Big data source location privacy and access control in the framework of IoT

In the recent years, we have observed the development of several connected and mobile devices intended for daily use. This development has come with many risks that might not be perceived by the users. These threats are compromising when an unauthorized entity has access to private big data generated through the user objects in the Internet of Things. In the literature, many solutions have been proposed in order to protect the big data, but the security remains a challenging issue. This work is carried out with the aim to provide a solution to the access control to the big data and securing the localization of their generator objects. The proposed models are based on Attribute Based Encryption, CHORD protocol and μTESLA. Through simulations, we compare our solutions to concurrent protocols and we show its efficiency in terms of relevant criteria.

[1]  Mahmoud Elkhodr,et al.  A contextual-adaptive Location Disclosure Agent for general devices in the Internet of Things , 2013, 38th Annual IEEE Conference on Local Computer Networks - Workshops.

[2]  Xiaohua Jia,et al.  Enabling efficient access control with dynamic policy updating for big data in the cloud , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[3]  Kai Rannenberg,et al.  The Future of Identity in the Information Society , 2009, The Future of Identity in the Information Society.

[4]  Munam Ali Shah,et al.  A novel model for preserving Location Privacy in Internet of Things , 2016, 2016 22nd International Conference on Automation and Computing (ICAC).

[5]  Dhiren R. Patel,et al.  Enhanced location privacy algorithm for wireless sensor network in Internet of Things , 2016, 2016 International Conference on Internet of Things and Applications (IOTA).

[6]  Hiroyuki Sato,et al.  Privacy-preserving access control model for big data cloud , 2015, 2015 International Computer Science and Engineering Conference (ICSEC).

[7]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[8]  Xuejiao Liu,et al.  Efficient distributed access control for big data in clouds , 2015, 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[9]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[10]  Zhou Su,et al.  An Efficient and Fine-Grained Big Data Access Control Scheme With Privacy-Preserving Policy , 2017, IEEE Internet of Things Journal.