Secure Data Provenance in Internet of Things based Networks by Outsourcing Attribute based Signatures and using Bloom Filters

被引:0
|
作者
Siddiqui, Muhammad Shoaib [1 ]
Rahman, Atiqur [1 ]
Nadeem, Adnan [1 ]
Alzahrani, Ali M. [1 ]
机构
[1] Islamic Univ Madinah, Fac Comp & Informat Syst, Medina, Saudi Arabia
关键词
Data provenance; bloom filter; ciphertext policy attribute based encryption; IoT;
D O I
10.14569/ijacsa.2019.0100529
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the dawn of autonomous organization and network and service management, the integration of existing networks with Internet of Things (IoT) based networks is becoming a reality. With minimal human interaction, the security of IoT data moving through the network becomes prone to attacks. IoT networks require a secure provenance mechanism, which is efficient and lightweight because of the scarce computing and storage resources at the IoT nodes. In this paper, we have proposed a secure mechanism to sign and authenticate provenance messages using Ciphertext-Policy Attribute Based Encryption (CP-ABE) based signatures. The proposed technique uses Bloom filters to reduce storage requirements and an outsourced ABE mechanism to use lessen the computational requirements at the IoT devices. The proposed technique helps in reducing the storage requirements and computation time in IoT devices. The performance of the proposed mechanism is evaluated and the results show that the proposed solution is best suited for resourced constrained IoT network.
引用
收藏
页码:221 / 226
页数:6
相关论文
共 50 条
  • [21] Attribute-based cloud storage with secure provenance over encrypted data
    Cui, Hui
    Deng, Robert H.
    Li, Yingjiu
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 79 : 461 - 472
  • [22] Secure Outsourced Attribute-Based Signatures
    Chen, Xiaofeng
    Li, Jin
    Huang, Xinyi
    Li, Jingwei
    Xiang, Yang
    Wong, Duncan S.
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (12) : 3285 - 3294
  • [23] Secure and Efficient Bloom-Filter-Based Image Search in Cloud-Based Internet of Things
    Li, Yingying
    Ma, Jianfeng
    Miao, Yinbin
    Wang, Xiangyu
    Lu, Rongxing
    Zhang, Wei
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (03) : 5024 - 5035
  • [24] Provenance-based data flow control mechanism for Internet of things
    Rong-na, Xie
    Hui, Li
    Guo-zhen, Shi
    Yun-chuan, Guo
    Ben, Niu
    Mang, Su
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (05)
  • [25] Secure Data Management in Internet-of-Things Based on Blockchain
    Thakker, Jenil
    Chang, Ikwhan
    Park, Younghee
    2020 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2020, : 190 - 194
  • [26] Secure data deduplication for Internet-of-things sensor networks based on threshold dynamic adjustment
    Gao, Yuan
    Xian, Hequn
    Yu, Aimin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (03)
  • [27] Attribute-Based Access Control for AWS Internet of Things and Secure Industries of the Future
    Bhatt, Smriti
    Pham, Thanh Kim
    Gupta, Maanak
    Benson, James
    Park, Jaehong
    Sandhu, Ravi
    IEEE ACCESS, 2021, 9 : 107200 - 107223
  • [28] Context-aware Addressing in the Internet of Things using Bloom Filters
    Kalmar, Andras
    Vida, Rolland
    Maliosz, Markosz
    2013 IEEE 4TH INTERNATIONAL CONFERENCE ON COGNITIVE INFOCOMMUNICATIONS (COGINFOCOM), 2013, : 487 - 492
  • [29] A Comparative Study of Attribute-Based Encryption Schemes for Secure Cloud Data Outsourcing
    Thangavel, M.
    Varalakshmi, P.
    Abinaya, C.
    2017 NINTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 261 - 266
  • [30] A Secure Fog-cloud Architecture using Attribute-based Encryption for the Medical Internet of Things (MIoT)
    Alshehri, Suhair
    Almehmadi, Tahani
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (12) : 924 - 933