{"title":"Ciphertext-Policy Attribute-based Encryption for Securing IoT Devices in Fog Computing","authors":"Shanshan Tu, Feng-Chung Huang, Shenmin Zhang, Akhtar Badshah, Hisham Alasmary, Muhammad Waqas","doi":"10.1109/cits55221.2022.9832996","DOIUrl":null,"url":null,"abstract":"Securing Internet of Things (IoT) devices in fog computing systems can be challenging due to the inherent limitations of IoT devices. For instance, cryptographic primitives, such as attribute-based encryption (ABE) schemes, are computationally expensive for deployment on IoT devices. Thus, ABE is not realistic in facilitating real-time updates in various applications of IoT. Therefore, attribute-based and multi-authority encryption schemes are designed that help attribute revocation and computation outsourcing from IoT devices to fog computing servers. The attribute revocation scheme is based on the ciphertext-policy attribute-based encryption (CP-ABE) technique. The CP-ABE scheme allows secret keys between IoT devices and fog nodes to be dynamically generated by incorporating the attribute group keys. Then, the encryption and decryption functions for IoT devices are outsourced to fog nodes, which present the CP-ABE validation.","PeriodicalId":136239,"journal":{"name":"2022 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Computer, Information and Telecommunication Systems (CITS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/cits55221.2022.9832996","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Securing Internet of Things (IoT) devices in fog computing systems can be challenging due to the inherent limitations of IoT devices. For instance, cryptographic primitives, such as attribute-based encryption (ABE) schemes, are computationally expensive for deployment on IoT devices. Thus, ABE is not realistic in facilitating real-time updates in various applications of IoT. Therefore, attribute-based and multi-authority encryption schemes are designed that help attribute revocation and computation outsourcing from IoT devices to fog computing servers. The attribute revocation scheme is based on the ciphertext-policy attribute-based encryption (CP-ABE) technique. The CP-ABE scheme allows secret keys between IoT devices and fog nodes to be dynamically generated by incorporating the attribute group keys. Then, the encryption and decryption functions for IoT devices are outsourced to fog nodes, which present the CP-ABE validation.