Proceedings of the 17th International Joint Conference on E-Business and Telecommunications 2020
DOI: 10.5220/0009792805470552
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Access-control in the IIoT through Attribute-Based Encryption with Outsourced Decryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…The concept of zero trust in IoT means that all data traffic generated within the IoT ecosystem must be treated with skepticism and thoroughly evaluated, regardless of whether it originates from internal or external sources (Zolotukhin et al 2022;). To address the security challenges posed by the IoT, various dynamic (Wu et al 2021), fine-grained (Abreu et al 2020) and lightweight access Ziegler et al 2020;Ahmed et al 2023) control models have been developed, using a combination of cryptography, machine learning, and SDP. These models are based on multi-source heterogeneous data, including attributes of users and devices, behavioral patterns, application integrity, and flow baselines.…”
Section: Analyzing Key Research Hotspots and Future Trends For Zero T...mentioning
confidence: 99%
“…The concept of zero trust in IoT means that all data traffic generated within the IoT ecosystem must be treated with skepticism and thoroughly evaluated, regardless of whether it originates from internal or external sources (Zolotukhin et al 2022;). To address the security challenges posed by the IoT, various dynamic (Wu et al 2021), fine-grained (Abreu et al 2020) and lightweight access Ziegler et al 2020;Ahmed et al 2023) control models have been developed, using a combination of cryptography, machine learning, and SDP. These models are based on multi-source heterogeneous data, including attributes of users and devices, behavioral patterns, application integrity, and flow baselines.…”
Section: Analyzing Key Research Hotspots and Future Trends For Zero T...mentioning
confidence: 99%
“…Other examples include those of [13], [14]. Other approaches utilize attribute-based encryption, for example, to facilitate access control that publishes and revokes attributes [15]. Another example is a support online/offline data-sharing framework [16].…”
Section: Related Workmentioning
confidence: 99%
“…In Attribute Based Encryption (ABE) [37]: both the data encryption and decryption could be performed, which has the advantages of better security and optimal performance outcomes. Still, it limits with the problems of increased cost consumption for key for key generation and encryption, and reduced scalability.…”
Section: Related Workmentioning
confidence: 99%