Proceedings of the 15th International Joint Conference on E-Business and Telecommunications 2018
DOI: 10.5220/0006854601350146
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Attribute-based Encryption Supporting Access Policy Update for Cloud Assisted IoT

Abstract: Cloud-assisted IoT applications are gaining an expanding interest, such that IoT devices are deployed in different distributed environments to collect and outsource sensed data to remote servers for further processing and sharing among users. On the one hand, in several applications, collected data are extremely sensitive and need to be protected before outsourcing. Generally, encryption techniques are applied at the data producer side to protect data from adversaries as well as curious cloud provider. On the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
7

Relationship

4
3

Authors

Journals

citations
Cited by 12 publications
(15 citation statements)
references
References 28 publications
(50 reference statements)
0
14
0
1
Order By: Relevance
“…Salonikias et al [80] proposed a role-based authorization in traditional web services in which administrators have to regulate access rights. In [81], attribute-based encryption is proposed, in which predefined attributes of users must be satisfied [82,83]. However, there are open challenges related to multiple devices for predefined policies.…”
Section: Fog Computing Security Challengesmentioning
confidence: 99%
“…Salonikias et al [80] proposed a role-based authorization in traditional web services in which administrators have to regulate access rights. In [81], attribute-based encryption is proposed, in which predefined attributes of users must be satisfied [82,83]. However, there are open challenges related to multiple devices for predefined policies.…”
Section: Fog Computing Security Challengesmentioning
confidence: 99%
“…AES has been also adopted to provide secure communication between IoT devices [73]. Though an attribute-based encryption algorithm requires high computation costs, several lightweight versions have been designed to suit IoT applications, such as reduced computation algorithms [40,74], offloading heavy computations to an edge [75], or cloud server [26].…”
Section: The Lack Of Standardized Lightweight Encryption Algorithms Fmentioning
confidence: 99%
“…Since smart objects have a limited calculation capacity, restricted energy, and limited memory, lightweight encryption algorithms are widely used in the IoT field, such as in RFID tags, sensors, and healthcare devices [39]. Additionally, the lightweight concept for IoT is extended to lightweight attribute-based encryption schema for cloud applications [40][41][42], lightweight collaborative key management protocol [43], lightweight protocol for smart home authentication and key-session exchange [44,45]. Many IoT protocols have been proposed for different ISO layers, such as link layer (802.15.4, PLC), network layer (RPL, 6LoWPA), presentation layer (TLS, 802.1AR, 802.1X), and application layer (CoAP) [46].…”
mentioning
confidence: 99%
“…ABE schemes have been widely applied to secure outsourced data to distant cloud servers [24]. Although the proposed schemes achieves encrypted fine grained access control to data, they rely on a single authority to manage all the attributes used in the system and issue the related secret keys [25], [26], [27]. As such, the risk of key escrow attacks is arising, considering that all users' private keys are maintained by one single central entity.…”
Section: A Attribute Based Encryption (Abe)mentioning
confidence: 99%