2019
DOI: 10.14569/ijacsa.2019.0100529
|View full text |Cite
|
Sign up to set email alerts
|

Secure Data Provenance in Internet of Things based Networks by Outsourcing Attribute based Signatures and using Bloom Filters

Abstract: With the dawn of autonomous organization and network and service management, the integration of existing networks with Internet of Things (IoT) based networks is becoming a reality. With minimal human interaction, the security of IoT data moving through the network becomes prone to attacks. IoT networks require a secure provenance mechanism, which is efficient and lightweight because of the scarce computing and storage resources at the IoT nodes. In this paper, we have proposed a secure mechanism to sign and a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…The blockchain provides an immutable record of each communication performed inside the cloud based IoT network; however, as the hash is stored on a permissioned blockchain, the IoT nodes is required to be authenticated to maintain the data integrity. This section provides the details of the outsourced signature-based mechanism used to provide authentication and data integrity, which is suitable for IoT devices as it offloads the computational load [2].…”
Section: Light-weight Authentication Systemmentioning
confidence: 99%
See 4 more Smart Citations
“…The blockchain provides an immutable record of each communication performed inside the cloud based IoT network; however, as the hash is stored on a permissioned blockchain, the IoT nodes is required to be authenticated to maintain the data integrity. This section provides the details of the outsourced signature-based mechanism used to provide authentication and data integrity, which is suitable for IoT devices as it offloads the computational load [2].…”
Section: Light-weight Authentication Systemmentioning
confidence: 99%
“…4 shows the conceptual model of implementing the CP-ABE in IoT based Cloud environment. The details of the algorithm can be seen in our previous work [2], where the authors have implemented the load sharing of cryptographical computation by outsourcing the signing and signature verification to the Edge nodes.…”
Section: Light-weight Authentication Systemmentioning
confidence: 99%
See 3 more Smart Citations