A scalable and secure attribute-based access control method in Internet of Things with efficient revocation

Authors

  • Safaa Majid Fakhry Al sherify Ferdowsi university of Mashhad, Iran
  • Seyed Amin Hosseini Seno Ferdowsi University of Mashhad, Iran

DOI:

https://doi.org/10.31642/JoKMC/2018/070102

Keywords:

Internet of Things, Security, Privacy, ABE, Access Control, Attribute-Based Encryption, CP-ABE

Abstract

The Internet of Things (IoT) is an emerging network paradigm that understands the Because IoT is connections between all things and is the foundation of the intelligent community. The pervasive, always about everyday life or daily work of the user, privacy and security are important. In other complex and heterogeneous properties of the IoT make its security issues very challenging. words, how to achieve data, while data privacy is a challenging task. In addition, resource constraints In spite of the attribute based of node creates a lightweight requirement for IoT security mechanisms. encryption like (CP-ABE), can provide access control to data by allowing specific users who their This paper provides a method of a attributes in accordance with the policy of access to decoded text. scalable and secure access control based on attribute with effective revocation based on allow users to access and as well as the possibility of expiring some users' access. Security and efficiency evaluations show that the proposed scheme can achieve the desired security goals, while keeping comparable computation overhead.

Downloads

Download data is not yet available.

References

. Li, Shancang, Li Da Xu, and Shanshan Zhao. "The internet of things: a survey." Information Systems Frontiers Vol.17, NO.2, PP.243-259, 2015. DOI: https://doi.org/10.1007/s10796-014-9492-7

. Atzori, Luigi, Antonio Iera, and Giacomo Morabito. "The internet of things: A survey." Computer networks VOL.54, NO.15, PP. 2787-2805, 2010. DOI: https://doi.org/10.1016/j.comnet.2010.05.010

. Oualha, Nouha, and Kim Thuat Nguyen. "Lightweight attribute-based encryption for the internet of things." In Computer Communication and Networks (ICCCN), 2016 25th International Conference on, PP. 1-6, 2016. DOI: https://doi.org/10.1109/ICCCN.2016.7568538

. Peng, Chunyan, Xiujuan Du, Keqin Li, and Meiju Li. "An ultra-lightweight encryption scheme in underwater acoustic networks." Journal of Sensors, 2016. DOI: https://doi.org/10.1155/2016/8763528

. Touati, Lyes, Yacine Challal, and Abdelmadjid Bouabdallah. "C-cp-abe: Cooperative ciphertext policy attribute-based encryption for the internet of things." In Advanced Networking Distributed Systems and Applications (INDS), International Conference on, PP. 64-69, 2014. DOI: https://doi.org/10.1109/INDS.2014.19

. Touati, Lyes, and Yacine Challal. "Efficient cp-abe attribute/key management for iot applications." In Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), IEEE International Conference on, PP. 343-350, 2015. DOI: https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.49

. Zickau, Sebastian, Felix Beierle, and Iwailo Denisow. "Securing mobile cloud data with personalized attribute-based meta information." In Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015 3rd IEEE International Conference on, PP. 205-210, 2015. DOI: https://doi.org/10.1109/MobileCloud.2015.14

. Hur, Junbeom. "Improving Security and Efficiency in Attribute-Based Data Sharing." IEEE Trans. Knowl. Data Eng. Vol.25, NO. 10, PP. 2271-2282, 2013. DOI: https://doi.org/10.1109/TKDE.2011.78

. Jiang, Yinhao, Willy Susilo, Yi Mu, and Fuchun Guo. "Ciphertext-policy attribute-based encryption with key-delegation abuse resistance." In Australasian Conference on Information Security and Privacy, PP. 477-494, 2016. DOI: https://doi.org/10.1007/978-3-319-40253-6_29

. Zhang, Yinghui, Dong Zheng, Xiaofeng Chen, Jin Li, and Hui Li. "Efficient attribute-based data sharing in mobile clouds." Pervasive and Mobile Computing Vol.28, PP.135-149, 2016. DOI: https://doi.org/10.1016/j.pmcj.2015.06.009

. Zhang, Yinghui, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li, and Ilsun You. "Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing." Information Sciences Vol.379, PP.42-61, 2017. DOI: https://doi.org/10.1016/j.ins.2016.04.015

. Han, Qi, Yinghui Zhang, and Hui Li. "Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things." Future Generation Computer Systems Vol.83, PP.269-277, 2018. DOI: https://doi.org/10.1016/j.future.2018.01.019

. Borgh, Joakim, Edith Ngai, Börje Ohlman, and Adeel Mohammad Malik. "Employing attribute-based encryption in systems with resource constrained devicesin an information-centric networking context." In Global Internet of Things Summit (GIoTS), PP. 1-6, 2017. DOI: https://doi.org/10.1109/GIOTS.2017.8016277

. Singh, Meena, M. A. Rajan, V. L. Shivraj, and P. Balamuralidhar. "mq" In Communication systems and network technologies (CSNT), 2015 fifth international conference on, PP. 746-751, 2015.

. Shi, Yanfeng, Qingji Zheng, Jiqiang Liu, and Zhen Han. "Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation." Information Sciences Vol.295, PP. 221-231, 2015. DOI: https://doi.org/10.1016/j.ins.2014.10.020

. Gupta, Harshit, Amir Vahid Dastjerdi, Soumya K. Ghosh, and Rajkumar Buyya. "iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments." Software: Practice and Experience Vol.47, No. 9, PP. 1275-1296, 2017. DOI: https://doi.org/10.1002/spe.2509

Downloads

Published

2020-09-19

How to Cite

Al sherify, S., & Seno, S. (2020). A scalable and secure attribute-based access control method in Internet of Things with efficient revocation. Journal of Kufa for Mathematics and Computer, 7(1), 9–20. https://doi.org/10.31642/JoKMC/2018/070102

Similar Articles

1 2 3 4 5 6 7 8 > >> 

You may also start an advanced similarity search for this article.