Smart offloading technique for CP-ABE encryption schemes in constrained devices

被引:0
作者
Mohammad Bany Taha
Hakima Ould-Slimane
Chamseddine Talhi
机构
[1] University of Quebec,Department of Software Engineering and IT, École de Technologie Supérieure
来源
SN Applied Sciences | 2020年 / 2卷
关键词
CP-ABE; Offloading; IoT; Machine learning;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, we are attending to the wide proliferation of IoT devices in various computing environments. Actually, this trend is the natural way to extend the M2M communication. However, these devices are facing serious resource constraints. To mitigate this problem, the huge amount of the exchanged data is collected from these devices for being stored and processed by the Cloud. Furthermore, since the Cloud is honest but curious, it may reveal personal information about users’ habits owning these devices and can even lead to user profiling. Consequently, security mechanisms should be deployed at different levels to preserve data privacy so that only authorized users can gain access to the smallest piece of data according to the collection purpose. By assuming that the Cloud-is-honest-but-curious, we can not provide full or similar access to different untrusted Cloud services. Therefore, we should define the relevant privacy level implementing the data access control for each Cloud service according to some criteria. In this context, CP-ABE is a promising solution addressing this problem. This novel attribute-based public key encryption system provides a flexible fine-grained access control to data for any data requestor. However, performing all the related cryptographic operations on such devices is practically infeasible because of the resource constraints. For alleviating all the computation burden on these resource-limited devices, several schemes have been proposed. In this work, we propose a smart offloading technique that switches dynamically from full encryption to partial encryption according to a wise decision strategy considering the available resources and some crucial parameters like the number of attributes and the size of the data being encrypted. The relevant decision is based on a machine learning algorithm. To the best of our knowledge, this is the first paper proposing an adaptive CP-ABE scheme for constrained device optimizing the overall available resources.
引用
收藏
相关论文
共 69 条
  • [1] Cuka M(2019)Implementation and performance evaluation of two fuzzy-based systems for selection of iot devices in opportunistic networks J Ambient Intell Hum Comput 10 519-529
  • [2] Elmazi D(2014)Internet of things for smart cities IEEE Internet Things J 1 22-32
  • [3] Bylykbashi K(2019)Performance evaluation of cp-abe schemes under constrained devices Procedia Comput Sci 155 425-432
  • [4] Spaho E(2017)Sedasc: secure data sharing in clouds IEEE Syst J 11 395-404
  • [5] Ikeda M(2019)Internet of things: information security challenges and solutions Cluster Comput 22 103-119
  • [6] Barolli L(2015)Generic constructions for role-based encryption Int J Inf Secur 14 417-430
  • [7] Zanella A(2014)A general comparison of symmetric and asymmetric cryptosystems for WSNs and an overview of location based encryption technique for improving security IOSR J Eng 4 1-112
  • [8] Bui N(2015)A lightweight attribute-based encryption scheme for the internet of things Future Gener Comput Syst 49 104-31
  • [9] Castellani A(2014)A secure scheme for storage, retrieval, and sharing of digital documents in cloud computing using attribute-based encryption on mobile devices Inf Secur J Global Perspect 23 22-448
  • [10] Vangelista L(2019)A cluster of cp-abe microservices for vanet Procedia Comput Sci 155 441-7335