An Implementation of Data Exchange Using Authenticated Attribute-Based Encryption for Environmental Monitoring

被引:0
|
作者
Munsyi [1 ]
Sudarsono, Amang [1 ]
Al Rasyid, M. Udin Harun [1 ]
机构
[1] Politekn Elekt Negeri Surabaya, Informat & Comp Engn Dept, Surabaya, Indonesia
关键词
Environment Monitoring; CP-ABE; User Revocation; Timestamp Digital Signature RSA 2048;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A reliable and efficient security system on the Internet of things era is one of the most required aspects. An information security in the environment monitoring system is very important, the information sent from the wireless sensor network to the Data Center must be completely secure and only users with the access right can read the contents of the information. To secure the contents of the data, then ciphertext policy attribute-based encryption (CP-ABE) is one of solution for the data security. The data sent from the Data Center will be encrypted using attributes attached to the previously registered user. The data can be decrypted if and only if the attributes of the users are appropriate to the existing policy rules on the ciphertext. The importance of maintaining the authenticity of data on a system, it is necessary to add a security system to protect from users who perform illegal acts. In this paper, we discuss the security mechanism with revocation user, we use the attributes in the CP-ABE who can be updated if the user is doing the illegal actions of the system. By adding an authentication feature using a timestamp digital signature Rivest, Shamir Adleman (RSA) 2048 in a message, it will be a guaranteed the data integrity of information data and no repetition of data transmitted by any particular party.
引用
收藏
页码:59 / 64
页数:6
相关论文
共 50 条
  • [21] Registered Attribute-Based Encryption
    Hohenberger, Susan
    Lu, George
    Waters, Brent
    Wu, David J.
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT III, 2023, 14006 : 511 - 542
  • [22] Implementation of an Attribute-Based Encryption Scheme Based on SM9
    Shi, Yang
    Ma, Zhiyuan
    Qin, Rufu
    Wang, Xiaoping
    Wei, Wujing
    Fan, Hongfei
    APPLIED SCIENCES-BASEL, 2019, 9 (15):
  • [23] Attribute-Based Encryption for Circuits
    Gorbunov, Sergey
    Vaikuntanathan, Vinod
    Wee, Hoeteck
    JOURNAL OF THE ACM, 2015, 62 (06)
  • [24] Provably secure attribute-based authenticated encryption with keyword search from ideal lattices
    Lisha YAO
    Lin HOU
    Jian WENG
    Feixiang ZHAO
    Science China(Information Sciences), 2024, 67 (01) : 308 - 309
  • [25] Provably secure attribute-based authenticated encryption with keyword search from ideal lattices
    Lisha Yao
    Lin Hou
    Jian Weng
    Feixiang Zhao
    Science China Information Sciences, 2024, 67
  • [26] Distributed Attribute-Based Encryption
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 20 - 36
  • [27] Enhancing Attribute-Based Encryption with Attribute Hierarchy
    Li, Jin
    Wang, Qian
    Wang, Cong
    Ren, Kui
    MOBILE NETWORKS & APPLICATIONS, 2011, 16 (05): : 553 - 561
  • [28] Provably secure attribute-based authenticated encryption with keyword search from ideal lattices
    Yao, Lisha
    Hou, Lin
    Weng, Jian
    Zhao, Feixiang
    SCIENCE CHINA-INFORMATION SCIENCES, 2024, 67 (01)
  • [29] Enhancing Attribute-Based Encryption with Attribute Hierarchy
    Jin Li
    Qian Wang
    Cong Wang
    Kui Ren
    Mobile Networks and Applications, 2011, 16 : 553 - 561
  • [30] Attribute-based Encryption Scheme with Fast Encryption
    一种支持快速加密的基于属性加密方案
    Feng, Chao-Sheng (csfenggy@126.com), 1600, Chinese Academy of Sciences (31): : 3923 - 3936