An Implementation of Data Exchange Using Authenticated Attribute-Based Encryption for Environmental Monitoring

被引:0
|
作者
Munsyi [1 ]
Sudarsono, Amang [1 ]
Al Rasyid, M. Udin Harun [1 ]
机构
[1] Politekn Elekt Negeri Surabaya, Informat & Comp Engn Dept, Surabaya, Indonesia
关键词
Environment Monitoring; CP-ABE; User Revocation; Timestamp Digital Signature RSA 2048;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A reliable and efficient security system on the Internet of things era is one of the most required aspects. An information security in the environment monitoring system is very important, the information sent from the wireless sensor network to the Data Center must be completely secure and only users with the access right can read the contents of the information. To secure the contents of the data, then ciphertext policy attribute-based encryption (CP-ABE) is one of solution for the data security. The data sent from the Data Center will be encrypted using attributes attached to the previously registered user. The data can be decrypted if and only if the attributes of the users are appropriate to the existing policy rules on the ciphertext. The importance of maintaining the authenticity of data on a system, it is necessary to add a security system to protect from users who perform illegal acts. In this paper, we discuss the security mechanism with revocation user, we use the attributes in the CP-ABE who can be updated if the user is doing the illegal actions of the system. By adding an authentication feature using a timestamp digital signature Rivest, Shamir Adleman (RSA) 2048 in a message, it will be a guaranteed the data integrity of information data and no repetition of data transmitted by any particular party.
引用
收藏
页码:59 / 64
页数:6
相关论文
共 50 条
  • [1] An Implementation of Data Exchange in Environmental Monitoring Using Authenticated Attribute-Based Encryption with Revocation
    Munsyi
    Sudarsono, Amang
    Al Rasyid, M. Udin Harun
    2018 INTERNATIONAL ELECTRONICS SYMPOSIUM ON KNOWLEDGE CREATION AND INTELLIGENT COMPUTING (IES-KCIC), 2018, : 359 - 366
  • [2] Secure Data Sensor Access Using Attribute-Based Encryption With Revocation For Environmental Monitoring
    Munsyi
    Sudarsono, Amang
    Al Rasyid, M. Udin Harun
    2016 INTERNATIONAL CONFERENCE ON KNOWLEDGE CREATION AND INTELLIGENT COMPUTING (KCIC), 2016, : 73 - 79
  • [3] Attribute-Based Authenticated Key Exchange
    Gorantla, M. Choudary
    Boyd, Colin
    Nieto, Juan Manuel Gonzalez
    INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 300 - 317
  • [4] An Implementation of Secure Data Exchange in Wireless Delay Tolerant Network Using Attribute-Based Encryption
    Sudarsono, Amang
    Nakanishi, Toru
    2014 SECOND INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2014, : 536 - 542
  • [5] ABAEKS: Attribute-Based Authenticated Encryption With Keyword Search Over Outsourced Encrypted Data
    Luo, Fucai
    Wang, Haiyan
    Lin, Changlu
    Yan, Xingfu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4970 - 4983
  • [6] An Efficient Attribute-Based Authenticated Key Exchange Protocol
    Chakraborty, Suvradip
    Rao, Y. Sreenivasa
    Rangan, Chandrasekaran Pandu
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2017), 2018, 11261 : 493 - 503
  • [7] Software Implementation of an Attribute-Based Encryption Scheme
    Zavattoni, Eric
    Dominguez Perez, Luis J.
    Mitsunari, Shigeo
    Sanchez-Ramirez, Ana H.
    Teruya, Tadanori
    Rodriguez-Henriquez, Francisco
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (05) : 1429 - 1441
  • [8] A Digital Envelope approach using Attribute-Based Encryption for Secure Data Exchange in IoT Scenarios
    Perez, Salvador
    Hernandez-Ramos, Jose L.
    Skarmeta, Antonio F.
    Pedone, Diego
    Rotondi, Domenico
    Straniero, Leonardo
    2017 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS 2017), 2017, : 421 - 426
  • [9] Attribute-Based Encryption for Named Data Networking
    Lenin, Aleksandr
    Laud, Peeter
    PROCEEDINGS OF THE 2021 8TH ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ICN '21), 2021, : 118 - 120
  • [10] Attribute-based encryption
    Sahai, Amit
    Waters, Brent
    Lu, Steve
    Cryptology and Information Security Series, 2009, 2 : 156 - 168