Secure Data Provenance in Internet of Things based Networks by Outsourcing Attribute based Signatures and using Bloom Filters
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 5
Abstract
With the dawn of autonomous organization and network and service management, the integration of existing networks with Internet of Things (IoT) based networks is becoming a reality. With minimal human interaction, the security of IoT data moving through the network becomes prone to attacks. IoT networks require a secure provenance mechanism, which is efficient and lightweight because of the scarce computing and storage resources at the IoT nodes. In this paper, we have proposed a secure mechanism to sign and authenticate provenance messages using Ciphertext-Policy Attribute Based Encryption (CP-ABE) based signatures. The proposed technique uses Bloom filters to reduce storage requirements and an outsourced ABE mechanism to use lessen the computational requirements at the IoT devices. The proposed technique helps in reducing the storage requirements and computation time in IoT devices. The performance of the proposed mechanism is evaluated and the results show that the proposed solution is best suited for resourced constrained IoT network.
Authors and Affiliations
Muhammad Shoaib Siddiqui, Atiqur Rahman, Adnan Nadeem, Ali M. Alzahrani
Golay Code Transformations for Ensemble Clustering in Application to Medical Diagnostics
Clinical Big Data streams have accumulated large-scale multidimensional data about patients’ medical conditions and drugs along with their known side effects. The volume and the complexity of this Big Data streams hinder...
OpenMP Implementation in the Characterization of a Urban Growth Model Cellular Automaton
This paper presents the implementation of a parallelization strategy using the OpenMP library, while developing a simulation tool based on a cellular automaton (CA) to run urban growth simulations. The characterization o...
Competitive Representation Based Classification Using Facial Noise Detection
Linear representation based face recognition is hotly studied in recent years. Competitive representation classification is a linear representation based method which uses the most competitive training samples to sparsel...
Good Quasi-Cyclic Codes from Circulant Matrices Concatenation using a Heuristic Method
In this paper we present a method to search q circulant matrices; the concatenation of these circulant matrices with circulant identity matrix generates quasi-cyclic codes with high various code rate q/(q+1) (q an intege...
A Two-Level Fault-Tolerance Technique for High Performance Computing Applications
Reliability is the biggest concern facing future extreme-scale, high performance computing (HPC) systems. Within the current generation of HPC systems, projections suggest that errors will occur with very high rates in f...