A lightweight attribute-based encryption scheme for the Internet of Things

被引:224
作者
Yao, Xuanxia [1 ]
Chen, Zhi [1 ]
Tian, Ye [2 ,3 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[2] Chinese Acad Sci, Comp Network Informat Ctr, Beijing 100190, Peoples R China
[3] China Internet Network Informat Ctr, DNSLAB, Beijing 100190, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2015年 / 49卷
基金
中国国家自然科学基金;
关键词
Internet of Things; Attribute-based encryption; Elliptic curve cryptography; Decision Diffie-Hellman problem; Selective-set model;
D O I
10.1016/j.future.2014.10.010
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Internet of Things (loT) is an emerging network paradigm, which realizes the interconnections among the ubiquitous things and is the foundation of smart society. Since loT are always related to user's daily life or work, the privacy and security are of great importance. The pervasive, complex and heterogeneous properties of loT make its security issues very challenging. In addition, the large number of resourcesconstraint nodes makes a rigid lightweight requirement for IoT security mechanisms. Presently, the attribute-based encryption (ABE) is a popular solution to achieve secure data transmission, storage and sharing in the distributed environment such as IoT. However, the existing ABE schemes are based on expensive bilinear pairing, which make them not suitable for the resources-constraint IoT applications. In this paper, a lightweight no-pairing ABE scheme based on elliptic curve cryptography (ECC) is proposed to address the security and privacy issues in IoT. The security of the proposed scheme is based on the ECDDH assumption instead of bilinear Diffie-Hellman assumption, and is proved in the attribute based selective-set model. By uniformly determining the criteria and defining the metrics for measuring the communication overhead and computational overhead, the comparison analyses with the existing ABE schemes are made in detail. The results show that the proposed scheme has improved execution efficiency and low communication costs. In addition, the limitations and the improving directions of it are also discussed in detail. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:104 / 112
页数:9
相关论文
共 24 条
[1]   Authentication of lossy data in body-sensor networks for cloud-based healthcare monitoring [J].
Ali, Syed Taha ;
Sivaraman, Vijay ;
Ostry, Diethelm .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 35 :80-90
[2]  
[Anonymous], 1993, CRYPTO, DOI DOI 10.1007/3-540-48329-2
[3]  
Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P90, DOI 10.1007/978-3-642-19379-8_6
[4]   Internet of Things: Applications and Challenges in Technology and Standardization [J].
Bandyopadhyay, Debasis ;
Sen, Jaydip .
WIRELESS PERSONAL COMMUNICATIONS, 2011, 58 (01) :49-69
[5]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[6]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[7]  
Chen C, 2011, LECT NOTES COMPUT SC, V6980, P84, DOI 10.1007/978-3-642-24316-5_8
[8]  
Dlodlo N., 2012, International Proceedings of Chemical, Biological and Environmental Engineering (IPCBEE), V32, P45
[9]  
Gayoso V., 2010, J. Comput. Sci. Eng, V2, P7
[10]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1