Computer and Modernization ›› 2022, Vol. 0 ›› Issue (12): 118-122.

Previous Articles    

Secure Data Access Method of Industrial Internet Based on Fog Computing


  1. (1.Information Construction and Management Division, Shaanxi Normal University, Xi’an 710119, China;
    2. The Fifth Electronic Research Institute of the Ministry of Industry and Information Technology, Guangzhou 510000, China)
  • Online:2023-01-04 Published:2023-01-04

Abstract: Aiming at the requirements of low delay, low power consumption and security in the industrial Internet application scenario, a secure access method of industrial Internet data based on fog computing architecture is proposed. The corresponding asymmetric key pair is generated based on the attribute set to encrypt the message and stored in the cloud server. Part of the encryption and decryption tasks of the ciphertext are completed by the fog node layer, which eliminates trust dependency in the cloud service layer and reduces the computing overhead burden of the device layer. The fog node layer and cloud service layer are semi trusted to the ciphertext data. They cannot obtain any original message according to the ciphertext. Only the authorized device can complete the complete decryption and obtain the original message by using the private key, so as to realize the end-to-end efficient and secure data access in the industrial Internet. The performance analysis shows that the proposed method has lower computational overhead and response delay and more reliable security and privacy than other schemes.

Key words: 工业互联网, 雾计算, 访问控制, 隐私保护, 属性基加密