Javascript must be enabled to continue!
CONCEPTUAL FRAMEWORK FOR LIGHTWEIGHT CIPHERTEXT POLICY-ATTRIBUTE BASED ENCRYPTION SCHEME FOR INTERNET OF THINGS DEVICES
View through CrossRef
The purpose of this paper is to propose a conceptual model for data security in the Internet of thing devices. Estimated by Jumoki in early 2018 to 2022, there will be about 18 billion connected IoT devices. Therefore many issue related to IoT devices were discussed especially data security. Cryptography with lightweight features is one of the focus area by researchers to develop a powerful cryptography scheme for IoT devices. Lightweight cryptography scheme has been discussed and proposed widely recently. There are AES, PRESENT, Hash algorithm declared as a lightweight algorithm under consideration in ISO/IEC 29192 “Lightweight Cryptography”. Unfortunately these lightweight algorithm is one-to-one communication cryptography technique. This algorithm is very practical to implement for individuals or for small group communication but unpractical when implemented in a big company where many users can become a bottleneck. Therefore we propose a lightweight Ciphertext Policy-Attribute Based Encryption (CP-ABE) algorithm to implement in IoT devices. CP-ABE algorithm is one-to-many technique suitable for secure grouping communication, but this algorithm is not a lightweight feature. Therefore this paper proposes a lightweight CP-ABE algorithm for IoT devices.
UiTM Press, Universiti Teknologi MARA
Title: CONCEPTUAL FRAMEWORK FOR LIGHTWEIGHT CIPHERTEXT POLICY-ATTRIBUTE BASED ENCRYPTION SCHEME FOR INTERNET OF THINGS DEVICES
Description:
The purpose of this paper is to propose a conceptual model for data security in the Internet of thing devices.
Estimated by Jumoki in early 2018 to 2022, there will be about 18 billion connected IoT devices.
Therefore many issue related to IoT devices were discussed especially data security.
Cryptography with lightweight features is one of the focus area by researchers to develop a powerful cryptography scheme for IoT devices.
Lightweight cryptography scheme has been discussed and proposed widely recently.
There are AES, PRESENT, Hash algorithm declared as a lightweight algorithm under consideration in ISO/IEC 29192 “Lightweight Cryptography”.
Unfortunately these lightweight algorithm is one-to-one communication cryptography technique.
This algorithm is very practical to implement for individuals or for small group communication but unpractical when implemented in a big company where many users can become a bottleneck.
Therefore we propose a lightweight Ciphertext Policy-Attribute Based Encryption (CP-ABE) algorithm to implement in IoT devices.
CP-ABE algorithm is one-to-many technique suitable for secure grouping communication, but this algorithm is not a lightweight feature.
Therefore this paper proposes a lightweight CP-ABE algorithm for IoT devices.
.
Related Results
Research on Ciphertext‐Policy Attribute‐Based Encryption with Attribute Level User Revocation in Cloud Storage
Research on Ciphertext‐Policy Attribute‐Based Encryption with Attribute Level User Revocation in Cloud Storage
Attribute‐based encryption (ABE) scheme is more and more widely used in the cloud storage, which can achieve fine‐grained access control. However, it is an important challenge to s...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Design on Face Recognition System with Privacy Preservation Based on Homomorphic Encryption
Design on Face Recognition System with Privacy Preservation Based on Homomorphic Encryption
Abstract
Face recognition is playing an increasingly important role in present society, and suffers from the privacy leakage in plaintext. Therefore, a recognition system b...
Methods and Algorithms for Pseudo-probabilistic Encryption with Shared Key
Methods and Algorithms for Pseudo-probabilistic Encryption with Shared Key
As a method for providing security of the messages sent via a public channel in the case of potential coercive attacks there had been proposed algorithms and protocols of deniable ...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical
The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
[RETRACTED] Keanu Reeves CBD Gummies v1
[RETRACTED] Keanu Reeves CBD Gummies v1
[RETRACTED]Keanu Reeves CBD Gummies ==❱❱ Huge Discounts:[HURRY UP ] Absolute Keanu Reeves CBD Gummies (Available)Order Online Only!! ❰❰= https://www.facebook.com/Keanu-Reeves-CBD-G...
An Order-Preserving Encryption Scheme Based on Weighted Random Interval Division for Ciphertext Comparison in Wearable Systems
An Order-Preserving Encryption Scheme Based on Weighted Random Interval Division for Ciphertext Comparison in Wearable Systems
With the rapid development of wearable devices with various sensors, massive sensing data for health management have been generated. This causes a potential revolution in medical t...
mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography
mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography
Abstract
We address the problem of user fast revocation in the lattice-based Ciphertext Policy Attribute-Based Encryption (CP-ABE) by extending the scheme originally...

