Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things

The development of the Internet of Things has led to great development of data sharing and data interaction, which has made security and privacy more and more a concern for users. How to ensure the safe sharing of data, avoid the leakage of sensitive information, and protect the privacy of users is a serious challenge. Access control is an important issue to ensure the trust of the Internet of Things. This paper proposes an access control scheme based on ciphertext attribute authentication and threshold policy, which uses the identity authentication of hidden attributes and divides the user’s permission grade by setting the threshold function with the user’s attributes. Users obtain different permission grades according to attribute authentication and access data of different sensitivity grades to achieve fine-grained, flexible and secure access to data in the cloud server while protecting personal privacy issues. In addition, when the resource is acquired, the identity and permission joint authentication method is adopted to avoid the collusion attack of the illegal member, which makes the resource access control more secure.

[1]  Shaowen Wang,et al.  LaSa: Location Aware Wireless Security Access Control for IoT Systems , 2018, Mobile Networks and Applications.

[2]  Ghassan Sabeeh Mahmood,et al.  A Secure Cloud Computing System by Using Encryption and Access Control Model , 2019, J. Inf. Process. Syst..

[3]  Diego Reforgiato Recupero,et al.  A Probabilistic-driven Ensemble Approach to Perform Event Classification in Intrusion Detection System , 2018, KDIR.

[4]  Morteza Amini,et al.  Purpose-Based Privacy Preserving Access Control for Secure Service Provision and Composition , 2019, IEEE Transactions on Services Computing.

[5]  Giovanni Pau,et al.  Towards 5G and beyond for the internet of UAVs, vehicles, smartphones, Sensors and Smart Objects , 2019, J. Netw. Comput. Appl..

[6]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[7]  Giovanni Pau,et al.  An Overview of Vehicular Communications , 2019, Future Internet.

[8]  Peilin Hong,et al.  An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage , 2019, IEEE Transactions on Information Forensics and Security.

[9]  Mohsen Guizani,et al.  Priority-Based Medium Access Control for Wireless Body Area Networks With High-Performance Design , 2019, IEEE Internet of Things Journal.

[10]  R. Kavitha,et al.  Efficient and Secure Privacy Analysis for Medical Big Data Using TDES and MKSVM with Access Control in Cloud , 2019, Journal of Medical Systems.

[11]  Ali Ismail Awad,et al.  Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes , 2018, Sensors.

[12]  Arputharaj Kannan,et al.  Secure cloud‐based e‐learning system with access control and group key mechanism , 2019, Concurr. Comput. Pract. Exp..

[13]  Yi Mu,et al.  A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance , 2019, Future Gener. Comput. Syst..

[14]  Rui Guo,et al.  A Distributed Access Control with Outsourced Computation in Fog Computing , 2019, Secur. Commun. Networks.

[15]  Vijay Varadharajan,et al.  Policy-based access control for constrained healthcare resources in the context of the Internet of Things , 2019, J. Netw. Comput. Appl..

[16]  Ivana Tomić,et al.  A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols , 2017, IEEE Internet of Things Journal.

[17]  Bünyamin Ciylan,et al.  Application model for privileged account access control system in enterprise networks , 2019, Comput. Secur..

[18]  Shehzad Khalid,et al.  Security and privacy based access control model for internet of connected vehicles , 2019, Future Gener. Comput. Syst..

[19]  Laura Ricci,et al.  A blockchain based approach for the definition of auditable Access Control systems , 2019, Comput. Secur..

[20]  Wei Li,et al.  TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage , 2016, IEEE Transactions on Parallel and Distributed Systems.

[21]  Najoua Essoukri Ben Amara,et al.  Double watermarking‐based biometric access control for radio frequency identification card , 2019, International Journal of RF and Microwave Computer-Aided Engineering.

[22]  Witold Pedrycz,et al.  IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT , 2019, Future Gener. Comput. Syst..

[23]  Syam Kumar Pasupuleti,et al.  A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud , 2018, Journal of Ambient Intelligence and Humanized Computing.

[24]  Jie Cui,et al.  Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage , 2016, Soft Computing.

[25]  Giovanni Pau,et al.  Next Generation Wireless Technologies for Internet of Things , 2018, Sensors.

[26]  Chen Li,et al.  A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT , 2019, IEEE Access.

[27]  D. Chitra,et al.  Data Access Control and Secured Data Sharing Approach for Health Care Data in Cloud Environment , 2019, Journal of Medical Systems.

[28]  Hongbo Zhu,et al.  Fine-grained multi-authority access control in IoT-enabled mHealth , 2019, Ann. des Télécommunications.

[29]  Khalid Mahmood Awan,et al.  Barrier Access Control Using Sensors Platform and Vehicle License Plate Characters Recognition , 2019, Sensors.

[30]  Emmanuel Bertin,et al.  Access control in the Internet of Things: a survey of existing approaches and open research questions , 2019, Annals of Telecommunications.

[31]  Christian Bettstetter,et al.  On Access Control in Cabin-Based Transport Systems , 2018, IEEE Transactions on Intelligent Transportation Systems.

[32]  Mohamed Abid,et al.  A comprehensive survey on wireless sensor node hardware platforms , 2018, Comput. Networks.

[33]  Akhan Akbulut,et al.  Survey on Access Control Mechanisms in Cloud Computing , 2018, J. Cyber Secur. Mobil..

[34]  Jingwei Shang,et al.  A privacy protection method for health care big data management based on risk access control , 2019, Health Care Management Science.

[35]  Diego Reforgiato Recupero,et al.  A Discretized Extended Feature Space (DEFS) Model to Improve the Anomaly Detection Performance in Network Intrusion Detection Systems , 2019, KDIR.

[36]  Yao Zheng,et al.  Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.

[37]  Dijiang Huang,et al.  Attribute-based Access Control for ICN Naming Scheme , 2014, IEEE Transactions on Dependable and Secure Computing.

[38]  Mohammad S. Obaidat,et al.  TACRM: trust access control and resource management mechanism in fog computing , 2019, Human-centric Computing and Information Sciences.

[39]  Diego Reforgiato Recupero,et al.  Internet of Entities (IoE): A Blockchain-based Distributed Paradigm for Data Exchange between Wireless-based Devices , 2019, SENSORNETS.

[40]  Albert C. Esterline,et al.  Behavioral Modeling Intrusion Detection System (BMIDS) Using Internet of Things (IoT) Behavior-Based Anomaly Detection via Immunity-Inspired Algorithms , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).

[41]  Yi Zhu,et al.  An edge re‐encryption‐based access control mechanism in NDN , 2019, Trans. Emerg. Telecommun. Technol..