Efficient key management for IOT owner in the cloud

被引:2
|
作者
Cui, Zongmin [1 ]
Lv, Haitao [1 ]
Yin, Chao [1 ]
Gao, Guangyong [1 ]
Zhou, Caixue [1 ]
机构
[1] Jiujiang Univ, Sch Informat Sci & Technol, Jiujiang 332005, Peoples R China
关键词
Internet of things; Sensitive data; IOT owner key management; Authorization update; Cloud computing; ACCESS-CONTROL;
D O I
10.1109/BDCloud.2015.40
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
IOT (internet of things) owner may not want their sensitive data to be public in the cloud. However, the client operated by IOT owner may be too lightweight to provide the encryption/decryption service. To remove the issue, we propose a novel solution to minimize the access control cost for IOT owner. First, we present a security model for IOT with minimal cost of IOT owner client without encryption, in which we transfer the encryption/decryption from the client to the cloud. Second, we propose an access control model to minimize the key management cost for IOT owner. Third, we provide an authorization update method to minimize the cost dynamically. In our method, the sensitive data from IOT owner is only available to the authorized user. Each IOT owner needs only to manage a single password, by which the IOT owner can always manage his/her sensitive data and authorization no matter the authorization policy how to change. Experimental results show that our approach significantly outperforms most of existing methods with efficient key management for IOT owner.
引用
收藏
页码:56 / 61
页数:6
相关论文
共 50 条
  • [21] An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture
    Huihui Huang
    Siqi Lu
    Zehui Wu
    Qiang Wei
    EURASIP Journal on Wireless Communications and Networking, 2021
  • [22] Secure Key-distribution in IoT Cloud Networks
    Moharana, Soumya Ranjan
    Jha, Vijay Kumar
    Satpathy, Anurag
    Addya, Sourav Kanti
    Turuk, Ashok Kumar
    Majhi, Banshidhar
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON SENSING, SIGNAL PROCESSING AND SECURITY (ICSSS), 2017, : 197 - 202
  • [23] An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture
    Huang, Huihui
    Lu, Siqi
    Wu, Zehui
    Wei, Qiang
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
  • [24] Efficient Resource Utilization in IoT and Cloud Computing
    Prasad, Vivek Kumar
    Dansana, Debabrata
    Bhavsar, Madhuri D.
    Acharya, Biswaranjan
    Gerogiannis, Vassilis C.
    Kanavos, Andreas
    INFORMATION, 2023, 14 (11)
  • [25] Efficient and scalable IoT service delivery on Cloud
    Li, Fei
    Voegler, Michael
    Claessens, Markus
    Dustdar, Schahram
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 740 - 747
  • [26] Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner
    Zhou, Lu
    Zhu, Youwen
    Castiglione, Aniello
    COMPUTERS & SECURITY, 2017, 69 : 84 - 96
  • [27] Efficient Public Verification on the Integrity of Multi-Owner Data in the Cloud
    Wang, Boyang
    Li, Hui
    Liu, Xuefeng
    Li, Fenghua
    Li, Xiaoqing
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2014, 16 (06) : 592 - 599
  • [28] CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
    Tian, Xiuxia
    Huang, Ling
    Wu, Tony
    Wang, Xiaoling
    Zhou, Aoying
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2015, 27 (12) : 3217 - 3230
  • [29] CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
    Tian, Xiuxia
    Huang, Ling
    Wu, Tony
    Wang, Xiaoling
    Zhou, Aoying
    2016 32ND IEEE INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2016, : 1478 - 1479
  • [30] IoT fault management in cloud/fog environments
    Di Modica, Giuseppe
    Gulino, Samuele
    Tomarchio, Orazio
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS ( IOT 2019), 2019,