Efficient key management for IOT owner in the cloud

被引:2
|
作者
Cui, Zongmin [1 ]
Lv, Haitao [1 ]
Yin, Chao [1 ]
Gao, Guangyong [1 ]
Zhou, Caixue [1 ]
机构
[1] Jiujiang Univ, Sch Informat Sci & Technol, Jiujiang 332005, Peoples R China
关键词
Internet of things; Sensitive data; IOT owner key management; Authorization update; Cloud computing; ACCESS-CONTROL;
D O I
10.1109/BDCloud.2015.40
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
IOT (internet of things) owner may not want their sensitive data to be public in the cloud. However, the client operated by IOT owner may be too lightweight to provide the encryption/decryption service. To remove the issue, we propose a novel solution to minimize the access control cost for IOT owner. First, we present a security model for IOT with minimal cost of IOT owner client without encryption, in which we transfer the encryption/decryption from the client to the cloud. Second, we propose an access control model to minimize the key management cost for IOT owner. Third, we provide an authorization update method to minimize the cost dynamically. In our method, the sensitive data from IOT owner is only available to the authorized user. Each IOT owner needs only to manage a single password, by which the IOT owner can always manage his/her sensitive data and authorization no matter the authorization policy how to change. Experimental results show that our approach significantly outperforms most of existing methods with efficient key management for IOT owner.
引用
收藏
页码:56 / 61
页数:6
相关论文
共 50 条
  • [41] Group Key Management in constrained IoT Settings
    Piccoli, Alessandro
    Pahl, Marc-Oliver
    Wustrich, Lars
    2020 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2020, : 576 - 581
  • [42] DOAS: Efficient data owner authorized search over encrypted cloud data
    Miao, Yinbin
    Ma, Jianfeng
    Liu, Ximeng
    Liu, Zhiquan
    Zhang, Junwei
    Wei, Fushan
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (03) : 349 - 360
  • [43] An Efficient Key Distribution Scheme in Cloud Computing
    Tang, Chumming
    Wong, Duncan S.
    Hu, Xing
    Pei, Dingyi
    2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2012,
  • [44] Efficient data management techniques based on hierarchical IoT privacy using block chains in cloud environments
    Jeong, Yoon-Su
    Kim, Dong-Ryool
    Shin, Seung-Soo
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (09): : 9810 - 9826
  • [46] Efficient data management techniques based on hierarchical IoT privacy using block chains in cloud environments
    Yoon-Su Jeong
    Dong-Ryool Kim
    Seung-Soo Shin
    The Journal of Supercomputing, 2021, 77 : 9810 - 9826
  • [47] Memory Efficient Multi Key (MEMK) Generation Scheme for Secure Transportation of Sensitive Data over Cloud and IoT Devices
    Thirumalai, Chandrasegar
    Kar, Himanshu
    2017 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2017,
  • [48] Securing IoT-based Groups: Efficient, Scalable and Fault-tolerant Key Management Protocol
    Abdmeziem, Mohammed Riyadh
    Charoy, Francois
    AD HOC & SENSOR WIRELESS NETWORKS, 2019, 45 (3-4) : 215 - 251
  • [49] Towards An Efficient Key Management and Authentication Strategy for Combined Fog-to-Cloud Continuum Systems
    Kahvazadeh, Sarang
    Masip-Bruin, Xavi
    Diaz, Rodrigo
    Marin-Tordera, Eva
    Jurnet, Alejandro
    Garcia, Jordi
    2018 3RD CLOUDIFICATION OF THE INTERNET OF THINGS (CIOT), 2018,
  • [50] An efficient and secure key management with the extended convolutional neural network for intrusion detection in cloud storage
    Ahmad, Shahnawaz
    Mehfuz, Shabana
    Beg, Javed
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (23):