2018
DOI: 10.1007/978-3-030-02610-3_28
|View full text |Cite
|
Sign up to set email alerts
|

Coop-DAAB: Cooperative Attribute Based Data Aggregation for Internet of Things Applications

Abstract: The deployment of IoT devices is gaining an expanding interest in our daily life. Indeed, IoT networks consist in interconnecting several smart and resource constrained devices to enable advanced services. Security management in IoT is a big challenge as personal data are shared by a huge number of distributed services and devices. In this paper, we propose a Cooperative Data Aggregation solution based on a novel use of Attribute Based signcryption scheme (Coop-DAAB). Coop-DAAB consists in distributing data si… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
6

Relationship

5
1

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 17 publications
0
10
0
Order By: Relevance
“…Several security solutions have been proposed in the literature to provide secure data sharing in cloud [1], [17], [18]. Indeed, cryptographic mechanisms have been usually applied to achieve fine grained access control for remote storage systems [19], [20], [21].…”
Section: Attribute Based Cryptographymentioning
confidence: 99%
“…Several security solutions have been proposed in the literature to provide secure data sharing in cloud [1], [17], [18]. Indeed, cryptographic mechanisms have been usually applied to achieve fine grained access control for remote storage systems [19], [20], [21].…”
Section: Attribute Based Cryptographymentioning
confidence: 99%
“…This type of reactive approach will not be effective to protect the future NGI, as a single breach has the potential to result in catastrophic events occurring or failures cascading across to other networked infrastructure that could impede collaborative systems. Belguith et al (2018) aim to address high level security issues in today's internet, proposing a cryptographic method to assure cooperative data aggregation based on the use of an attribute based signcryption scheme. The proposed method aims to ensure that data collated via IoT devices can be authenticated and that all devices will be protected from unauthorised access.…”
Section: Related Workmentioning
confidence: 99%
“…Outsourcing computationally intensive cryptographic operations to the cloud offers an opportunity to equip IoT devices with powerful security solutions. Attribute Based SignCryption (ABSC) is a powerful cryptographic mechanism that provides data secrecy, flexible access control to enciphered data as well as data authentication [2,3]. ABSC is an association of Attribute Based Encryption (ABE) and Attribute Based Signature (ABS).…”
Section: Introductionmentioning
confidence: 99%
“…Then, he checks if U * = / 0, so that he derives Σ b * , by executing the SignCrypt algorithm. Otherwise, he generates Σ b up * by applying the Update algorithm based on the ind value.Phase 2 Queries -Having received Σ b * or Σ * b up , the adversary is allowed to query a polynomial number of queries as in Phase 1, except that he is unable to request the designcryption3 As C executes both DesignCrypt out and DesignCrypt algorithms, we useDesignCrypt to refer to both algorithms of the received challenge signcrypted message Σ b * or Σ * b up . Guess -during this phase, the adversary A attempts to guess which message M i , such that i ∈ {0, 1} corresponds to the received signcryption Σ b * or Σ * b up .…”
mentioning
confidence: 99%