REEDS: An Efficient Revocable End-to-End Encrypted Message Distribution System for IoT

被引:1
|
作者
Li, Cui [1 ,2 ]
Chen, Rongmao [1 ]
Wang, Yi [1 ]
Xing, Qianqian [1 ]
Wang, Baosheng [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha 410073, Peoples R China
[2] Natl Univ Def Technol, Sch Informat & Commun, Xian 710106, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Encryption; Public key; Protocols; Performance evaluation; Scalability; Receivers; Proxy re-encryption; conditional proxy re-encryption; decryption rights revocation; publish subscribe paradigm; internet of Things; PROXY RE-ENCRYPTION; BROADCAST ENCRYPTION; CIPHERTEXTS;
D O I
10.1109/TDSC.2024.3353811
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To address the confidentiality concerns of malicious adversaries that fully compromise the message broker in pub/sub based IoT systems, several researchers use proxy re-encryption (PRE) to realize end-to-end encrypted message distribution (from publisher to subscriber). However, the all-or-nothing share feature of PRE poses a problem that the share cannot be efficiently revoked. The only way for publishers to revoke the access rights of subscribers is to pick a new public-private key pair and re-generate the re-encryption keys for all the remaining subscribers, which hampers the scalability in practice. To realize efficient user revocation, we present REEDS, an efficient revocable end-to-end encrypted message distribution system for IoT. The core of REEDS is a novel proxy-aided identity-based conditional proxy re-encryption (PIB-CPRE) scheme. Essentially, we use a binary-tree structure to organize re-encryption keys, so that the update of re-encryption keys is reduced from linear to logarithmic in the number of subscribers. We show that REEDS satisfies confidentiality, efficient immediate revocation, decentralized authorization, and maintains low overhead for publishers and subscribers. The prototype system is implemented and its performance is evaluated. The results show that REEDS is not only easy to deploy over existing message brokers but also highly efficient.
引用
收藏
页码:4526 / 4542
页数:17
相关论文
共 50 条
  • [21] Decentralized security framework for future IoT end-to-end connectivity
    Xin, Qin
    Gonzalez Crespo, Ruben
    Enrique Montenegro-Marin, Carlos
    Garcia Diaz, Vicente
    Alazab, Mamoun
    ANNALS OF OPERATIONS RESEARCH, 2023, 326 (SUPPL 1) : 79 - 79
  • [22] Enabling En-Route Filtering for End-to-End Encrypted CoAP Messages
    Seitz, Klara
    Serth, Sebastian
    Krentz, Konrad-Felix
    Meinel, Christoph
    PROCEEDINGS OF THE 15TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS (SENSYS'17), 2017,
  • [23] NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data
    Abimbola, A. A.
    Munoz, J. M.
    Buchanan, W. J.
    COMPUTERS & SECURITY, 2006, 25 (06) : 445 - 451
  • [24] Parallel End-to-End Autonomous Mining: An IoT-Oriented Approach
    Gao, Yu
    Ai, Yunfeng
    Tian, Bin
    Chen, Long
    Wang, Jian
    Cao, Dongpu
    Wang, Fei-Yue
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (02): : 1011 - 1023
  • [25] Providing End-to-End Security Using Quantum Walks in IoT Networks
    Abd El-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Venegas-Andraca, Salvador E.
    Elwahsh, Haitham
    Piran, Md Jalil
    Bashir, Ali Kashif
    Song, Oh-Young
    Mazurczyk, Wojciech
    IEEE ACCESS, 2020, 8 : 92687 - 92696
  • [26] An Accelerated End-to-End Probing Protocol for Narrowband IoT Medical Devices
    Ar-Reyouchi, El Miloud
    Ghoumid, Kamal
    Ar-Reyouchi, Doha
    Rattal, Salma
    Yahiaoui, Reda
    Elmazria, Omar
    IEEE ACCESS, 2021, 9 : 34131 - 34141
  • [27] Measuring End-to-End Delay in Low Energy SDN IoT Platform
    Beshley, Mykola
    Kryvinska, Natalia
    Beshley, Halyna
    Kochan, Orest
    Barolli, Leonard
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (01): : 19 - 41
  • [28] Niflheim - End-to-End Middleware for Applications Across all Tiers of the IoT
    Akkermans, Sven
    Small, Nicolas
    Joosen, Wouter
    Hughes, Danny
    PROCEEDINGS OF THE 15TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS (SENSYS'17), 2017,
  • [29] Hybrid End-to-End VPN Security Approach for Smart IoT Objects
    Juma, Mazen
    Monem, Azza Abdel
    Shaalan, Khaled
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 158
  • [30] End-to-end Security in the IoT Computing Continuum: Perspectives in the SWAMP Project
    Kleinschmidt, Joao H.
    Kamienski, Carlos
    Prati, Ronaldo C.
    Kolehmainen, Kari
    Aguzzi, Cristiano
    2019 9TH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 2019, : 191 - 192