Attribute-Based Encryption Schemes for Next Generation Wireless IoT Networks: A Comprehensive Survey

被引:3
|
作者
Shruti [1 ,2 ]
Rani, Shalli [2 ]
Sah, Dipak Kumar [3 ]
Gianini, Gabriele [4 ]
机构
[1] Goswami Ganesh Dutta Sanatan Dharma Coll, Chandigarh 160030, India
[2] Chitkara Univ, Chitkara Univ Inst Engn & Technol, Rajpura 140401, Punjab, India
[3] GLA Univ, Dept Comp Engn & Applicat, Mathura 281406, Uttar Pradesh, India
[4] Univ Milan, Dipartimento Informat, Via Celoria 18, I-20133 Milan, Italy
关键词
attribute-based encryption; cryptographic methods; fine-grained access control; Internet of Things; security; privacy; ERROR-DETECTION; CP-ABE; DETECTION ARCHITECTURES; LIGHTWEIGHT; REVOCATION; EFFICIENT; INTERNET; DEVICES; DESIGN; KEYS;
D O I
10.3390/s23135921
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Most data nowadays are stored in the cloud; therefore, cloud computing and its extension-fog computing-are the most in-demand services at the present time. Cloud and fog computing platforms are largely used by Internet of Things (IoT) applications where various mobile devices, end users, PCs, and smart objects are connected to each other via the internet. IoT applications are common in several application areas, such as healthcare, smart cities, industries, logistics, agriculture, and many more. Due to this, there is an increasing need for new security and privacy techniques, with attribute-based encryption (ABE) being the most effective among them. ABE provides fine-grained access control, enables secure storage of data on unreliable storage, and is flexible enough to be used in different systems. In this paper, we survey ABE schemes, their features, methodologies, benefits/drawbacks, attacks on ABE, and how ABE can be used with IoT and its applications. This survey reviews ABE models suitable for IoT platforms, taking into account the desired features and characteristics. We also discuss various performance indicators used for ABE and how they affect efficiency. Furthermore, some selected schemes are analyzed through simulation to compare their efficiency in terms of different performance indicators. As a result, we find that some schemes simultaneously perform well in one or two performance indicators, whereas none shines in all of them at once. The work will help researchers identify the characteristics of different ABE schemes quickly and recognize whether they are suitable for specific IoT applications. Future work that may be helpful for ABE is also discussed.
引用
收藏
页数:33
相关论文
共 50 条
  • [1] A Survey on Attribute-Based Encryption Schemes Suitable for the Internet of Things
    Rasori, Marco
    La Manna, Michele
    Perazzo, Pericle
    Dini, Gianluca
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) : 8269 - 8290
  • [2] Attacking Pairing-Free Attribute-Based Encryption Schemes
    Herranz, Javier
    IEEE ACCESS, 2020, 8 : 222226 - 222232
  • [3] Cryptanalysis and Discussion on Two Attribute-Based Encryption Schemes
    Tseng, Yi-Fan
    Huang, Jheng-Jia
    Yang, Hao-Yu
    Chien, Tsung-Yu
    Wu, Chieh-Han
    2022 17TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY, ASIAJCIS, 2022, : 24 - 28
  • [4] A survey on attribute-based encryption for internet of things
    Kumar, Dilip
    Kumar, Manoj
    Gupta, Gaurav
    INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2023, 14 (02)
  • [5] Attribute-Based Searchable Encryption: A Survey
    Yan, Li
    Wang, Gaozhou
    Yin, Tian
    Liu, Peishun
    Feng, Hongxin
    Zhang, Wenbin
    Hu, Hailin
    Pan, Fading
    ELECTRONICS, 2024, 13 (09)
  • [6] SEA-BREW: A scalable Attribute-Based Encryption revocable scheme for low-bitrate IoT wireless networks
    La Manna, Michele
    Perazzo, Pericle
    Dini, Gianluca
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [7] Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption
    Al-Dahhan, Ruqayah R.
    Shi, Qi
    Lee, Gyu Myoung
    Kifayat, Kashif
    SENSORS, 2019, 19 (07)
  • [8] Revocation in attribute-based encryption for fog-enabled internet of things: A systematic survey
    Penuelas-Angulo, Alejandro
    Feregrino-Uribe, Claudia
    Morales-Sandoval, Miguel
    INTERNET OF THINGS, 2023, 23
  • [9] Attribute-based Encryption for Cloud Computing Access Control: A Survey
    Zhang, Yinghui
    Deng, Robert H.
    Xu, Shengmin
    Sun, Jianfei
    Li, Qi
    Zheng, Dong
    ACM COMPUTING SURVEYS, 2020, 53 (04)
  • [10] On the Decentralization of Attribute-Based Encryption Schemes
    Hinojosa-Cabello, Melissa Brigitthe
    Aldeco-Perez, Rocio Alejandra
    Morales-Sandoval, Miguel
    Garcia-Hernandez, Jose Juan
    2023 MEXICAN INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE, ENC, 2024,