REEDS: An Efficient Revocable End-to-End Encrypted Message Distribution System for IoT

被引:1
|
作者
Li, Cui [1 ,2 ]
Chen, Rongmao [1 ]
Wang, Yi [1 ]
Xing, Qianqian [1 ]
Wang, Baosheng [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha 410073, Peoples R China
[2] Natl Univ Def Technol, Sch Informat & Commun, Xian 710106, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Encryption; Public key; Protocols; Performance evaluation; Scalability; Receivers; Proxy re-encryption; conditional proxy re-encryption; decryption rights revocation; publish subscribe paradigm; internet of Things; PROXY RE-ENCRYPTION; BROADCAST ENCRYPTION; CIPHERTEXTS;
D O I
10.1109/TDSC.2024.3353811
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To address the confidentiality concerns of malicious adversaries that fully compromise the message broker in pub/sub based IoT systems, several researchers use proxy re-encryption (PRE) to realize end-to-end encrypted message distribution (from publisher to subscriber). However, the all-or-nothing share feature of PRE poses a problem that the share cannot be efficiently revoked. The only way for publishers to revoke the access rights of subscribers is to pick a new public-private key pair and re-generate the re-encryption keys for all the remaining subscribers, which hampers the scalability in practice. To realize efficient user revocation, we present REEDS, an efficient revocable end-to-end encrypted message distribution system for IoT. The core of REEDS is a novel proxy-aided identity-based conditional proxy re-encryption (PIB-CPRE) scheme. Essentially, we use a binary-tree structure to organize re-encryption keys, so that the update of re-encryption keys is reduced from linear to logarithmic in the number of subscribers. We show that REEDS satisfies confidentiality, efficient immediate revocation, decentralized authorization, and maintains low overhead for publishers and subscribers. The prototype system is implemented and its performance is evaluated. The results show that REEDS is not only easy to deploy over existing message brokers but also highly efficient.
引用
收藏
页码:4526 / 4542
页数:17
相关论文
共 50 条
  • [41] Steady A Simple End-to-End Secure Logging System
    Pulls, Tobias
    Dahlberg, Rasmus
    SECURE IT SYSTEMS, 2018, 11252 : 88 - 103
  • [42] Multistage End-to-End Driver Drowsiness Alerting System
    Sowmyashree, P.
    Sangeetha, J.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (04) : 464 - 473
  • [43] An End-to-End Context Aware Anomaly Detection System
    Vinzamuri, Bhanukiran
    Khabiri, Elham
    Bhamidipaty, Anuradha
    Mckim, Gregory
    Gandhi, Biren
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 1689 - 1698
  • [44] A Provably Secure and Practical PUF-Based End-to-End Mutual Authentication and Key Exchange Protocol for IoT
    Li, Sensen
    Zhang, Tikui
    Yu, Bin
    He, Kuan
    IEEE SENSORS JOURNAL, 2021, 21 (04) : 5487 - 5501
  • [45] Enhancing End-to-End Communication Security in IoT Devices Through Application Layer Protocol
    Zahid, Rimsha
    Anwar, Muhammad Waseem
    Azam, Farooque
    Amjad, Anam
    Mukhtar, Danish
    INFORMATION AND SOFTWARE TECHNOLOGIES, ICIST 2022, 2022, 1665 : 148 - 159
  • [46] End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies
    Berlato, Stefano
    Morelli, Umberto
    Carbone, Roberto
    Ranise, Silvio
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXVI, DBSEC 2022, 2022, 13383 : 236 - 255
  • [47] End-to-End Data Quality Assessment Using Trust for Data Shared IoT Deployments
    Byabazaire, John
    O'Hare, Gregory M. P.
    Delaney, Declan T.
    IEEE SENSORS JOURNAL, 2022, 22 (20) : 19995 - 20009
  • [48] An efficient identity-based cryptosystem for end-to-end mobile security
    Hwu, Jing-Shyang
    Chen, Rong-Jaye
    Lin, Yi-Bing
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2006, 5 (09) : 2586 - 2593
  • [49] Secured End-to-End FSO-VLC-Based IoT Network With Randomly Positioned VLC: Known and Unknown CSI
    Saxena, Vishal Narain
    Gupta, Juhi
    Dwivedi, Vivek K. K.
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (02) : 1347 - 1357
  • [50] Reducing End-to-End Latency of Trigger-Action IoT Programs on Containerized Edge Platforms
    Zhang, Wenzhao
    Teng, Yixiao
    Gao, Yi
    Dong, Wei
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (12) : 13979 - 13990