Secure Data Provenance in Internet of Things based Networks by Outsourcing Attribute based Signatures and using Bloom Filters

Abstract

With the dawn of autonomous organization and network and service management, the integration of existing networks with Internet of Things (IoT) based networks is becoming a reality. With minimal human interaction, the security of IoT data moving through the network becomes prone to attacks. IoT networks require a secure provenance mechanism, which is efficient and lightweight because of the scarce computing and storage resources at the IoT nodes. In this paper, we have proposed a secure mechanism to sign and authenticate provenance messages using Ciphertext-Policy Attribute Based Encryption (CP-ABE) based signatures. The proposed technique uses Bloom filters to reduce storage requirements and an outsourced ABE mechanism to use lessen the computational requirements at the IoT devices. The proposed technique helps in reducing the storage requirements and computation time in IoT devices. The performance of the proposed mechanism is evaluated and the results show that the proposed solution is best suited for resourced constrained IoT network.

Authors and Affiliations

Muhammad Shoaib Siddiqui, Atiqur Rahman, Adnan Nadeem, Ali M. Alzahrani

Keywords

Related Articles

Contemporary Layout’s Integration for Geospatial Image Mining

Image taxonomy and repossession plays a major role in dealing with large multimedia data on the Internet. Social networks, image sharing websites and mobile application require categorizing multimedia items for more effi...

E-Commerce Adoption at Customer Level in Jordan: an Empirical Study of Philadelphia General Supplies

E-commerce in developing countries has been studied by numerous researchers during the last decade and a number of common and culturally specific challenges have been identified.. This study considers Jordan as a case st...

Region-wise Ranking for One-Day International (ODI) Cricket Teams

In cricket, the region plays a significant role in ranking teams. The International Cricket Council (ICC) uses an ad-hoc points system to rank cricket teams, which entirely based on the number of wins and losses a match....

Ontology-based Query Expansion for Arabic Text Retrieval

The semantic resources are important parts in the Information Retrieval (IR) such as search engines, Question Answering (QA), etc., these resources should be available, readable and understandable. In semantic web, the o...

Deep Learning based Computer Aided Diagnosis System for Breast Mammograms

In this paper, a framework has been presented by using a combination of deep Convolutional Neural Network (CNN) with Support Vector Machine (SVM). Proposed method first perform preprocessing to resize the image so that i...

Download PDF file
  • EP ID EP578374
  • DOI 10.14569/IJACSA.2019.0100529
  • Views 63
  • Downloads 0

How To Cite

Muhammad Shoaib Siddiqui, Atiqur Rahman, Adnan Nadeem, Ali M. Alzahrani (2019). Secure Data Provenance in Internet of Things based Networks by Outsourcing Attribute based Signatures and using Bloom Filters. International Journal of Advanced Computer Science & Applications, 10(5), 221-226. https://europub.co.uk/articles/-A-578374