A scalable and secure attribute-based access control method in Internet of Things with efficient revocation
DOI:
https://doi.org/10.31642/JoKMC/2018/070102Keywords:
Internet of Things, Security, Privacy, ABE, Access Control, Attribute-Based Encryption, CP-ABEAbstract
The Internet of Things (IoT) is an emerging network paradigm that understands the Because IoT is connections between all things and is the foundation of the intelligent community. The pervasive, always about everyday life or daily work of the user, privacy and security are important. In other complex and heterogeneous properties of the IoT make its security issues very challenging. words, how to achieve data, while data privacy is a challenging task. In addition, resource constraints In spite of the attribute based of node creates a lightweight requirement for IoT security mechanisms. encryption like (CP-ABE), can provide access control to data by allowing specific users who their This paper provides a method of a attributes in accordance with the policy of access to decoded text. scalable and secure access control based on attribute with effective revocation based on allow users to access and as well as the possibility of expiring some users' access. Security and efficiency evaluations show that the proposed scheme can achieve the desired security goals, while keeping comparable computation overhead.Downloads
References
. Li, Shancang, Li Da Xu, and Shanshan Zhao. "The internet of things: a survey." Information Systems Frontiers Vol.17, NO.2, PP.243-259, 2015. DOI: https://doi.org/10.1007/s10796-014-9492-7
. Atzori, Luigi, Antonio Iera, and Giacomo Morabito. "The internet of things: A survey." Computer networks VOL.54, NO.15, PP. 2787-2805, 2010. DOI: https://doi.org/10.1016/j.comnet.2010.05.010
. Oualha, Nouha, and Kim Thuat Nguyen. "Lightweight attribute-based encryption for the internet of things." In Computer Communication and Networks (ICCCN), 2016 25th International Conference on, PP. 1-6, 2016. DOI: https://doi.org/10.1109/ICCCN.2016.7568538
. Peng, Chunyan, Xiujuan Du, Keqin Li, and Meiju Li. "An ultra-lightweight encryption scheme in underwater acoustic networks." Journal of Sensors, 2016. DOI: https://doi.org/10.1155/2016/8763528
. Touati, Lyes, Yacine Challal, and Abdelmadjid Bouabdallah. "C-cp-abe: Cooperative ciphertext policy attribute-based encryption for the internet of things." In Advanced Networking Distributed Systems and Applications (INDS), International Conference on, PP. 64-69, 2014. DOI: https://doi.org/10.1109/INDS.2014.19
. Touati, Lyes, and Yacine Challal. "Efficient cp-abe attribute/key management for iot applications." In Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), IEEE International Conference on, PP. 343-350, 2015. DOI: https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.49
. Zickau, Sebastian, Felix Beierle, and Iwailo Denisow. "Securing mobile cloud data with personalized attribute-based meta information." In Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015 3rd IEEE International Conference on, PP. 205-210, 2015. DOI: https://doi.org/10.1109/MobileCloud.2015.14
. Hur, Junbeom. "Improving Security and Efficiency in Attribute-Based Data Sharing." IEEE Trans. Knowl. Data Eng. Vol.25, NO. 10, PP. 2271-2282, 2013. DOI: https://doi.org/10.1109/TKDE.2011.78
. Jiang, Yinhao, Willy Susilo, Yi Mu, and Fuchun Guo. "Ciphertext-policy attribute-based encryption with key-delegation abuse resistance." In Australasian Conference on Information Security and Privacy, PP. 477-494, 2016. DOI: https://doi.org/10.1007/978-3-319-40253-6_29
. Zhang, Yinghui, Dong Zheng, Xiaofeng Chen, Jin Li, and Hui Li. "Efficient attribute-based data sharing in mobile clouds." Pervasive and Mobile Computing Vol.28, PP.135-149, 2016. DOI: https://doi.org/10.1016/j.pmcj.2015.06.009
. Zhang, Yinghui, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li, and Ilsun You. "Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing." Information Sciences Vol.379, PP.42-61, 2017. DOI: https://doi.org/10.1016/j.ins.2016.04.015
. Han, Qi, Yinghui Zhang, and Hui Li. "Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things." Future Generation Computer Systems Vol.83, PP.269-277, 2018. DOI: https://doi.org/10.1016/j.future.2018.01.019
. Borgh, Joakim, Edith Ngai, Börje Ohlman, and Adeel Mohammad Malik. "Employing attribute-based encryption in systems with resource constrained devicesin an information-centric networking context." In Global Internet of Things Summit (GIoTS), PP. 1-6, 2017. DOI: https://doi.org/10.1109/GIOTS.2017.8016277
. Singh, Meena, M. A. Rajan, V. L. Shivraj, and P. Balamuralidhar. "mq" In Communication systems and network technologies (CSNT), 2015 fifth international conference on, PP. 746-751, 2015.
. Shi, Yanfeng, Qingji Zheng, Jiqiang Liu, and Zhen Han. "Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation." Information Sciences Vol.295, PP. 221-231, 2015. DOI: https://doi.org/10.1016/j.ins.2014.10.020
. Gupta, Harshit, Amir Vahid Dastjerdi, Soumya K. Ghosh, and Rajkumar Buyya. "iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments." Software: Practice and Experience Vol.47, No. 9, PP. 1275-1296, 2017. DOI: https://doi.org/10.1002/spe.2509
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 Safaa Majid Fakhry Al sherify, Seyed Amin Hosseini Seno
This work is licensed under a Creative Commons Attribution 4.0 International License.
which allows users to copy, create extracts, abstracts, and new works from the Article, alter and revise the Article, and make commercial use of the Article (including reuse and/or resale of the Article by commercial entities), provided the user gives appropriate credit (with a link to the formal publication through the relevant DOI), provides a link to the license, indicates if changes were made and the licensor is not represented as endorsing the use made of the work.