Novel lightweight and fine-grained fast access control using RNS properties in fog computing
Alizadeh, M. A., Jafarali Jassbi, S., Khademzadeh, A., & Haghparast, M. (2023). Novel lightweight and fine-grained fast access control using RNS properties in fog computing. Cluster Computing: The Journal of Networks Software Tools and Applications, Early online. https://doi.org/10.1007/s10586-023-04169-6
Julkaistu sarjassa
Cluster Computing: The Journal of Networks Software Tools and ApplicationsPäivämäärä
2023Tekijänoikeudet
© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023
Fog computing provides a suitable development for real-time processing in the Internet of Things (IoT). Attribute-based encryption (ABE) is the main method to control data access in fog computing. A residue number system (RNS) can speed up multiplication and exponential operations by converting very large integers to small integers. This paper proposes a fine-grained lightweight access control scheme using ABE modified with RNS properties (RNS-ABE) with fog computing. Decryption is implemented with the Chinese remainder theorem (CRT), and a new access structure based on the CRT secret sharing scheme is also introduced. Security of the proposed scheme proved based on RNS properties and the complicated problem of factoring a very large integer into its large prime factors, like RSA encryption. The time cost comparison shows that the total encryption and decryption time of our scheme is more efficient than the lightweight schemes with the underlying operation of bilinear pairing.
Julkaisija
Springer Science+Business MediaISSN Hae Julkaisufoorumista
1386-7857Asiasanat
Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/194553065
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Compact Quantum Circuit Design of PUFFIN and PRINT Lightweight Ciphers for Quantum Key Recovery Attack
Saravanan, P.; Jenitha, J.; Sanjana, S.; Haghparast, Majid (Institute of Electrical and Electronics Engineers (IEEE), 2023)Quantum computing plays a vital role in the next generation computing platforms as researchers have achieved quantum supremacy by proving that quantum computers can outperform classical computers. These high performance ... -
IoT-verkon tietoturvauhat ja niiden estäminen
Hämäläinen, Toni (2020)Tässä tutkielmassa tutustutaan IoT-verkkoon kohdistuviin hyökkäyksiin, sekä tapoihin joilla suojautua niiltä. Tutkielman tavoitteena on kartoittaa tapoja joilla IoT-verkko voidaan toteuttaa turvallisesti tietoturvan ja ... -
A Lightweight, User-Controlled System for the Home
Baillie, Lynne; Schatz, Raimund (University of Jyväskylä, Agora Center, 2006)This paper explores how we designed, with input from some elderly persons, a multi-agent user-controlled network for the home. The system was designed to support the elderly in living longer at home with minimal support. ... -
An Efficient and Privacy-Preserving Blockchain-Based Authentication Scheme for Low Earth Orbit Satellite Assisted Internet of Things
Wang, Biying; Chang, Zheng; Li, Shancang; Hämäläinen, Timo (Institute of Electrical and Electronics Engineers (IEEE), 2022)Recently, integrating satellite networks (e.g. Low-earth-orbit satellite constellation) into the Internet of Things (IoT) ecosystem has emerged as a potential paradigm to provide more reliable, ubiquitous and seamless ... -
MQTT-protokollan tietoturvallisuuden testaaminen
Hakonen, Sami (2023)Tässä tutkielmassa tarkoituksena oli selvittää älykoti ja IoT-järjestelmissä yleisesti käytetyn MQTT-protokollan tietoturvallisuuden ominaisuuksia, protokollaan kohdistettavia hyökkäyksiä ja hyökkäyksien lievennyskeinoja. ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.