Secure Data Exchange Using Authenticated Attribute-Based Encdryption with Revocation for Environmental Monitoring

- Munsyi, Amang Sudarsono, M. Udin Harun Al Rasyid

Abstract


Internet of things grown very rapidly, one of them is application smartcity for monitoring the environment. The environmental monitoring use the wireless sensor networks (WSN) technology to collect all of the data. All the data collected by the WSN will be sotred in the Data Center, where all of the data in the Data Center can be accessed by the user everytime and everywhere. The data center without security mechanism is very dangerous because all of data can be tracked and even modified by the users. There are need security mechanism for securing the data and monitoring access from each user. Chipertext Policy Attribute Based-Encryption (CP-ABE) with Authentication and Revocation can become a solution for this problem, where all of data in the data center can be protected with encryption and decryption mechanism. Its jut not protect the data, the security will give a guarantee for originality in the data and can give a control access for user who did the illegal access. The user who did the illegal access will be revoked by the system. Our security mechanism using the CP-ABE and timestamp digital signature using Rivest, Shamir Adleman (RSA) 2048 does not affect to performance of the system.

Keywords


environment monitoring; CP-ABE; authentication and revocation; timestamp digital signature RSA 2048.

Full Text:

PDF

References


Nurul Fahmi, M. Udin Harun Al Rasyid, Amang Sudarsono. Adaptive Schedulling for Health Monitoring System Based on the IEEE 802.15.4 Sleep Standart. EMITTER International Journal of Engineering Technology, Vol. 4, No.1, pp. 91-114, 2016.

M. Udin Harun Al Rasyid, Achmad SayfudinAchmad Sayfudin, Arif Basofi, Amang Sudarsono. Development of Semantic Sensor Web for Monitoring Environment Conditions. International Seminar on Intelligent Technology and Its Applications (ISITIA),pp. 607-612, 2016.

M.F.Othmana, K.Shazali. 2012. Wireless Sensor Network Applications: A Study in Environment Monitoring System. International Symposium on Robotics and Intelligent Sensors, pp.1204 – 1210, 2012.

J.Bethencourt, A.Sahai, and B.Waters, Ciphertext-policy Attribute-Based Encryption. IEEE Symposium on Security and Privacy. pp. 321-334, 2007.

Munsyi, Amang Sudarsono, and M.U.H. Al Rasyid, “Secure Data Sensor In Environmental Monitoring System Using Attribute-Based Encryption With Encryptionâ€, International Journal on Advanced Science, Engineering and Information Technology, Vol 7, pp., 2017.

A.Sudarsono, M.Udin Harun Al Rasyid,An Anonymous Authentication System in Wireless Networks Using Verifier-Local Revocation Group Signature Scheme. International Seminar on Intelligent Technology and Its Application Technology, 2016.

Munsyi, Amang Sudarsono, M. Udin Harun Al Rasyid, "Secure Data Sensor Access Using Attribute-Based Encryption With Revocation Environmental Monitoring", Knowledge Creation & Intelligent Computing (KCIC), pp. 73-79, 2016.

K. H. Patel, S.S Patel. 2016, “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing†International Journal for Scientific Research & Development, vol. 4, pp.543-548, 2016.

J.Benthencourt, A.Sahai, and B.Waters. cpabe toolkit in advanced Crypto Software Collection. [Online]. From: http://hms.isi.jhu.edu/acsc/cpabe. [accessed on Oktober 2016].

B.Lynn. PBC (Pairing-Based Cryptography) library. [Online]. From: http://crypto.stanford.edu/pbc. [accessed on Oktober 2016].

M.U.H. Al Rasyid, Bih-Hwang Lee, A.Sudarsono, and Taufiqurrahman, Implementation of Body Temperature and Pulseoximeter Sensors for Wireless Body Area Network. Sensors and Materials, International Journal on Sensor Technology. 27(8), pp. 727-732, 2015.

S.Huda, A.Sudarsono, and T.Harsono, Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network. EMITTER International Journal of Engineering Technology, Vol. 4, No.1 , pp. 115-140, 2016.

M.F.Othmana, K.Shazali, Wireless Sensor Network Applications: A Study in Environment Monitoring System. International Symposium on Robotics and Intelligent Sensors 2012 (IR IS 2012), pp. 1204 – 1210, 2012.

S. Roy, M. Chuah. Secure Data Retrieval Based on Ciphertext Policy Attribute-Based Encryption (CP-ABE) System for the DTNs. Journal of Cryptology, vol. 17, No.4, pp.297-319,2004.

J.H. Chen, Y.T.Wang, and K. Chen, Attribute-Based Key-Insulated Encryption, Journal of Information Science and Engineering, Vol.27, pp. 437–449, 2011.

W. Stalling, Network Security Essentials: Applications and Standards, Prentice Hall Press, 4th edition, ISBN-13: 978-0136108054, 2010.

J.H. Chen, Y.T.Wang, and K. Chen, Attribute-Based Key-Insulated Encryption,Journal of Information Science and Engineering, Vol.27, pp.437-449, 2011.

H. Kwon, D. Kim, C. Hahn, and J. Hur, Secure Authentication using Ciphertext Policy Attribute-Based Encryption in Mobile Multi-hop Networks,Multimedia Tools and Applications,pp.1-15, 2016.

L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker,“Mediated Ciphertext-Policy Attribute-Based Encryption and ItsApplication,†Proc. Int’l Workshop Information Security Applications (WISA ’09), pp. 309-323, 2009.

Koo, D., Hur, J., and Yoon, H. "Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage.", Computers & Electrical Engineering, vol 39, no1, pp 34-46, 2013.

M. Chase and S.S.M. Chow, “Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,â€Proc. ACM Conf.Computer and Comm. Security, pp. 121-130, 2009.

A. Lewko, A Sahai and B Waters,“Revocation Systems with Very Small Private Keysâ€. IEEE Symposium on Security and Privacy 2010, pp. 273-285, 2010.

L. Touati, Y. Challal and A. Bouabdallah, “Cooperative Ciphertext-Policy Attribute-Based Encryption for the Internet of Thingsâ€, International Conference on Advanced Networking, Distributed System and Applications. pp.64-69, 2014.




DOI: http://dx.doi.org/10.18517/ijaseit.8.5.7223

Refbacks

  • There are currently no refbacks.



Published by INSIGHT - Indonesian Society for Knowledge and Human Development