Secure Data Provenance in Internet of Things based Networks by Outsourcing Attribute based Signatures and using Bloom Filters

被引:0
|
作者
Siddiqui, Muhammad Shoaib [1 ]
Rahman, Atiqur [1 ]
Nadeem, Adnan [1 ]
Alzahrani, Ali M. [1 ]
机构
[1] Islamic Univ Madinah, Fac Comp & Informat Syst, Medina, Saudi Arabia
关键词
Data provenance; bloom filter; ciphertext policy attribute based encryption; IoT;
D O I
10.14569/ijacsa.2019.0100529
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the dawn of autonomous organization and network and service management, the integration of existing networks with Internet of Things (IoT) based networks is becoming a reality. With minimal human interaction, the security of IoT data moving through the network becomes prone to attacks. IoT networks require a secure provenance mechanism, which is efficient and lightweight because of the scarce computing and storage resources at the IoT nodes. In this paper, we have proposed a secure mechanism to sign and authenticate provenance messages using Ciphertext-Policy Attribute Based Encryption (CP-ABE) based signatures. The proposed technique uses Bloom filters to reduce storage requirements and an outsourced ABE mechanism to use lessen the computational requirements at the IoT devices. The proposed technique helps in reducing the storage requirements and computation time in IoT devices. The performance of the proposed mechanism is evaluated and the results show that the proposed solution is best suited for resourced constrained IoT network.
引用
收藏
页码:221 / 226
页数:6
相关论文
共 50 条
  • [41] A secure privacy preserving and access control scheme for medical internet of things (MIoT) using attribute-based signcryption
    Patil R.Y.
    International Journal of Information Technology, 2024, 16 (1) : 181 - 191
  • [42] Secure Layers Based Architecture for Internet of Things
    Singh, Dhananjay
    Tripathi, Gaurav
    Jara, Antonio
    2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2015, : 321 - 326
  • [43] Blockchain-Based Data Storage for Internet of Things Networks
    Jerbi, Wassim
    Cheikhrouhou, Omar
    Guermazi, Abderrahmen
    Trabelsi, Hafedh
    INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2024, 19 (01)
  • [44] Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation
    Xu, Qian
    Tan, Chengxiang
    Fan, Zhijie
    Zhu, Wenye
    Xiao, Ya
    Cheng, Fujia
    SENSORS, 2018, 18 (05)
  • [45] Application of Attribute-based Encryption in Internet of Things
    Wang, Zixuan
    Liu, Hao
    Ma, Hao
    PROCEEDINGS OF THE 2018 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION AND INFORMATION (MEICI 2018), 2018, 163 : 180 - 183
  • [46] Lightweight Attribute-based Encryption for the Internet of Things
    Oualha, Nouha
    Kim Thuat Nguyen
    2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [47] A survey on attribute-based encryption for internet of things
    Kumar, Dilip
    Kumar, Manoj
    Gupta, Gaurav
    INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2023, 14 (02)
  • [48] A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things
    Chi, Jiancheng
    Li, Yu
    Huang, Jing
    Liu, Jing
    Jin, Yingwei
    Chen, Chen
    Qiu, Tie
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 167 (167)
  • [49] Secure Data of Industrial Internet of Things in a Cement Factory Based on a Blockchain Technology
    Umran, Samir M.
    Lu, Songfeng
    Abduljabbar, Zaid Ameen
    Zhu, Jianxin
    Wu, Junjun
    APPLIED SCIENCES-BASEL, 2021, 11 (14):
  • [50] An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain
    Chen, Xingxing
    Cheng, Qingfeng
    Yang, Weidong
    Luo, Xiangyang
    FRONTIERS OF COMPUTER SCIENCE, 2024, 18 (03)