2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) 2019
DOI: 10.1109/percomw.2019.8730784
|View full text |Cite
|
Sign up to set email alerts
|

Using Attribute-Based Encryption on IoT Devices with instant Key Revocation

Abstract: The Internet of Things (IoT) relies on sensor devices to measure real-world phenomena in order to provide IoT services. The sensor readings are shared with multiple entities, such as IoT services, other IoT devices or other third parties. The collected data may be sensitive and include personal information.To protect the privacy of the users, the data needs to be protected through an encryption algorithm. For sharing cryptographic cipher-texts with a group of users Attribute-Based Encryption (ABE) is well suit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…[15] proposed an ECC-based key-establishment solution that involves a centralized entity known as the Registration Authority (RA), which is assumed to be honest and trusted. Several ABE-based key-management solutions have been proposed, including CP-ABE [10] and KP-ABE [21]. However, in both the works, the authors did not tackle to problem of key-escrow and assumed the root PKG to be honest and trusted at all times.…”
Section: Related Workmentioning
confidence: 99%
“…[15] proposed an ECC-based key-establishment solution that involves a centralized entity known as the Registration Authority (RA), which is assumed to be honest and trusted. Several ABE-based key-management solutions have been proposed, including CP-ABE [10] and KP-ABE [21]. However, in both the works, the authors did not tackle to problem of key-escrow and assumed the root PKG to be honest and trusted at all times.…”
Section: Related Workmentioning
confidence: 99%
“…However, some papers [74][75][76][77][78] refer to resource-scarce (or similar nomenclature), but they use devices such as Raspberry Pi (RPi), which cannot be considered as resource-scarce in the scope of this paper, and in many IoT applications. Moreover, an RPi or a BeagleBone can run high-level languages like python, which simplifies the process of training the model in a Cloud computer, and export it to these platforms through the use of tools like Pickle [79].…”
Section: Machine Learning In End-device Embedded Systemsmentioning
confidence: 99%
“…Li et al outsourced the exponential operation to speed up both the encryption and decryption process [27]. Fischer et al used a proxy to convert a ciphertext into an ABE ciphertext [28]. The problem of Fischer approach is that it is an interactive model.…”
Section: Previous Work On Attribute-based Encryptionmentioning
confidence: 99%
“…Li et al separated the encryption work into the data owner and the outsourcing server. Here we combine them together to evaluate the computational cost), which is an outsourcing scheme, and Fischer scheme [28] (Fischer scheme is a KP-ABE scheme), which is a proxy-based scheme like us. We implement our approach in both the composite order group and the prime order group.…”
Section: Performance Evaluationmentioning
confidence: 99%