Loading...

Analysis and Improvement of Lightweight Attribute-Based Encryption Schemes for IoT

Hamednejad, Farnoosh | 2024

0 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 57544 (05)
  4. University: Sharif University of Technology
  5. Department: Electrical Engineering
  6. Advisor(s): Aref, Mohammad Reza; Mohajery, Javad
  7. Abstract:
  8. In today's world, Internet of Things systems have been introduced in many applications, such as smart homes, smart cities, electronic health systems, etc. With the increase of Internet of Things applications, the sensitive data generated in them has also increased. This issue has created the need to provide an encryption and access control method for the data in these systems. Since in many applications, we need a one-to-many encryption method; Using the Attribute-Based Encryption schemes is a very suitable option. Although ciphertext-policy attribute-based encryption schemes provide fine-grained access control over the data; they apply a heavy computation and communication overhead to the Internet of Things devices, which are generally resource-constraint devices. To solve this challenge, various ways to reduce overheads in such schemes have been presented. One of these ways has been to completely remove pairings from the design and use ECC or RSA cryptography instead. In this thesis, we have analyzed two newly represented schemes that have removed the bilinear pairings, and we have shown that they are vulnerable to some security attacks. We have shown that the first scheme is vulnerable to ciphertext only, collusion, and forgery attacks and the second scheme is vulnerable to a key recovery attack that can be extended to a collusion attack. In the following, to solve the two challenges of the heavy computation load of bilinear pairings and also the security flaw of pairing-free, we have represented a revocable ciphertext-policy attribute-based encryption scheme, in which the number of bilinear pairings required for decryption always remains fixed at 3. This number does not change when the number of attributes required in decryption is increased. Our proposed scheme also has features of access policy updating and decryption outsourcing. In the end, we have evaluated our proposed scheme in terms of efficiency and security, and we have provided its security proof in the selected standard model and compared its efficiency with similar new proposed schemes
  9. Keywords:
  10. Ciphertext-Policy Attribute-Based Encryption ; Fine Grained Access Control ; Internet of Things Security ; Collusion Attack ; Cloud Computing ; Provable Security

 Digital Object List

 Bookmark

No TOC