Fog computing enables computation, storage, applications, and network services between the Internet of Things and the cloud servers by extending the Cloud Computing paradigm to the edge of the network. When protecting information security in Fog computing, advanced security with low latency, widespread geographical distribution support, and high flexibility should be taken in to considertion first, because of its huge number of nodes. In this paper, we propose a new cryptographic primitive, named CCA2 secure publicly-verifiable revocable large-universe multi-authority attribute-based encryption (CCA2-PV-R-LU-MA-ABE), to achieve flexible fine-grained access control in Fog computing. In this primitive, end nodes in fogs generate private keys from multiple authorities that might be differentiated by their geographical locations or functions, and their attributes can be denoted by any strings in the large universe, which meets diverse needs in practical Fog applications. In addition, the accessibility of nodes can be revoked efficiently even by resource-limited devices. To ensure the validity of ciphertext, this primitive supports public verification and only valid ciphertext can be stored or transmitted. Based on the primitive and the feature of Fog computing, we construct a concrete CCA2-PV-R-LU-MA-ABE scheme. We define the security model of this primitive, which is much more secure than the CPA-secure scheme. Finally, we compare the efficiency of the proposed concrete scheme with that of the existing CPA-secure scheme by both theoretical and experimental analysis, and the results show that the extra consumption of efficiency to improving CPA to CCA2 is considerably low. The proposed scheme is highly secure, flexible, and efficient enough to be deployed in practical Fog computing. INDEX TERMS Fog computing, attribute-based encryption, distributed access control, multi-authority, large-universe. I. INTRODUCTION Cloud Computing seems to provide an ideal solution for the processing of large amounts of data in Internet of Things (IoT), in which end users upload request and download result from a cloud center. And with the rapid development of Information-Centric IoT (IC-IoT), Device-to-Device (D2D) communication makes it more convenient to be deployed [1]. However, this paradigm is not suitable in some circumstances, like latency-sensitive applications in wireless access sensor network or in mobile equipment. To fill this gap, Fog Computing extends Cloud Computing to the edge of the network to provide low latency and location awareness for streaming and realtime applications in IoT. Source-limited end-user devices like wireless sensors are implemented in Fogs to achieve realtime smart computation in connected vehicles, smart grid, wireless sensors and actuators networks, etc. Fog Computing has a wide range of application scenarios, but the problem of information security follows. However, to protect information security in Fogs, existing cryptography schemes in Cloud Computing cannot be 11688