Lightweight attribute-based encryption supporting access policy update for cloud assisted IoT

Belguith, S ORCID: https://orcid.org/0000-0003-0069-8552, Kaaniche, N and Russello, G 2018, Lightweight attribute-based encryption supporting access policy update for cloud assisted IoT , in: 15th International Conference on Security and Cryptography, 26-28 July 2018, Porto, Portugal.

[img]
Preview
PDF (Version of Record) - Published Version
Available under License Creative Commons Attribution Non-commercial No Derivatives 4.0.

Download (349kB) | Preview
[img] PDF (Author's accepted manuscript) - Accepted Version
Restricted to Repository staff only

Download (279kB) | Request a copy
Access Information: Version of record ©SciTePress 2018, reproduced by permission for private study purposes.

Abstract

Cloud-assisted IoT applications are gaining an expanding interest, such that IoT devices are deployed in different distributed environments to collect and outsource sensed data to remote servers for further processing and sharing among users. On the one hand, in several applications, collected data are extremely sensitive and need to be protected before outsourcing. Generally, encryption techniques are applied at the data producer side to protect data from adversaries as well as curious cloud provider. On the other hand, sharing data among users requires fine grained access control mechanisms. To ensure both requirements, Attribute Based Encryption (ABE) has been widely applied to ensure encrypted access control to outsourced data. Although, ABE ensures fine grained access control and data confidentiality, updates of used access policies after encryption and outsourcing of data remains an open challenge. In this paper, we design PU-ABE, a new variant of key policy attribute based encr yption supporting efficient access policy update that captures attributes addition and revocation to access policies. PU-ABE contributions are multifold. First, access policies involved in the encryption can be updated without requiring sharing secret keys between the cloud server and the data owners neither re-encrypting data. Second, PU-ABE ensures privacy preserving and fine grained access control to outsourced data. Third, ciphertexts received by the end-user are constant sized and independent from the number of attributes used in the access policy which affords low communication and storage costs.

Item Type: Conference or Workshop Item (Paper)
Additional Information: Proceedings ISBN: 978-989-758-319-3
Schools: Schools > School of Computing, Science and Engineering
Journal or Publication Title: Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 1: SECRYPT
Publisher: SciTePress
Related URLs:
Depositing User: Dr. Sana Belguith
Date Deposited: 12 Feb 2019 12:46
Last Modified: 10 Feb 2020 13:25
URI: http://usir.salford.ac.uk/id/eprint/50015

Actions (login required)

Edit record (repository staff only) Edit record (repository staff only)

Downloads

Downloads per month over past year