loading
Papers

Research.Publish.Connect.

Paper

Authors: Sana Belguith 1 ; Nesrine Kaaniche 2 and Giovanni Russello 1

Affiliations: 1 Cyber Security Foundry, University of Auckland and New Zealand ; 2 SAMOVAR, CNRS, Telecom SudParis, University Paris-Saclay, Paris and France

ISBN: 978-989-758-319-3

Keyword(s): Constant-size Attribute based Encryption, Access Policy Update, Cloud Assisted IoT, Confidentiality, Access Control.

Related Ontology Subjects/Areas/Topics: Access Control ; Applied Cryptography ; Cryptographic Techniques and Key Management ; Data and Application Security and Privacy ; Data Engineering ; Data Protection ; Databases and Data Security ; Information and Systems Security ; Internet Technology ; Security and Privacy in the Cloud ; Security in Distributed Systems ; Web Information Systems and Technologies

Abstract: Cloud-assisted IoT applications are gaining an expanding interest, such that IoT devices are deployed in different distributed environments to collect and outsource sensed data to remote servers for further processing and sharing among users. On the one hand, in several applications, collected data are extremely sensitive and need to be protected before outsourcing. Generally, encryption techniques are applied at the data producer side to protect data from adversaries as well as curious cloud provider. On the other hand, sharing data among users requires fine grained access control mechanisms. To ensure both requirements, Attribute Based Encryption (ABE) has been widely applied to ensure encrypted access control to outsourced data. Although, ABE ensures fine grained access control and data confidentiality, updates of used access policies after encryption and outsourcing of data remains an open challenge. In this paper, we design PU-ABE, a new variant of key policy attribute based encr yption supporting efficient access policy update that captures attributes addition and revocation to access policies. PU-ABE contributions are multifold. First, access policies involved in the encryption can be updated without requiring sharing secret keys between the cloud server and the data owners neither re-encrypting data. Second, PU-ABE ensures privacy preserving and fine grained access control to outsourced data. Third, ciphertexts received by the end-user are constant sized and independent from the number of attributes used in the access policy which affords low communication and storage costs. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.233.226.151

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Belguith, S.; Kaaniche, N. and Russello, G. (2018). Lightweight Attribute-based Encryption Supporting Access Policy Update for Cloud Assisted IoT.In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 2 SECRYPT: SECRYPT, ISBN 978-989-758-319-3, pages 135-146. DOI: 10.5220/0006854603010312

@conference{secrypt18,
author={Sana Belguith. and Nesrine Kaaniche. and Giovanni Russello.},
title={Lightweight Attribute-based Encryption Supporting Access Policy Update for Cloud Assisted IoT},
booktitle={Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 2 SECRYPT: SECRYPT,},
year={2018},
pages={135-146},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006854603010312},
isbn={978-989-758-319-3},
}

TY - CONF

JO - Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 2 SECRYPT: SECRYPT,
TI - Lightweight Attribute-based Encryption Supporting Access Policy Update for Cloud Assisted IoT
SN - 978-989-758-319-3
AU - Belguith, S.
AU - Kaaniche, N.
AU - Russello, G.
PY - 2018
SP - 135
EP - 146
DO - 10.5220/0006854603010312

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.