Outsourcing Attribute-Based Encryption to Enhance IoT Security and Performance

被引:0
|
作者
Taha, Mohammad Bany [1 ]
Khasawneh, Fawaz A. [2 ]
Quttoum, Ahmad Nahar [3 ]
Alshammari, Muteb [4 ]
Alomari, Zakaria [5 ]
机构
[1] Amer Univ Madaba, Fac Informat Technol, Data Sci & Artificial Intelligence Dept, Amman 11821, Jordan
[2] Al Hussein Tech Univ, Sch Comp & Informat, Dept Cybersecur, Amman 11831, Jordan
[3] Hashemite Univ, Fac Engn, Dept Comp Engn, Zarqa 13133, Jordan
[4] Northern Border Univ, Fac Comp & Informat Technol, Dept Informat Technol, Ar Ar 91431, Saudi Arabia
[5] New York Inst Technol, Coll Engn & Comp Sci, Dept Comp Sci, Vancouver, BC V5M 4X5, Canada
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Internet of Things; Encryption; Cryptography; Security; Servers; Data privacy; Protocols; Logic gates; Information technology; Data processing; Data security; Access policy attributes; attribute-based encryption (ABE); cloud; computational overhead; data security; Internet of Things (IoT); INTERNET; SCHEME;
D O I
10.1109/ACCESS.2024.3491951
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the adoption of Internet of Things (IoT) systems, particularly those integrated with cloud technology, continues to expand, ensuring data security and privacy while maintaining optimal performance becomes increasingly challenging. Complex encryption algorithms, when run on IoT devices with limited resources, can significantly hinder processing speed and resource efficiency. This paper introduces an innovative Attribute-Based Encryption (ABE) framework that offloads computationally intensive cryptographic operations to a proxy server. This approach alleviates the computational strain on resource-constrained IoT devices, allowing them to efficiently handle encryption and decryption tasks despite their limited processing power, memory, and battery life. Additionally, we present a robust security model that ensures the privacy and integrity of data in IoT environments, in line with the requirements of ABE. We conduct an extensive performance analysis, evaluating key metrics such as execution time, ciphertext size, and memory usage, demonstrating that our proposed scheme surpasses existing state-of-the-art methods in efficiency. The primary contributions of this work include the development of a lightweight ABE offloading framework, the creation of a strong security model, and a thorough performance assessment that highlights the scheme's efficiency and practicality for real-world IoT applications.
引用
收藏
页码:166800 / 166813
页数:14
相关论文
共 50 条
  • [1] Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation
    Gao J.
    Sun J.
    Qin J.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2160 - 2169
  • [2] Securely Outsourcing Attribute-Based Encryption with Checkability
    Li, Jin
    Huang, Xinyi
    Li, Jingwei
    Chen, Xiaofeng
    Xiang, Yang
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (08) : 2201 - 2210
  • [3] Performance evaluation of Attribute-Based Encryption on constrained IoT devices*
    Perazzo, Pericle
    Righetti, Francesca
    La Manna, Michele
    Vallati, Carlo
    COMPUTER COMMUNICATIONS, 2021, 170 : 151 - 163
  • [4] Efficient Attribute-Based Encryption Outsourcing Scheme With User and Attribute Revocation for Fog-Enabled IoT
    Li, Ling
    Wang, Zheng
    Li, Na
    IEEE ACCESS, 2020, 8 : 176738 - 176749
  • [5] Attribute-Based Online/Offline Encryption with Outsourcing Decryption
    Wang, Zhan-Jun
    Ma, Hai-Ying
    Wang, Jin-Hua
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (06) : 1595 - 1611
  • [6] Attribute-based encryption scheme supporting attribute revocation and decryption outsourcing
    School of Mathematics and Statistics, Xidian Univ., Xi'an
    710071, China
    Xi'an Dianzi Keji Daxue Xuebao, 6 (6-10 and 55):
  • [7] Attribute-Based Searchable Encryption With Forward Security for Cloud-Assisted IoT
    Ghopur, Dilxat
    IEEE ACCESS, 2024, 12 : 90840 - 90852
  • [8] Performance Evaluation of Attribute-Based Encryption: Toward Data Privacy in the IoT
    Wang, Xinlei
    Zhang, Jianqing
    Schooler, Eve M.
    Ion, Mihaela
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 725 - 730
  • [9] Securely outsourcing the ciphertext-policy attribute-based encryption
    Kim Thuat Nguyen
    Oualha, Nouha
    Laurent, Maryline
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (01): : 169 - 183
  • [10] Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating
    Liu, Zechao
    Jiang, Zoe L.
    Wang, Xuan
    Yiu, S. M.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 108 : 112 - 123