Efficient IoT Management With Resilience to Unauthorized Access to Cloud Storage
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hahn, Changhee | - |
dc.contributor.author | Kim, Jongkil | - |
dc.contributor.author | Kwon, Hyunsoo | - |
dc.contributor.author | Hur, Junbeom | - |
dc.date.accessioned | 2022-08-14T05:41:09Z | - |
dc.date.available | 2022-08-14T05:41:09Z | - |
dc.date.created | 2022-08-12 | - |
dc.date.issued | 2022-04 | - |
dc.identifier.issn | 2168-7161 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/143117 | - |
dc.description.abstract | Cloud-based Internet of Things (IoT) management services are a promising means of ingesting data from globally dispersed devices. In this setting, it is important to regulate access to data managed by potentially untrusted cloud servers. Attribute-based encryption (ABE) is a highly effective tool for access control. However, applying ABE to IoT environments shows limitations in the following three aspects: First, the demands for storage resources increase in proportion to the complexity of the access control policies. Second, the computation cost of ABE is onerous for resource-limited devices. Lastly, ABE alone is intractable to prevent illegal key-sharing which leads to unauthorized access to data. In this article, we propose an efficient and secure cloud-based IoT data management scheme using ABE. First, we remove the storage-side dependency on the complexity of the access control policies. Second, a substantial part of computationally intensive operations is securely outsourced to the cloud servers. Lastly, unauthorized access to data via illegal key-sharing is strictly forbidden. Our security analysis and experimental results show the security and practicability of the proposed scheme. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.subject | ATTRIBUTE-BASED-ENCRYPTION | - |
dc.subject | INTERNET | - |
dc.subject | THINGS | - |
dc.subject | ABE | - |
dc.title | Efficient IoT Management With Resilience to Unauthorized Access to Cloud Storage | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hur, Junbeom | - |
dc.identifier.doi | 10.1109/TCC.2020.2985046 | - |
dc.identifier.scopusid | 2-s2.0-85132324754 | - |
dc.identifier.wosid | 000808079500020 | - |
dc.identifier.bibliographicCitation | IEEE TRANSACTIONS ON CLOUD COMPUTING, v.10, no.2, pp.1008 - 1020 | - |
dc.relation.isPartOf | IEEE TRANSACTIONS ON CLOUD COMPUTING | - |
dc.citation.title | IEEE TRANSACTIONS ON CLOUD COMPUTING | - |
dc.citation.volume | 10 | - |
dc.citation.number | 2 | - |
dc.citation.startPage | 1008 | - |
dc.citation.endPage | 1020 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | ATTRIBUTE-BASED-ENCRYPTION | - |
dc.subject.keywordPlus | INTERNET | - |
dc.subject.keywordPlus | THINGS | - |
dc.subject.keywordPlus | ABE | - |
dc.subject.keywordAuthor | IoT | - |
dc.subject.keywordAuthor | cloud computing | - |
dc.subject.keywordAuthor | access control | - |
dc.subject.keywordAuthor | attribute-based encryption | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.