Abstract
In Internet of Things (IoT), several smart devices (accompanied with sensors) integrate real world information at central server. Providing security and privacy, the collected information can be used for various analytical tasks like mining of data, taking intelligent decision to control machines, issuing alerts/notifications etc. In this paper, we present a framework for efficient utilization of centralized data while protecting data confidentiality and data privacy in IoT infrastructure. We have combined the concept of attribute based cryptography and functional encryption to process data with efficient access control. To show theoretical and empirical analysis, we have used a candidate area of IoT application viz. E-Health care system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
Bethencourt, J., Sahai, A., Waters, B.: Advanced crypto software collection: the cpabe toolkit (2011)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, SP 2007, pp. 321–334. IEEE (2007)
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)
Boneh, D., Sahai, A., Waters, B.: Functional encryption: definitions and challenges. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 253–273. Springer, Heidelberg (2011)
Boneh, D., Sahai, A., Waters, B.: Functional encryption: a new vision for public-key cryptography. Commun. ACM 55(11), 56–64 (2012)
Frank, A., Asuncion, A., et al.: Uci machine learning repository (2010)
Goldwasser, S., Kalai, Y.T., Popa, R.A., Vaikuntanathan, V., Zeldovich, N.: Succinct functional encryption and applications: reusable garbled circuits and beyond. IACR Cryptology ePrint Archive 2012, 733 (2012)
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)
Huan, W., et al.: Studying on internet of things based on fingerprint identification. In: 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), vol. 14 (2010)
Juels, A.: Rfid security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2), 381–394 (2006)
Kumar, J.S., Patel, D.R.: A survey on internet of things: security and privacy issues. Int. J. Comput. Appl. 90(11), 20–26 (2014)
Le, X.H., Khalid, M., Sankar, R., Lee, S.: An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare. J. Netw. 6(3), 355–364 (2011)
Li, X., Xuan, Z., Wen, L.: Research on the architecture of trusted security system based on the internet of things. In: 2011 International Conference on Intelligent Computation Technology and Automation (ICICTA), vol. 2, pp. 1172–1175. IEEE (2011)
Liu, J., Xiao, Y., Chen, C.P.: Authentication and access control in the internet of things. In: 2012 32nd International Conference on Distributed Computing Systems Workshops, pp. 588–592. IEEE (2012)
Lynn, B., et al.: The pairing-based cryptography library. Internet: crypto. stanford. edu/pbc/[27 March 2013] (2006)
Mayer, C.P.: Security and privacy challenges in the internet of things. Electron. Commun. EASST 17 (2009)
Mon, E.E., Naing, T.T.: The privacy-aware access control system using attribute-and role-based access control in private cloud. In: 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT), pp. 447–451. IEEE (2011)
Ndibanje, B., Lee, H.J., Lee, S.G.: Security analysis and improvements of authentication and access control in the internet of things. Sensors 14(8), 14786–14805 (2014)
Oleshchuk, V.: Internet of things and privacy preserving technologies. In: 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (2009)
O’Neill, A.: Definitional issues in functional encryption. IACR Cryptology ePrint Archive 2010, 556 (2010)
Roman, R., Najera, P., Lopez, J.: Securing the internet of things. Computer 44(9), 51–58 (2011)
Said, O.: Development of an innovative internet of things security system. Int. J. Comput. Sci. Issues (IJCSI) 10(6), 155–161 (2013)
Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 3, pp. 648–651. IEEE (2012)
Wang, K., Bao, J., Wu, M., Lu, W.: Research on security management for internet of things. In: 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), vol. 15 (2010)
Weber, R.H.: Internet of things-new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)
Wong, K.H., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, vol. 1, p. 8. IEEE (2006)
Xin-fang, S., Xiao-hua, H.: A new access control scheme based on protection of sensitive attributes. In: 2012 7th International Conference on Computer Science & Education (ICCSE), pp. 1021–1024. IEEE (2012)
Ye, N., Zhu, Y., Wang, R.C., Malekian, R., Min, L.: An efficient authentication and access control scheme for perception layer of internet of things. Int. J. Appl. Math. Inf. Sci. 8, 1617–1624 (2014)
Zhu, S., Setia, S., Jajodia, S.: Leap\(+\): efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sens. Netw. (TOSN) 2(4), 500–528 (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Sharma, D., Jinwala, D. (2015). Functional Encryption in IoT E-Health Care System. In: Jajoda, S., Mazumdar, C. (eds) Information Systems Security. ICISS 2015. Lecture Notes in Computer Science(), vol 9478. Springer, Cham. https://doi.org/10.1007/978-3-319-26961-0_21
Download citation
DOI: https://doi.org/10.1007/978-3-319-26961-0_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-26960-3
Online ISBN: 978-3-319-26961-0
eBook Packages: Computer ScienceComputer Science (R0)