Secure Data Provenance in Internet of Things based Networks by Outsourcing Attribute based Signatures and using Bloom Filters

被引:0
作者
Siddiqui, Muhammad Shoaib [1 ]
Rahman, Atiqur [1 ]
Nadeem, Adnan [1 ]
Alzahrani, Ali M. [1 ]
机构
[1] Islamic Univ Madinah, Fac Comp & Informat Syst, Medina, Saudi Arabia
关键词
Data provenance; bloom filter; ciphertext policy attribute based encryption; IoT;
D O I
10.14569/ijacsa.2019.0100529
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the dawn of autonomous organization and network and service management, the integration of existing networks with Internet of Things (IoT) based networks is becoming a reality. With minimal human interaction, the security of IoT data moving through the network becomes prone to attacks. IoT networks require a secure provenance mechanism, which is efficient and lightweight because of the scarce computing and storage resources at the IoT nodes. In this paper, we have proposed a secure mechanism to sign and authenticate provenance messages using Ciphertext-Policy Attribute Based Encryption (CP-ABE) based signatures. The proposed technique uses Bloom filters to reduce storage requirements and an outsourced ABE mechanism to use lessen the computational requirements at the IoT devices. The proposed technique helps in reducing the storage requirements and computation time in IoT devices. The performance of the proposed mechanism is evaluated and the results show that the proposed solution is best suited for resourced constrained IoT network.
引用
收藏
页码:221 / 226
页数:6
相关论文
共 17 条
  • [1] ON THE FEASIBILITY OF ATTRIBUTE-BASED ENCRYPTION ON INTERNET OF THINGS DEVICES
    Ambrosin, Moreno
    Anzanpour, Arman
    Conti, Mauro
    Dargahi, Tooska
    Moosavi, Sanaz Rahimi
    Rahmani, Amir M.
    Liljeberg, Pasi
    [J]. IEEE MICRO, 2016, 36 (06) : 25 - 35
  • [2] [Anonymous], P 3 ACM INT WORKSH I
  • [3] [Anonymous], 2009, TECHNICAL REPORT
  • [4] [Anonymous], INT WORKSH SEC INT T
  • [5] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [6] Broder Andrei, 2004, Internet mathematics, V1, P485, DOI DOI 10.1080/15427951.2004.10129096
  • [7] Buneman P, 2000, LECT NOTES COMPUT SC, V1974, P87
  • [8] Secure Outsourced Attribute-Based Signatures
    Chen, Xiaofeng
    Li, Jin
    Huang, Xinyi
    Li, Jingwei
    Xiang, Yang
    Wong, Duncan S.
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (12) : 3285 - 3294
  • [9] Lineage tracing for general data warehouse transformations
    Cui, YW
    Widom, J
    [J]. VLDB JOURNAL, 2003, 12 (01) : 41 - 58
  • [10] Joyia G. J., 2017, J. Commun., V12, P240, DOI [DOI 10.12720/JCM.12.4.240-247, DOI 10.12720/JCM.12.4.240]