Collaborative KP-ABE for cloud-based Internet of Things applications
Title | Collaborative KP-ABE for cloud-based Internet of Things applications |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Touati, Lyes, Challal, Yacine |
Conference Name | 2016 IEEE International Conference on Communications (ICC) |
Date Published | May 2016 |
Publisher | IEEE |
ISBN Number | 978-1-4799-6664-6 |
Keywords | Access Control, access control solutions, Asymmetric Encryption, authorisation, C-KP-ABE, cloud computing, cloud resources, cloud servers, cloud-based Internet of Things applications, cloud-based IoT applications, Collaboration, collaborative KP-ABE, computer network security, cryptographic scheme, cryptography, Encryption, Internet of Things, key policy attribute based encryption, key-policy attribute-based encryption, KP-ABE, Performance analysis, policy-based governance, pubcrawl, resource-limited networks, Scalability, security scheme, Sensors, Servers, storage capacities, storage management, trusted assistant nodes, Trusted Computing |
Abstract | KP-ABE mechanism emerges as one of the most suitable security scheme for asymmetric encryption. It has been widely used to implement access control solutions. However, due to its expensive overhead, it is difficult to consider this cryptographic scheme in resource-limited networks, such as the IoT. As the cloud has become a key infrastructural support for IoT applications, it is interesting to exploit cloud resources to perform heavy operations. In this paper, a collaborative variant of KP-ABE named C-KP-ABE for cloud-based IoT applications is proposed. Our proposal is based on the use of computing power and storage capacities of cloud servers and trusted assistant nodes to run heavy operations. A performance analysis is conducted to show the effectiveness of the proposed solution. |
URL | https://ieeexplore.ieee.org/document/7510836 |
DOI | 10.1109/ICC.2016.7510836 |
Citation Key | touati_collaborative_2016 |
- Internet of Things
- Trusted Computing
- trusted assistant nodes
- storage management
- storage capacities
- Servers
- sensors
- security scheme
- Scalability
- resource-limited networks
- pubcrawl
- policy-based governance
- Performance analysis
- KP-ABE
- key-policy attribute-based encryption
- key policy attribute based encryption
- Access Control
- encryption
- Cryptography
- cryptographic scheme
- computer network security
- collaborative KP-ABE
- collaboration
- cloud-based IoT applications
- cloud-based Internet of Things applications
- cloud servers
- cloud resources
- Cloud Computing
- C-KP-ABE
- authorisation
- Asymmetric Encryption
- access control solutions