Detail View

Efficient Design of Secure IoT Data Sharing with Fine-grained Access Control
Citations

WEB OF SCIENCE

Citations

SCOPUS

Metadata Downloads

Title
Efficient Design of Secure IoT Data Sharing with Fine-grained Access Control
Alternative Title
세분화된 접근제어가 적용된 효율적이고 안전한 사물 인터넷 데이터 공유 프로토콜
DGIST Authors
Woojin JeonJeongho KwakJemin Lee
Advisor
곽정호
Co-Advisor(s)
Jemin Lee
Issued Date
2022
Awarded Date
2022/08
Citation
Woojin Jeon. (2022). Efficient Design of Secure IoT Data Sharing with Fine-grained Access Control. doi: 10.22677/thesis.200000627132
Type
Thesis
Subject
Internet of things, Fine-grained access control, Hidden attributes, Encryption outsourcing, Fast match test
Description
Internet of things, Fine-grained access control, Hidden attributes, Encryption outsourcing, Fast match test
Abstract
Table Of Contents
I. INTRODUCTION 1
1.1 Backgrounds 1
1.2 Related Works 1
1.3 Contributions 2
II. Preliminaries 4
2.1 Access Structure and Linear Secret Sharing Scheme (LSSS) 4
2.2 Bilinear Map 4
2.3 Encryption Outsourced Key Policy Attribute Based Encryption 5
2.4 Attribute Bloom Filter 7
III. System and Security Model 9
3.1 System Model 9
3.2 Attack Model and Security Features 10
3.2.1 Confidentiality 10
3.2.2 Mutual Authentication 10
3.2.3 Fine-grained Access Control 11
3.2.4 Hidden Attributes 11
3.2.5 IoT Identity Privacy 11
3.2.6 Traceability and Revocability 11
IV. Efficient and Secure IoT Data Sharing Protocol with Fine-grained Access Control for Data Producers and Consumers (ESIoT-PC) 12
4.1 System Initialization 12
4.2 Registration and Key Management 12
4.3 IoT Enrollment Protocol 14
4.4 IoT Data Storage Protocol 16
4.5 Consumer Data Access Protocol 18
4.6 Trace and Revocation Process 19
V. Security and Performance Analysis 20
5.1 Security Analysis 20
5.1.1 Confidentiality 20
5.1.2 Mutual Authentication 20
5.1.3 Fine-grained Access Control 20
5.1.4 Hidden Attributes 21
5.1.5 IoT Identity Privacy 21
5.1.6 Traceability and Revocability 21
5.2 Performance Analysis 21
5.2.1 Cryptographic Algorithm Evaluation 22
5.2.2 Protocol Performance Evaluation 23
VI. Conclusion 26
References 27
요약문 30
URI
http://dgist.dcollection.net/common/orgView/200000627132
http://hdl.handle.net/20.500.11750/16768
DOI
10.22677/thesis.200000627132
Degree
Master
Department
Department of Electrical Engineering and Computer Science
Publisher
DGIST
Show Full Item Record

File Downloads

  • There are no files associated with this item.

공유

qrcode
공유하기

Total Views & Downloads