petkovic, M., Nikova, S., Hartel, P., and Jonker, W. (2009). Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. Information Security Applications, Springer.","DOI":"10.1007\/978-3-642-10838-9_23"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., and Lou, W. (2010, January 13\u201316). Attribute based data sharing with attribute revocation. Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, Beijing, China.","DOI":"10.1145\/1755688.1755720"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1214","DOI":"10.1109\/TPDS.2010.203","article-title":"Attribute-based access control with efficient revocation in data outsourcing systems","volume":"22","author":"Hur","year":"2011","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Xie, X., Ma, H., Li, J., and Chen, X. (2013, January 25\u201329). New ciphertext-policy attribute-based access control with efficient revocation. Proceedings of the Information and Communication Technology-EurAsia Conference, Yogyakarta, Indonesia.","DOI":"10.1007\/978-3-642-36818-9_41"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Yang, Y., Liu, J.K., Liang, K., Choo, K.R., and Zhou, J. (2015, January 21\u201325). Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data. Proceedings of the European Symposium on Research in Computer Security, Vienna, Austria.","DOI":"10.1007\/978-3-319-24177-7_8"},{"key":"ref_33","unstructured":"Beimel, A. (1996). Secure Schemes for Secret Sharing and Key Distribution, Technion-Israel Institute of Technology, Faculty of Computer Science."},{"key":"ref_34","unstructured":"Bellare, M., Garay, J.A., and Rabin, T. (June, January 31). Fast batch verification for modular exponentiation and digital signatures. Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Espoo, Finland."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s13389-013-0057-3","article-title":"Charm: A framework for rapidly prototyping cryptosystems","volume":"3","author":"Akinyele","year":"2013","journal-title":"J. Cryptogr. Eng."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/7\/1695\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:43:50Z","timestamp":1760208230000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/7\/1695"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,24]]},"references-count":35,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2017,7]]}},"alternative-id":["s17071695"],"URL":"https:\/\/doi.org\/10.3390\/s17071695","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,24]]}}}