Skip to main content

ABE-AC4DDS: An Access Control Scheme Based on Attribute-Based Encryption for Data Distribution Service

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2021)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 13157))

  • 1653 Accesses

Abstract

In response to the security threats faced by distributed real-time applications based on DDS, a fine-grained data access control scheme is proposed, which is based on attribute-based encryption theory and suitable for topic-based publish/subscribe communication model. The scheme takes the topic as the unit of data access control and integrates the access control process with the DDS communication process, In the discovery phase of DDS, the digital signature is used to verify the publication permission for a topic, and in the publish/subscribe phase of DDS, the CP-ABE is used to verify the subscription permission for a topic. The scheme ensures not only the privacy of users but also the confidentiality and authenticity of data. Theoretical analysis shows that this scheme can resist security threats such as unauthorized publication and unauthorized subscription. Moreover, the performance test of the prototype system shows that it matches the loose coupling and one to many characteristics of the publish/subscribe communication model and has good scalability in multi-subscriber scenarios while adjusting key parameters.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zou, G., Liu, Y.F.: Automatic discovery technology of real-time data. Comput. Technol. Dev. 27(1), 25–29 (2017)

    Google Scholar 

  2. David, L., Vasconcelos, R., Alves, L., André, R., Endler, M.: A DDS-based middleware for scalable tracking, communication and collaboration of mobile nodes. J. Internet Serv. Appl. 4, 16 (2013). https://doi.org/10.1186/1869-0238-4-16

  3. Leigh, B., Duwe, R.: Designing autonomous vehicles for a future of unknowns. ATZelectron. Worldwide 16(3), 44–47 (2021)

    Article  Google Scholar 

  4. Object Management Group. Data Distribution Service (DDS) [EB/OL]. https://www.omg.org/spec/DDS

  5. He, Z.Y., Liang, Y.: Study on the DDS network information security technology. Appl. Mech. Mater. 738–739, 1213–1216 (2015). https://doi.org/10.4028/www.scientific.net/AMM.738-739.1213

  6. White, T., Johnstone, M.N., Peacock, M.: An investigation into some security issues in the DDS messaging protocol. In: 15th Australian Information Security Management Conference, vol. 132, pp. 132–139. Edith Cowan University, Perth, Western Australia (2017). https://doi.org/10.4225/75/5a84fcff95b52

  7. Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R., (eds.) Advances in Cryptology – Eurocrypt 2005. Eurocrypt 2005. Lecture Notes in Computer Science, vol. 3494, pp. 457–473. Springer, Berlin, Heidelberg (2005)https://doi.org/10.1007/11426639_27

  8. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security & Privacy, vol. 321, pp. 321–334. IEEE Computer Society, Washington, USA (2007). https://doi.org/10.1109/SP.2007.11

  9. Han, J.: Message encryption methods for dds security performance improvement. J. Korea Inst. Inf. Commun. Eng. 22(11), 1554–1561 (2018). https://doi.org/10.6109/JKIICE.2018.22.11.1554

  10. Shen, Z.W., Gao, P., Xu, X.Y.: Design of DDS secure communication middleware based on security negotiation. Netinfo Secur. 21(6), 19–25 (2021). https://doi.org/10.3969/j.issn.1671-1122.2021.06.003

  11. Tariq, M.A., Koldehofe, B., Rothermel, K.: Securing broker-less publish/subscribe systems using identity-based encryption. IEEE Trans. Parallel Distrib. Syst. 25(2), 518–528 (2014). https://doi.org/10.1109/TPDS.2013.256

  12. Li, M.J., Ye, H., Wang, L., et al.: Design of authentication protocol for high-security data distribution service. Aeronaut. Comput. Tech. 45(1), 103–107 (2015)

    Google Scholar 

  13. Zhen, C., Di, H.T., Guo, Q.L.: Research on identity authenticationmethod for data distribution service. Electron Technol. 44(6), 44–48 (2015). https://doi.org/10.3969/j.issn.1000-0755.2015.06.013

  14. Object Management Group. DDS Security [EB/OL]. https://www.omg.org/spec/DDS-SECURITY/1.0

  15. Kim, H., Kim, D.-K., Alaerjan, A.: ABAC-based security model for DDS. IEEE Trans. Depend. Secure Comput. 1, 1 (2021). https://doi.org/10.1109/TDSC.2021.3085475

  16. Zhen, C., DI, H.T., Guo, Q.L., et al.: Research on access control method of data distribution service. Inform. Commun. 2019(5), 96–98 (2019)

    Google Scholar 

  17. Object Management Group. The Real-time Publish-subscribe Protocol DDS Interoperability Wire Protocol [EB/OL]. https://www.omg.org/spec/DDSI-RTPS

  18. Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. J. Cryptol. 22, 1–61 (2009). https://doi.org/10.1007/s00145-008-9028-8

  19. Emura, K., Miyaji, A., Nomura, A., Omote, K., Soshi, M.: A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: Bao, F., Li, H., Wang, G. (eds.) Information Security Practice and Experience. ISPEC 2009. Lecture Notes in Computer Science, vol. 5451, pp. 13–23. Springer, Berlin, Heidelberg (2009)https://doi.org/10.1007/978-3-642-00843-6_2

  20. Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270–299 (1984). https://doi.org/10.1016/0022-0000(84)90070-9 

  21. uDDS Homepage. https://udds.cn/. Accessed 21 July 2021

  22. OpenABE Homepage. https://github.com/zeutro/openabe. Accessed 21 July 2021

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhuowei Shen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gao, P., Shen, Z. (2022). ABE-AC4DDS: An Access Control Scheme Based on Attribute-Based Encryption for Data Distribution Service. In: Lai, Y., Wang, T., Jiang, M., Xu, G., Liang, W., Castiglione, A. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2021. Lecture Notes in Computer Science(), vol 13157. Springer, Cham. https://doi.org/10.1007/978-3-030-95391-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-95391-1_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-95390-4

  • Online ISBN: 978-3-030-95391-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics