Attribute-Based Encryption Schemes for Next Generation Wireless IoT Networks: A Comprehensive Survey

被引:3
|
作者
Shruti [1 ,2 ]
Rani, Shalli [2 ]
Sah, Dipak Kumar [3 ]
Gianini, Gabriele [4 ]
机构
[1] Goswami Ganesh Dutta Sanatan Dharma Coll, Chandigarh 160030, India
[2] Chitkara Univ, Chitkara Univ Inst Engn & Technol, Rajpura 140401, Punjab, India
[3] GLA Univ, Dept Comp Engn & Applicat, Mathura 281406, Uttar Pradesh, India
[4] Univ Milan, Dipartimento Informat, Via Celoria 18, I-20133 Milan, Italy
关键词
attribute-based encryption; cryptographic methods; fine-grained access control; Internet of Things; security; privacy; ERROR-DETECTION; CP-ABE; DETECTION ARCHITECTURES; LIGHTWEIGHT; REVOCATION; EFFICIENT; INTERNET; DEVICES; DESIGN; KEYS;
D O I
10.3390/s23135921
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Most data nowadays are stored in the cloud; therefore, cloud computing and its extension-fog computing-are the most in-demand services at the present time. Cloud and fog computing platforms are largely used by Internet of Things (IoT) applications where various mobile devices, end users, PCs, and smart objects are connected to each other via the internet. IoT applications are common in several application areas, such as healthcare, smart cities, industries, logistics, agriculture, and many more. Due to this, there is an increasing need for new security and privacy techniques, with attribute-based encryption (ABE) being the most effective among them. ABE provides fine-grained access control, enables secure storage of data on unreliable storage, and is flexible enough to be used in different systems. In this paper, we survey ABE schemes, their features, methodologies, benefits/drawbacks, attacks on ABE, and how ABE can be used with IoT and its applications. This survey reviews ABE models suitable for IoT platforms, taking into account the desired features and characteristics. We also discuss various performance indicators used for ABE and how they affect efficiency. Furthermore, some selected schemes are analyzed through simulation to compare their efficiency in terms of different performance indicators. As a result, we find that some schemes simultaneously perform well in one or two performance indicators, whereas none shines in all of them at once. The work will help researchers identify the characteristics of different ABE schemes quickly and recognize whether they are suitable for specific IoT applications. Future work that may be helpful for ABE is also discussed.
引用
收藏
页数:33
相关论文
共 50 条
  • [31] Lightweight Attribute-based Encryption for the Internet of Things
    Oualha, Nouha
    Kim Thuat Nguyen
    2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [32] dAPRE:Efficient and Reliable Attribute-Based Proxy Re-Encryption Using DAG for Data Sharing in IoT
    Li, Xiaoxiao
    Xie, Yong
    Wang, Hui
    Su, Xing
    Li, Haifeng
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 584 - 596
  • [33] Attribute-Based Adaptive Homomorphic Encryption for Big Data Security
    Thenmozhi, R.
    Shridevi, S.
    Mohanty, Sachi Nandan
    Garcia Diaz, Vicente
    Gupta, Deepak
    Tiwari, Prayag
    Shorfuzzaman, Mohammad
    BIG DATA, 2024, 12 (05) : 343 - 356
  • [34] Two Practical Attribute-Based Encryption Schemes for Privacy-Preserving Mobile Location-Sharing Applications
    Chen, Zhenhua
    Li, Ni
    Huang, Luqi
    Jia, Xingxing
    Wang, Yilei
    Wang, Hao
    Su, Jing
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (05): : 5148 - 5159
  • [35] Load-balanced attribute-based outsourced encryption for constrained IoT devices
    Gasmi, Meriem
    Kerdoudi, Mohamed Lamine
    Bachir, Abdelmalik
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 118
  • [36] Secure Sharing of IOT Data in Cloud Environment Using Attribute-Based Encryption
    Kanimozhi, P.
    Victoire, T. Aruldoss Albert
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2021, 30 (06)
  • [37] Substring-searchable attribute-based encryption and its application for IoT devices
    Sun, Xi
    Wang, Hao
    Fu, Xiu
    Qin, Hong
    Jiang, Mei
    Xue, Likun
    Wei, Xiaochao
    DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (02) : 277 - 283
  • [38] A Survey on Encryption Schemes in Wireless Sensor Networks
    Hayouni, Haythem
    Hamdi, Mohamed
    Kim, Tai-Hoon
    2014 7TH INTERNATIONAL CONFERENCE ON ADVANCED SOFTWARE ENGINEERING AND ITS APPLICATIONS (ASEA), 2014, : 39 - 43
  • [39] Accountable and Revocable Large Universe Decentralized Multi-Authority Attribute-Based Encryption for Cloud-Aided IoT
    Huang, Kaiqing
    IEEE ACCESS, 2021, 9 : 123786 - 123804
  • [40] Attribute-based encryption with enforceable obligations
    Hamed Arshad
    Pablo Picazo-Sanchez
    Christian Johansen
    Gerardo Schneider
    Journal of Cryptographic Engineering, 2023, 13 : 343 - 371