Secure Data Sharing with ABE in Wireless Sensor Networks

Authors

  • Dayananda RB Associate Professor, Department of CSE, RRIT, Bangalore–90, Karnataka, India
  • Someswar GM Principal and Professor, Department of CSE, Anwar-ul-uloom College of Engineering and Technology (Affiliated to JNTU, Hyderabad), Vikarabad – 501101, RR District, Telangana, India
  • Rao Suryachandra Principal, IMS PG Centre, Uppariguda (V), Ibrahimpatnam Mandal, R. R. District, Telangana, India

Keywords:

Wireless sensor networks, Fine-grained Data Access Control, Collusion Resilience, Sensor Compromise Resistance, Backward Secrecy, Access Control Strategy, Master Key Encryption

Abstract

This research paper addresses the issue of secure data sharing for distributed data storage in Wireless Sensor Networks (WSNs). In WSNs, storing data at local sensor nodes or at designated in-network nodes greatly saves the network-wide communication load and has a lot of benefits such as energy-efficiency. However, unattended wireless sensor nodes are very likely subject to strong attacks such as physical compromise. In this sense a storage node in WSNs can be viewed as an untrusted storage since the owner of the WSN may have concerns on data security in mission-critical applications if data are stored without proper protection. A secure data storage and retrieval scheme is required for distributed data storage in WSNs. When previous works focus on data confidentiality and integrity protection or communication security, the issue of fine-grained data access control in WSNs is seldom addressed. In this chapter we address this issue and provides a cryptographic-based access control mechanism with ABE. The main challenge in this work is to make the expensive ABE operations affordable to resource-constrained sensor nodes. We resolve this issue by dividing the lifetime of sensor nodes into phases and then distribute the underlying mathematical operations in ABE over these phases. To minimize the communication and computation load on sensor nodes in case of user revocation, we revise an existing ABE scheme and makes the user revocation complexity on sensor nodes constant. Formal security proof and experimental results shows that our proposed solution is provably secure and affordable to real sensor nodes. To the best of our knowledge, our work is de facto the first that provides a secure mechanism for distributed fine-grained data access control in WSNs.

References

M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: Scalable secure file sharing on untrusted storage. In Proceedings of the USENIX Conference on File and Storage Technologies (FAST), pages 29-42, 2003.

S. Kamara and K. Lauter. Cryptographic cloud storage. In Proceedings of the International Conference on Financial Cryptograpy and Data Security (FC), pages 136-149, 2010.

J. Li, Q. Huang, X. Chen, S.S.M. Chow, D.S. Wong, and D. Xie. Multi-authority ciphertext-policy attribute-based encryption with accountability. In Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS), pages 386-390, 2011.

Q. Liu, C.C. Tan, J. Wu, and G. Wang. Reliable re-encryption in unreliable clouds. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM), 2011.

Q. Liu, C.C. Tan, J. Wu, and G. Wang. Efficient information retrieval for ranked queries in cost-effective cloud environments. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), 2012.

S. Miiller, S. Katzenbeisser, and C. Eckert. Distributed attribute-based encryption. In Proceedings of Annual International Conference on Information Security and Cryptology (ICISC), pages 20-36, 2009.

B. Patel and J. Crowcroft. Ticket based service access for the mobile user. In Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), pages 223-233, 1997.

M. Pirretti, P. Traynor, P. McDaniel, and B. Waters. Secure attribute-based systems. Journal of Computer Security, 18(5):799-837, 2010.

A. Sahai and B. Waters. Fuzzy identity-based encryption. In Proceedings of International Conference on the Theory and Application of

Cryptographic Techniques (EUROCRYPT), pages 557-557, 2005.

B. Stone and A. Vance. Companies slowly join cloudcomputing. New York Times, 18:2010, 2010.

S. Subashini and V. Kavitha. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1): 1-11, 2011.

G. Wang, Q. Liu, and J. Wu. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), pages 735-737, 2010.

G. Wang, Q. Liu, and J. Wu. Achieving finegrained access control for secure data sharing on cloud servers. Concurrency and Computation: Practice and Experience, 23(12):1443-1464, 2011.

Downloads

Published

2024-02-26

How to Cite

RB , D., Someswar, G., & Rao, T. S. (2024). Secure Data Sharing with ABE in Wireless Sensor Networks. COMPUSOFT: An International Journal of Advanced Computer Technology, 4(02), 1523–1533. Retrieved from https://ijact.in/index.php/j/article/view/265

Issue

Section

Original Research Article

Similar Articles

<< < 3 4 5 6 7 8 9 10 11 12 > >> 

You may also start an advanced similarity search for this article.