An Implementation of Data Exchange Using Authenticated Attribute-Based Encryption for Environmental Monitoring

被引:0
|
作者
Munsyi [1 ]
Sudarsono, Amang [1 ]
Al Rasyid, M. Udin Harun [1 ]
机构
[1] Politekn Elekt Negeri Surabaya, Informat & Comp Engn Dept, Surabaya, Indonesia
关键词
Environment Monitoring; CP-ABE; User Revocation; Timestamp Digital Signature RSA 2048;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A reliable and efficient security system on the Internet of things era is one of the most required aspects. An information security in the environment monitoring system is very important, the information sent from the wireless sensor network to the Data Center must be completely secure and only users with the access right can read the contents of the information. To secure the contents of the data, then ciphertext policy attribute-based encryption (CP-ABE) is one of solution for the data security. The data sent from the Data Center will be encrypted using attributes attached to the previously registered user. The data can be decrypted if and only if the attributes of the users are appropriate to the existing policy rules on the ciphertext. The importance of maintaining the authenticity of data on a system, it is necessary to add a security system to protect from users who perform illegal acts. In this paper, we discuss the security mechanism with revocation user, we use the attributes in the CP-ABE who can be updated if the user is doing the illegal actions of the system. By adding an authentication feature using a timestamp digital signature Rivest, Shamir Adleman (RSA) 2048 in a message, it will be a guaranteed the data integrity of information data and no repetition of data transmitted by any particular party.
引用
收藏
页码:59 / 64
页数:6
相关论文
共 50 条
  • [41] Attribute-based keyword search encryption for power data protection
    Zhang, Xun
    Mu, Dejun
    Zhao, Jinxiong
    HIGH-CONFIDENCE COMPUTING, 2023, 3 (02):
  • [42] Complex and flexible data access policy in attribute-based encryption
    Shengzhou Hu
    Xingfu Wang
    Hua He
    Tingting Zhong
    The Journal of Supercomputing, 2022, 78 : 1010 - 1029
  • [43] On Attribute-Based Encryption for Access Control to Multidimensional Data Structures
    Epishkina, Anna
    Zapechnikov, Sergey
    BIOLOGICALLY INSPIRED COGNITIVE ARCHITECTURES (BICA) FOR YOUNG SCIENTISTS, 2018, 636 : 251 - 256
  • [44] Power data sharing scheme based on blockchain and attribute-based encryption
    Yang X.
    Liao Z.
    Liu L.
    Wang C.
    Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control, 2023, 51 (13): : 169 - 176
  • [45] Attribute-based encryption with adaptive policy
    Yiliang Han
    Soft Computing, 2019, 23 : 4009 - 4017
  • [46] Attribute-Based Symmetric Searchable Encryption
    Dang, Hai-Van
    Ullah, Amjad
    Bakas, Alexandros
    Michalas, Antonis
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 318 - 336
  • [47] Online/Offline Attribute-Based Encryption
    Hohenberger, Susan
    Waters, Brent
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 293 - 310
  • [48] Attribute-Based Encryption with Personalized Search
    Zhang, Qiang
    Wang, Guojun
    Liu, Qin
    Peng, Tao
    2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 1172 - 1178
  • [49] Attribute-Based Searchable Encryption: A Survey
    Yan, Li
    Wang, Gaozhou
    Yin, Tian
    Liu, Peishun
    Feng, Hongxin
    Zhang, Wenbin
    Hu, Hailin
    Pan, Fading
    ELECTRONICS, 2024, 13 (09)
  • [50] Attribute-Based Encryption for Range Attributes
    Attrapadung, Nuttapong
    Hanaoka, Goichiro
    Ogawa, Kazuto
    Ohtake, Go
    Watanabe, Hajime
    Yamada, Shota
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2016, 2016, 9841 : 42 - 61