Browse > Article
http://dx.doi.org/10.9708/jksci.2022.27.04.053

Data access control of KP-ABE scheme for secure communication in drone environment  

Hwang, Yong-Woon (Dept. of Software Convergence, Soonchunhyang University)
Kim, Su-Hyun (Dept. of ICT Industry Strategy, National IT Industry Promotion Agency)
Lee, Im-Yeong (Dept. of Software Convergence, Soonchunhyang University)
Abstract
Recently, as the amount of data collected by drones has rapidly increased, it is necessary to support cloud computing technology that can securely and efficiently store and process data. However, various security threats such as stealing, leaking, or tampering with data communicated by drones can occur due to attackers. Therefore, there is a need for security technology to provide secure communication of data collected from drones. Among various security technologies, the KP-ABE scheme, which is attribute-based encryption, is a security technology that satisfies two characteristics: data encryption and user access control. This paper researched the KP-ABE scheme and proposed a secure data access control scheme to the drone environment. This proposed scheme provides confidentiality and integrity of data communicated in a drone environment and secure access control and availability. In addition, it provides a fast ciphertext search and constant size ciphertext among the requirements to be provided in the KP-ABE scheme.
Keywords
Drone; Cloud; Access Control; Cryptographic Application; Attribute-Based Encryption;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Lai, R. H. Deng, Y. Li, and J. Weng, "Fully secure key-policy attributebased encryption with constant-size ciphertexts and fast decryption," In Proceedings of the 9th ACM symposium on Information, computer and communications security, pp. 239-248, 2014.
2 M. H. Ameri, M. Delavar, J. Mohajeri, and M. Salmasizadeh, "A keypolicy attribute-based temporary keyword search scheme for secure cloud storage," IEEE Transactions on Cloud Computing. Vol. 8, No. 3, pp. 660-671, April 2018. DOI: 10.1109/TCC.2018.2825983   DOI
3 Y. W. Hwang, and I. Y. Lee, "A Study on CP-ABE-Based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment," Sensors. Vol. 20, No. 17, pp.1-23, August 2020. DOI: https://doi.org/10.3390/s20174934   DOI
4 Lynn, B., The pairing-based cryptography (PBC) library, http://crypto.stanford.edu/pbc
5 C. J. Wang, and J. F. Luo, "A key-policy attribute-based encryption scheme with constant size ciphertext," In 2012 Eighth International Conference on Computational Intelligence and Security, Guangzhou, China, 2012, pp.447-451.
6 S. Y. Tan, K. W. Yeow, and S. O. Hwang, "Enhancement of a lightweight attribute-based encryption scheme for the Internet of Things," IEEE Internet of Things Journal, Vol. 6, No. 4, pp. 6384-6395, February 2019. DOI: 10.1109/JIOT.2019.2900631   DOI
7 X. Zheng, Z. Cai, and Y. Li, "Data Linkage in Smart IoT Systems: A Consideration from Privacy Perspective," IEEE Communications Magazine, Vol. 56, No. 9, pp. 55-61, September 2018. DOI: 10.1109/MCOM.2018.1701245   DOI
8 J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption," In 2007 IEEE symposium on security and privacy (SP'07), pp. 321-334, 2007.
9 C. Hu, J. Yu, X. Cheng, Z. Tian, and L. Sun, "CP-ABSC: An attributebased signcryption scheme to secure multicast communications in smart grids," In Mathematical foundations of computer science, Vol. 1, No. 1, pp. 77-100, February 2018. DOI: 10.3934/mfc.2018005   DOI
10 K. Zhang, J. Gong, S. Tang, J. Chen, X. Li, H. Qian, and Z. Cao, "Practical and efficient attribute-based encryption with constant-size ciphertexts in outsourced verifiable computation," In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp.269-279, 2016.
11 J. Li, M. Wang, Y. Lu, Y. Zhang, and H. Wang, "ABKS-SKGA: Attributebased keyword search secure against keyword guessing attack," Computer Standards & Interfaces. Vol. 74, pp. 1-7, February 2021. DOI: https://doi.org/10.1016/j.csi.2020.103471   DOI
12 B. Girgenti, P. Perazzo, C. Vallati, F. Righetti, G. Dini, and G. Anastasi, "On the feasibility of attribute-based encryption on constrained IoT devices for smart systems," In 2019 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 225-232, 2019.
13 M. Abdalla, M. Bellare, and P. Rogaway, "The oracle diffie-hellman assumptions and an analysis of dhies," In Cryptographers' Track at the RSA Conference, pp. 143-158, 2001.
14 H. Yin, Y. Xiong, J. Zhang, L. Ou, S. Liao, and Z Qin, "A key-policy searchable attribute-based encryption scheme for efficient keyword search and fine-grained access control over encrypted data," Electronics. Vol. 8, No. 3, pp. 1-20, February 2019. DOI: https://doi.org/10.3390/electronics8030265   DOI
15 J. P. Yaacoub, H. Noura, O. Salman, and A. Chehab, "Security analysis of drones systems: Attacks, limitations, and recommendations," Internet of Things, Vol. 11, No. 100218, pp. 1-39, May 2020. DOI:https://doi.org/10.1016/j.iot.2020.100218   DOI
16 M. Yahuza, M. Y. I. Idris, I. B. Ahmedy, A. W. A. Wahab, T. Nandy, N. M. Noor, and A. Bala, "Internet of drones security and privacy issues: Taxonomy and open challenges," IEEE Access, Vol. 9, pp. 57243-57270, April 2021. DOI: 10.1109/ACCESS.2021.3072030   DOI
17 V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," In Proceedings of the 13th ACM conference on Computer and communications security, pp. 89-98, 2006.