REEDS: An Efficient Revocable End-to-End Encrypted Message Distribution System for IoT

被引:1
|
作者
Li, Cui [1 ,2 ]
Chen, Rongmao [1 ]
Wang, Yi [1 ]
Xing, Qianqian [1 ]
Wang, Baosheng [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha 410073, Peoples R China
[2] Natl Univ Def Technol, Sch Informat & Commun, Xian 710106, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Encryption; Public key; Protocols; Performance evaluation; Scalability; Receivers; Proxy re-encryption; conditional proxy re-encryption; decryption rights revocation; publish subscribe paradigm; internet of Things; PROXY RE-ENCRYPTION; BROADCAST ENCRYPTION; CIPHERTEXTS;
D O I
10.1109/TDSC.2024.3353811
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To address the confidentiality concerns of malicious adversaries that fully compromise the message broker in pub/sub based IoT systems, several researchers use proxy re-encryption (PRE) to realize end-to-end encrypted message distribution (from publisher to subscriber). However, the all-or-nothing share feature of PRE poses a problem that the share cannot be efficiently revoked. The only way for publishers to revoke the access rights of subscribers is to pick a new public-private key pair and re-generate the re-encryption keys for all the remaining subscribers, which hampers the scalability in practice. To realize efficient user revocation, we present REEDS, an efficient revocable end-to-end encrypted message distribution system for IoT. The core of REEDS is a novel proxy-aided identity-based conditional proxy re-encryption (PIB-CPRE) scheme. Essentially, we use a binary-tree structure to organize re-encryption keys, so that the update of re-encryption keys is reduced from linear to logarithmic in the number of subscribers. We show that REEDS satisfies confidentiality, efficient immediate revocation, decentralized authorization, and maintains low overhead for publishers and subscribers. The prototype system is implemented and its performance is evaluated. The results show that REEDS is not only easy to deploy over existing message brokers but also highly efficient.
引用
收藏
页码:4526 / 4542
页数:17
相关论文
共 50 条
  • [21] Snake: an End-to-End Encrypted Online Social Network
    Barenghi, Alessandro
    Beretta, Michele
    Di Federico, Alessandro
    Pelosi, Gerardo
    2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 763 - 770
  • [22] A Robust End-to-End IoT System for Supporting Workers in Mining Industries
    Vlachos, Marios
    Pavlopoulos, Lampros
    Georgakopoulos, Anastasios
    Tsimiklis, Georgios
    Amditis, Angelos
    SENSORS, 2024, 24 (11)
  • [23] End-to-end security enabled intelligent remote IoT monitoring system
    Saleem, Kashif
    Zinou, Mohammed Farouk
    Mohammad, Farah
    Ouni, Ridha
    Elhendi, Ahmed Zohier
    Almuhtadi, Jalal
    FRONTIERS IN PHYSICS, 2024, 12
  • [24] IoT ETEI: End-to-end IoT device identification method
    Yin, Feihong
    Yang, Li
    Wang, Yuchen
    Dai, Jiahao
    2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [25] An End-to-End View of IoT Security and Privacy
    Ling, Zhen
    Liu, Kaizheng
    Xu, Yiling
    Jin, Yier
    Fu, Xinwen
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [26] End-to-End Semantic Interoperability Mechanisms for IoT
    Lakka, Eftychia
    Petroulakis, Nikolaos E.
    Hatzivasilis, George
    Soultatos, Othonas
    Michalodimitrakis, Manolis
    Rak, Urszula
    Waledzik, Karolina
    Anicic, Darko
    Kulkarni, Vivek
    2019 IEEE 24TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (IEEE CAMAD), 2019,
  • [27] EverySense: An end-to-end IoT market platform
    Mano, Hiroshi
    ADJUNCT PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING NETWORKING AND SERVICES (MOBIQUITOUS 2016), 2016, : 1 - 5
  • [28] Lightweight End-to-End Blockchain for IoT Applications
    Lee, Seungcheol
    Lee, Jaehyun
    Hong, Sengphil
    Kim, Jae-Hoon
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (08) : 3224 - 3242
  • [29] End-to-end encrypted communication security technology for mobile terminals
    Zhang, Xiaozhi
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2021, 14 (1-2) : 179 - 195
  • [30] Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol
    Davies, Gareth T.
    Faller, Sebastian
    Gellert, Kai
    Handirk, Tobias
    Hesse, Julia
    Horvath, Mate
    Jager, Tibor
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT IV, 2023, 14084 : 330 - 361