Secure Data Provenance in Internet of Things based Networks by Outsourcing Attribute based Signatures and using Bloom Filters

被引:0
|
作者
Siddiqui, Muhammad Shoaib [1 ]
Rahman, Atiqur [1 ]
Nadeem, Adnan [1 ]
Alzahrani, Ali M. [1 ]
机构
[1] Islamic Univ Madinah, Fac Comp & Informat Syst, Medina, Saudi Arabia
关键词
Data provenance; bloom filter; ciphertext policy attribute based encryption; IoT;
D O I
10.14569/ijacsa.2019.0100529
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the dawn of autonomous organization and network and service management, the integration of existing networks with Internet of Things (IoT) based networks is becoming a reality. With minimal human interaction, the security of IoT data moving through the network becomes prone to attacks. IoT networks require a secure provenance mechanism, which is efficient and lightweight because of the scarce computing and storage resources at the IoT nodes. In this paper, we have proposed a secure mechanism to sign and authenticate provenance messages using Ciphertext-Policy Attribute Based Encryption (CP-ABE) based signatures. The proposed technique uses Bloom filters to reduce storage requirements and an outsourced ABE mechanism to use lessen the computational requirements at the IoT devices. The proposed technique helps in reducing the storage requirements and computation time in IoT devices. The performance of the proposed mechanism is evaluated and the results show that the proposed solution is best suited for resourced constrained IoT network.
引用
收藏
页码:221 / 226
页数:6
相关论文
共 50 条
  • [31] Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption
    Kumar, G. Sravan
    Krishna, A. Sri
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2019, 13 (04) : 12 - 27
  • [32] An Authentication-Based Secure Data Aggregation Method in Internet of Things
    Maryam Ataei Nezhad
    Hamid Barati
    Ali Barati
    Journal of Grid Computing, 2022, 20
  • [33] Blockchain-based secure data transmission for internet of underwater things
    Razzaq, Abdul
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (06): : 4495 - 4514
  • [34] Blockchain-based secure data transmission for internet of underwater things
    Abdul Razzaq
    Cluster Computing, 2022, 25 : 4495 - 4514
  • [35] A DES-Based Mechanism to Secure Personal Data on the Internet of Things
    Chandi, Pragya
    Sharma, Atul
    Chhabra, Amandeep
    Gupta, Piyush
    ICCCE 2018, 2019, 500 : 45 - 53
  • [36] A Novel Trust-Based Secure Data Aggregation for Internet of Things
    Liu, Yanbing
    Gong, Xuehong
    Xing, Congcong
    2014 PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2014), 2014, : 435 - 439
  • [37] An Authentication-Based Secure Data Aggregation Method in Internet of Things
    Ataei Nezhad, Maryam
    Barati, Hamid
    Barati, Ali
    JOURNAL OF GRID COMPUTING, 2022, 20 (03)
  • [38] A Decentralized Resource Discovery Using Attribute Based Encryption for Internet of Things
    Kamel, Mohammed B. M.
    Yan, Yuping
    Ligeti, Peter
    Reich, Christoph
    2020 FOURTH CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2020,
  • [39] Hash-based signatures for the Internet of Things
    Palmieri, Paolo
    2018 ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS, 2018, : 332 - 335
  • [40] Secure and Efficient Authenticated Key Exchange Mechanism for Wireless Sensor Networks and Internet of Things using Bloom Filter
    Maurya, Anup Kumar
    Sastry, V. N.
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 173 - 180