Book Details

A NOVEL APPROACH TO PROTECT CLOUD-BASED IIoT SENSITIVE DATA USING DYNAMIC ABE SCHEME

International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format

Abstract

The industrial internet of things is bending towards developing technology. The main concern in the presence of abundant data is the security and the capturing of the time-series data when a particular process is being carried on. Security concerns come into the limelight when the collected IoT time-series data is uploaded to the cloud for further processing. When large data is being handled, it faces major efficiency and key leakage issues. And using the traditional encryption and decryption techniques for the encrypting and decryption process of the captured IoT data might cause some efficiency problems. In this article, we ensure to provide better efficiency and diminish the key leakage issues that are generally faced. In our scheme, we propose a reliable IIoT cloud-based data access control approach. The scheme we propose is based on how the RFID tags can be replaced by the BLE (Bluetooth-Low Energy) or the UWB (Ultra-wide range Bluetooth).Our scheme enables users to enforce a novel approach to secure their sensitive data using the cipher text policies and access controls that provide the maximum level of security to the data that is to be kept confidential. Our scheme adopts a hybrid cloud infrastructure to allow the users to use the policies and the CP-ABE tasks which are expensive. Our scheme guarantees strong privacy protection which may be a concern in the older versions which might lack optimal efficiency results. This scheme, with the help of item-level data security, ensures the strong protection of sensitive data that is at high risk of having leakage issues. We attain these goals with the help of the respective encryption and optimization techniques. Our performance assessments combine system implementation with large-scale emulations and confirm the security and efficiency of our design.

References

1. Fine-grained access control for big data based on CP-ABE in cloud computing [Yuan, Qi, Changing Ma, and Junyu Lin. "Fine-grained access control for big data based on CP-ABE in cloud computing." International Conference of Young Computer Scientists, Engineers and Educators. Springer, Berlin, Heidelberg, 2015.]

2. An efficient ECC-based CP-ABE scheme for power IoT [Cheng, Rui, et al. "An efficient ECC-based CP-ABE scheme for power IoT." Processes 9.7 (2021): 1176.]

3. User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage [Li, Jiguo, et al. "User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage." IEEE Systems Journal 12.2 (2017): 1767-1777.]

4. Cloud Computing Storage Data Access Control Method Based on Dynamic Re-Encryption [Xiaodan Chen, Desheng Zeng, Shuanglong Pang, Fu Jun, "Cloud Computing Storage Data Access Control Method Based on Dynamic Re-Encryption", Security and Communication Networks, vol. 2021, Article ID 4953074, 10 pages, 2021.]

5. Replacing cryptography with UWB Modulation in secure RFID [ Ha, D.S. & Schaumont, P.R. (2007). Replacing Cryptography with Ultra -Wideband (UWB) Modulation in Secure RFID. IEEE International Conference on RFID. 23 - 29. 10.1109/RFID.2007.346145.]

6. Singamaneni, Kranthi Kumar, et al. "A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks." Sensors 22.18 (2022): 6741.

7. Singamaneni, Kranthi Kumar, et al. "An Efficient Hybrid QHCP-ABE Model to Improve Cloud Data Integrity and Confidentiality." Electronics 11.21 (2022): 3510.

8. Kranthi Kumar Singamaneni, Abhinav Juneja, Mohammed Abd-Elnaby, Kamal Gulati, Ketan Kotecha, A. P. Senthil Kumar, "An Enhanced Dynamic Nonlinear Polynomial Integrity-Based QHCP-ABE Framework for Big Data Privacy and Security", Security and Communication Networks, vol. 2022, Article ID 4206000, 13 pages, 2022. https://doi.org/10.1155/2022/4206000

9. Kranthi Kumar, S., Ramana, K., Dhiman, G., Singh, S., & Yoon, B. (2021). A Novel Blockchain and Bi-Linear Polynomial-Based QCP-ABE Framework for Privacy and Security over the Complex Cloud Data. Sensors, 21(21), 7300.

10. Singamaneni, Kranthi Kumar, and P. Sanyasi Naidu. "An efficient quantum hash-based CP-ABE framework on cloud storage data." International Journal of Advanced Intelligence Paradigms 22.3-4 (2022): 336-347.

11. Singamaneni, Kranthi Kumar, and Pasala Naidu. "Secure key management in cloud environment using quantum cryptography." Ingénierie des Systèmes d'Information 23.5 (2018).

12. Singamaneni, Kranthi Kumar, and Pasala Sanyasi Naidu. "IBLIND Quantum Computing and HASBE for Secure Cloud Data Storage and Accessing." Rev. d'Intelligence Artif. 33.1 (2019): 33-37.

13. Singamaneni, Kranthi Kumar, Pasala Sanyasi Naidu, and Pasupuleti Venkata Siva Kumar. "Efficient quantum cryptography technique for key distribution." Journal Europeen des Systemes Automatises 51.4-6 (2018): 283.

14. Singamaneni, Kranthi, Abdullah Shawan Alotaibi, and Purnendu Shekhar Pandey. "The Performance Analysis and Security Aspects of Manet." ECS Transactions 107.1 (2022): 10945.

15. Singamaneni, Kranthi Kumar, and Sanyasi Naidu Pasala. "An improved dynamic polynomial integrity based QCP-ABE framework on large cloud data security." International Journal of Knowledge-based and Intelligent Engineering Systems 24.2 (2020): 145-156.

16. Kumar, Singamaneni Kranthi, et al. "Image transformation technique using steganography methods using LWT technique." Traitement du Signalvol 36 (2019): 233-237.

17. RFID technology and its applications in Internet of Things (IoT)[Jia, Xiaolin, et al. "RFID technology and its applications in Internet of Things (IoT)." 2012 2nd international conference on consumer electronics, communications and networks (CECNet). IEEE, 2012.]

18. A new security and privacy framework for RFID in cloud computing[Kardas, Süleyman, et al. "A new security and privacy framework for RFID in cloud computing." 2013 IEEE 5th international conference on cloud computing technology and science. Vol. 1. IEEE, 2013.]

19. Cloud-based lightweight secure RFID mutual authentication protocol in IoT[Fan, Kai, et al. "Cloud-based lightweight secure RFID mutual authentication protocol in IoT." Information Sciences 527 (2020): 329-340.]

20. Cloud-based remote RFID authentication for security of smart internet of things applications[Ahmed, Mohammed Imtyaz, and G. Kannan. "Cloud-based remote RFID authentication for security of smart internet of things applications." Journal of Information & Knowledge Management 20.supp01 (2021): 2140004.]

 

Keywords

Image
  • Format Volume 10, Issue 2, No 6, 2022
  • Copyright All Rights Reserved ©2022
  • Year of Publication 2022
  • Author Sameera Chatti, Tejaswini Amballa, Chaitanya Pithani, Pradeep Velasiri
  • Reference IJCS - 448
  • Page No 3025-3034

Copyright 2024 SK Research Group of Companies. All Rights Reserved.