Efficient key management for IOT owner in the cloud

被引:2
作者
Cui, Zongmin [1 ]
Lv, Haitao [1 ]
Yin, Chao [1 ]
Gao, Guangyong [1 ]
Zhou, Caixue [1 ]
机构
[1] Jiujiang Univ, Sch Informat Sci & Technol, Jiujiang 332005, Peoples R China
来源
PROCEEDINGS 2015 IEEE FIFTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING BDCLOUD 2015 | 2015年
关键词
Internet of things; Sensitive data; IOT owner key management; Authorization update; Cloud computing; ACCESS-CONTROL;
D O I
10.1109/BDCloud.2015.40
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
IOT (internet of things) owner may not want their sensitive data to be public in the cloud. However, the client operated by IOT owner may be too lightweight to provide the encryption/decryption service. To remove the issue, we propose a novel solution to minimize the access control cost for IOT owner. First, we present a security model for IOT with minimal cost of IOT owner client without encryption, in which we transfer the encryption/decryption from the client to the cloud. Second, we propose an access control model to minimize the key management cost for IOT owner. Third, we provide an authorization update method to minimize the cost dynamically. In our method, the sensitive data from IOT owner is only available to the authorized user. Each IOT owner needs only to manage a single password, by which the IOT owner can always manage his/her sensitive data and authorization no matter the authorization policy how to change. Experimental results show that our approach significantly outperforms most of existing methods with efficient key management for IOT owner.
引用
收藏
页码:56 / 61
页数:6
相关论文
共 21 条
  • [1] Specification, Validation, and Enforcement of a Generalized Spatio-Temporal Role-Based Access Control Model
    Abdunabi, Ramadan
    Al-Lail, Mustafa
    Ray, Indrakshi
    France, Robert B.
    [J]. IEEE SYSTEMS JOURNAL, 2013, 7 (03): : 501 - 515
  • [2] [Anonymous], 2012, PROC ACM C DATA APPL
  • [3] [Anonymous], 2012, P 7 ACM S INFORM COM
  • [4] Dynamic and Efficient Key Management for Access Hierarchies
    Atallah, Mikhail J.
    Blanton, Marina
    Fazio, Nelly
    Frikken, Keith B.
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 12 (03)
  • [5] Blundo Carlo, 2009, SEC PAF CYPR MAY 18, P364
  • [6] Diversity-Aware Top-k Publish/Subscribe for Text Stream
    Chen, Lisi
    Cong, Gao
    [J]. SIGMOD'15: PROCEEDINGS OF THE 2015 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2015, : 347 - 362
  • [7] Lightweight key management on sensitive data in the cloud
    Cui, Zongmin
    Zhu, Hong
    Chi, Lianhua
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (10) : 1290 - 1299
  • [8] di Vimercati S.D. C., 2007, P 33 INT C VERY LARG, P123
  • [9] Encryption Policies for Regulating Access to Outsourced Data
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    Jajodia, Sushil
    Paraboschi, Stefano
    Samarati, Pierangela
    [J]. ACM TRANSACTIONS ON DATABASE SYSTEMS, 2010, 35 (02):
  • [10] Secure and efficient public key management in next generation mobile networks
    Han, Kyusuk
    Mun, Hyeran
    Shon, Taeshik
    Yeun, Chan Yeob
    Park, James J.
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2012, 16 (06) : 677 - 685