Fortifying Public Safety: A Dynamic Role-Based Access Control Paradigm for Cloud-Centric IoT

09/04/2023
by   Atefeh Mohseni-Ejiyeh, et al.
0

The evolution of communication technologies, exemplified by the Internet of Things (IoT) and cloud computing, has significantly enhanced the speed and accessibility of Public Safety (PS) services, critical to ensuring the safety and security of our environment. However, these advancements also introduce inherent security and privacy challenges. In response, this research presents a novel and adaptable access control scheme tailored to PS services in cloud-supported IoT environments. Our proposed access control protocol leverages the strengths of Key Policy Attribute Based Encryption (KP-ABE) and Identity-Based Broadcast Encryption (IDBB), combining them to establish a robust security framework for cloud-supported IoT in the context of PS services. Through the implementation of an Elliptic Curve Diffie-Hellman (ECDH) scheme between entities, we ensure entity authentication, data confidentiality, and integrity, addressing fundamental security requirements. A noteworthy aspect of our lightweight protocol is the delegation of user private key generation within the KP-ABE scheme to an untrusted cloud entity. This strategic offloading of computational and communication overhead preserves data privacy, as the cloud is precluded from accessing sensitive information. To achieve this, we employ an IDBB scheme to generate secret private keys for system users based on their roles, requiring the logical conjunction ('AND') of user attributes to access data. This architecture effectively conceals user identities from the cloud service provider. Comprehensive analysis validates the efficacy of the proposed protocol, confirming its ability to ensure system security and availability within acceptable parameters.

READ FULL TEXT
research
10/25/2018

Achieving Efficient and Secure Data Acquisition for Cloud-supported Internet of Things in Smart Grid

Cloud-supported Internet of Things (Cloud-IoT) has been broadly deployed...
research
12/18/2020

Privacy Enhanced DigiLocker using Ciphertext-Policy Attribute-Based Encryption

Recently, Government of India has taken several initiatives to make Indi...
research
03/01/2022

Privacy-Friendly Flexible IoT Health Data Processing with User-Centric Access Control

This paper proposes a novel Single and Multiple user(s) data Aggregation...
research
10/29/2020

SANS: Self-sovereign Authentication for Network Slices

5G communications proposed significant improvements over 4G in terms of ...
research
09/18/2018

Security and Protocol Exploit Analysis of the 5G Specifications

The Third Generation Partnership Project (3GPP) released its first 5G se...
research
12/30/2017

Why the Equifax Breach Should Not Have Mattered

Data security, which is concerned with the prevention of unauthorized ac...
research
06/03/2022

Oblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic Encryption

In many Internet of Things (IoT) applications, data sensed by an IoT dev...

Please sign up or login with your details

Forgot password? Click here to reset