REEDS: An Efficient Revocable End-to-End Encrypted Message Distribution System for IoT

被引:1
|
作者
Li, Cui [1 ,2 ]
Chen, Rongmao [1 ]
Wang, Yi [1 ]
Xing, Qianqian [1 ]
Wang, Baosheng [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha 410073, Peoples R China
[2] Natl Univ Def Technol, Sch Informat & Commun, Xian 710106, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Encryption; Public key; Protocols; Performance evaluation; Scalability; Receivers; Proxy re-encryption; conditional proxy re-encryption; decryption rights revocation; publish subscribe paradigm; internet of Things; PROXY RE-ENCRYPTION; BROADCAST ENCRYPTION; CIPHERTEXTS;
D O I
10.1109/TDSC.2024.3353811
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To address the confidentiality concerns of malicious adversaries that fully compromise the message broker in pub/sub based IoT systems, several researchers use proxy re-encryption (PRE) to realize end-to-end encrypted message distribution (from publisher to subscriber). However, the all-or-nothing share feature of PRE poses a problem that the share cannot be efficiently revoked. The only way for publishers to revoke the access rights of subscribers is to pick a new public-private key pair and re-generate the re-encryption keys for all the remaining subscribers, which hampers the scalability in practice. To realize efficient user revocation, we present REEDS, an efficient revocable end-to-end encrypted message distribution system for IoT. The core of REEDS is a novel proxy-aided identity-based conditional proxy re-encryption (PIB-CPRE) scheme. Essentially, we use a binary-tree structure to organize re-encryption keys, so that the update of re-encryption keys is reduced from linear to logarithmic in the number of subscribers. We show that REEDS satisfies confidentiality, efficient immediate revocation, decentralized authorization, and maintains low overhead for publishers and subscribers. The prototype system is implemented and its performance is evaluated. The results show that REEDS is not only easy to deploy over existing message brokers but also highly efficient.
引用
收藏
页码:4526 / 4542
页数:17
相关论文
共 50 条
  • [41] From IoT to Cloud: An End-to-End Virtualization Approach
    Leivadeas, Aris
    2020 EUROPEAN CONTROL CONFERENCE (ECC 2020), 2020, : 1554 - 1557
  • [42] Blockchain in IoT Systems: End-to-End Delay Evaluation
    Alaslani, Maha
    Nawab, Faisal
    Shihada, Basem
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) : 8332 - 8344
  • [43] IoTSM: An End-to-end Security Model for IoT Ecosystems
    Bugeja, Joseph
    Vogel, Bahtijar
    Jacobsson, Andreas
    Varshney, Rimpu
    2019 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2019, : 267 - 272
  • [44] End-to-End Industrial IoT: Software Optimization and Acceleration
    Arunachalam, Meena
    Sanghavi, Vrushabh
    Kaira, Samudyatha
    Ahuja, Nilesh A.
    IEEE Internet of Things Magazine, 2022, 5 (01): : 48 - 53
  • [45] Building End-to-End IoT Applications with QoS Guarantees
    Hamann, Arne
    Saidi, Selma
    Ginthoer, David
    Wietfeld, Christian
    Ziegenbein, Dirk
    PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2020,
  • [46] End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness
    Dodis, Yevgeniy
    Jost, Daniel
    Kesavan, Balachandar
    Marcedone, Antonio
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT V, 2023, 14008 : 157 - 189
  • [47] End-to-end Encrypted Scalable Abstract Data Types over ICN
    Tschudin, Christian
    PROCEEDINGS OF THE 5TH ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ICN'18), 2018, : 88 - 94
  • [48] An approximation of the end-to-end delay distribution
    Kim, HS
    Shroff, NB
    QUALITY OF SERVICE - IWQOS 2003, PROCEEDINGS, 2003, 2707 : 59 - 75
  • [49] End-To-End Security for Video Distribution
    Boho, Andras
    Van Wallendael, Glenn
    Dooms, Ann
    De Cock, Jan
    Braeckman, Geert
    Schelkens, Peter
    Preneel, Bart
    Van de Walle, Rik
    IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 97 - 107
  • [50] End-to-end delay distribution on the Internet
    Kato, JY
    Shimizu, A
    Goto, S
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 1999, E82D (04) : 762 - 768