skip to main content
10.1145/3631461.3631466acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicdcnConference Proceedingsconference-collections
research-article
Open access

Fog-Assisted Dynamic IoT Device Access Management Using Attribute-Based Encryption

Published: 22 January 2024 Publication History

Abstract

The management and control of heterogeneous IoT devices in cyber-physical systems (CPS) involves ensuring authorized access to cloud-stored data, including instructions, commands, and configuration settings, and issuing them securely to IoT devices for remote execution. Existing access management techniques present various security challenges in ensuring fine-grained access control to sensitive data present on untrusted cloud servers. These challenges are further complicated by the need to dynamically evaluate contextual parameters linked to IoT devices before issuing instructions. This work proposes a secure and context-aware encryption technique for remote access control of IoT devices. Leveraging ciphertext-policy attribute-based encryption (CP-ABE), the scheme encrypts instructions, requiring the user’s decryption key to satisfy embedded access policies for access. The integration of access policies considers both user attributes and dynamic parameters associated with IoT devices, ensuring a comprehensive evaluation before access is granted. To verify the dynamic parameters, fog-based servers are employed, positioned in proximity to IoT devices for efficient and real-time assessment. The scheme introduces a two-phase decryption process, involving fog servers in generating key components based on the verified dynamic parameters (of IoT devices) that are combined with the user’s existing key to ensure secure partial decryption. Final decryption is performed by the user who securely sends instructions for execution on the IoT devices. Our proposed cryptosystem security and computational complexity analysis demonstrate the scheme’s effectiveness in achieving secure and context-aware IoT device access in dynamic CPS environments, ensuring efficient control, monitoring, and automation while preserving data privacy.

References

[1]
Ramadan Abdunabi, Mustafa Al-Lail, Indrakshi Ray, and Robert B. France. 2013. Specification, Validation, and Enforcement of a Generalized Spatio-Temporal Role-Based Access Control Model. IEEE Systems Journal 7, 3, 501–515.
[2]
Vilmar Abreu, Altair O. Santin, Eduardo K. Viegas, and Maicon Stihler. 2017. A multi-domain role activation model. In 2017 IEEE International Conference on Communications (ICC). 1–6.
[3]
Rasim Alguliyev, Yadigar Imamverdiyev, and Lyudmila Sukhostat. 2018. Cyber-physical systems and their security issues. Computers in Industry 100, 212–223. https://www.sciencedirect.com/science/article/pii/S0166361517304244
[4]
Amel Arfaoui, Soumaya Cherkaoui, Ali Kribeche, and Sidi Mohammed Senouci. 2020. Context-Aware Adaptive Remote Access for IoT Applications. IEEE Internet of Things Journal 7, 1, 786–799. https://doi.org/10.1109/JIOT.2019.2953144
[5]
Yosef Ashibani, Dylan Kauling, and Qusay H. Mahmoud. 2017. A context-aware authentication framework for smart homes. In 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE). 1–5.
[6]
Yaser Baseri, Abdelhakim Hafid, and Soumaya Cherkaoui. 2016. K-anonymous location-based fine-grained access control for mobile cloud. In 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC). 720–725.
[7]
Yaser Baseri, Abdelhakim Hafid, and Soumaya Cherkaoui. 2018. Privacy preserving fine-grained location-based access control for mobile cloud. Computers & Security 73, 249–265. https://doi.org/10.1016/j.cose.2017.10.014
[8]
J Bethencourt, A Sahai, and B Waters. 2007. Ciphertext-Policy Attribute-Based Encryption. In 2007 IEEE Symposium on Security and Privacy (SP ’07). 321–334.
[9]
Dan Boneh. 2007. Bilinear Groups of Composite Order. In Pairing-Based Cryptography – Pairing 2007, Tsuyoshi Takagi, Tatsuaki Okamoto, Eiji Okamoto, and Takeshi Okamoto (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1–1.
[10]
Iwailo Denisow, Sebastian Zickau, Felix Beierle, and Axel Küpper. 2015. Dynamic Location Information in Attribute-Based Encryption Schemes. In 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies. 240–247. https://doi.org/10.1109/NGMAST.2015.63
[11]
W. Diffie and M.E. Hellman. 1977. Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard. Computer 10, 6, 74–84.
[12]
Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters. 2006. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. In Proceedings of the 13th ACM Conference on Computer and Communications Security(CCS ’06). Association for Computing Machinery, New York, NY, USA, 89–98.
[13]
A Humayed, J Lin, Fengjun Li, and B Luo. 2017. Cyber-Physical Systems Security—A Survey. IEEE Internet of Things Journal 4, 6, 1802–1831.
[14]
Dina Hussein, Emmanuel Bertin, and Vincent Frey. 2017. A Community-Driven Access Control Approach in Distributed IoT Environments. IEEE Communications Magazine 55, 3, 146–153. https://doi.org/10.1109/MCOM.2017.1600611CM
[15]
A.S.M. Kayes, W Rahayu, P Watters, M Alazab, T Dillon, and E Chang. 2020. Achieving security scalability and flexibility using Fog-Based Context-Aware Access Control. Future Generation Computer Systems 107, 307–323.
[16]
Djamel Eddine Kouicem, Bouabdallah Abdelmadjid, and Lakhlef Hicham. 2017. Distributed Fine-Grained Secure Control of Smart Actuators in Internet of Things. In 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC). 653–660.
[17]
Zechao Liu, Zoe L. Jiang, Xuan Wang, S. M. Yiu, Ruoqing Zhang, and Yulin Wu. 2018. A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). 614–623.
[18]
National Institute of Standards and Technology. November 26, 2001. Announcing the Advanced Encryption Standard (AES)(Technical Report, Vol. Processing Standards Publication 197). Federal Information Processing Standards Publications.
[19]
Brent Sahai, Amitand Waters. 2005. Fuzzy Identity-Based Encryption. In Advances in Cryptology – EUROCRYPT 2005, Ronald Cramer (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 457–473.
[20]
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. 1996. Role-based access control models. IEEE Computer 29, 2, 38–47.
[21]
Carlton Shepherd, Ghada Arfaoui, Iakovos Gurulian, Robert P. Lee, Konstantinos Markantonakis, Raja Naeem Akram, Damien Sauveron, and Emmanuel Conchon. 2016. Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems. In 2016 IEEE Trustcom/BigDataSE/ISPA. 168–177.
[22]
Mohammad Wazid, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Mauro Conti, and Minho Jo. 2018. Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks. IEEE Internet of Things Journal 5, 1, 269–282.
[23]
Stefan G. Weber. 2009. Securing First Response Coordination with Dynamic Attribute-Based Encryption. In 2009 World Congress on Privacy, Security, Trust and the Management of e-Business. 58–69. https://doi.org/10.1109/CONGRESS.2009.11
[24]
Stefan G. Weber. 2012. A Hybrid Attribute-Based Encryption Technique Supporting Expressive Policies and Dynamic Attributes. Information Security Journal: A Global Perspective 21, 6, 297–305. https://doi.org/10.1080/19393555.2012.738374
[25]
Jinsong Wu, Igor Bisio, Chris Gniady, Ekram Hossain, Massimo Valla, and Haibo Li. 2014. Context-aware networking and communications: Part 1 [Guest Editorial]. IEEE Communications Magazine 52, 6, 14–15.
[26]
Yingjie Xue, Jianan Hong, Wei Li, Kaiping Xue, and Peilin Hong. 2016. LABAC: A Location-Aware Attribute-Based Access Control Scheme for Cloud Storage. In 2016 IEEE Global Communications Conference (GLOBECOM). 1–6.
[27]
Ning Ye, Yan Zhu, Ru-chuan Wang, Reza Malekian, and Qiao-min Lin. 2014. An efficient authentication and access control scheme for perception layer of internet of things. Natural Sciences Publishing Cor.

Cited By

View all
  • (2024)Efficient and Secure Cloud Data Sharing Using CP-ABE Supporting Dynamic AttributesProceedings of the 30th Annual International Conference on Mobile Computing and Networking10.1145/3636534.3695904(2245-2247)Online publication date: 4-Dec-2024
  • (2024)A High Performance AI-Powered Cache Mechanism for IoT Devices2024 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)10.1109/CyberC62439.2024.00022(64-72)Online publication date: 24-Oct-2024
  • (2024)Privacy preserving spatio-temporal attribute-based encryption for cloud applicationsCluster Computing10.1007/s10586-024-04696-w28:1Online publication date: 23-Oct-2024

Index Terms

  1. Fog-Assisted Dynamic IoT Device Access Management Using Attribute-Based Encryption

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ICDCN '24: Proceedings of the 25th International Conference on Distributed Computing and Networking
      January 2024
      423 pages
      ISBN:9798400716737
      DOI:10.1145/3631461
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 22 January 2024

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Access Control
      2. CPS
      3. Ciphertext Policy Attribute-Based Encryption
      4. Context-Aware
      5. Remote Execution

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      ICDCN '24

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)145
      • Downloads (Last 6 weeks)22
      Reflects downloads up to 25 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Efficient and Secure Cloud Data Sharing Using CP-ABE Supporting Dynamic AttributesProceedings of the 30th Annual International Conference on Mobile Computing and Networking10.1145/3636534.3695904(2245-2247)Online publication date: 4-Dec-2024
      • (2024)A High Performance AI-Powered Cache Mechanism for IoT Devices2024 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)10.1109/CyberC62439.2024.00022(64-72)Online publication date: 24-Oct-2024
      • (2024)Privacy preserving spatio-temporal attribute-based encryption for cloud applicationsCluster Computing10.1007/s10586-024-04696-w28:1Online publication date: 23-Oct-2024

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Login options

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media