Abstract
The Key Policy Attribute-based Encryption (KPABE) standard arises as the utmost appropriate security system for public key encipherment. KP-ABE has been extensively utilized to carry out admittance management resolutions. However, because of its pricey operating expense, it’s hard to employ this encipherment standard over networks with limited resources like IoT and IIoT. Fortunately, the cloud must turn into a base framework to accommodate IoT functions; it is fascinating to take advantage of the resources of the cloud to carry out substantial functions related to IoT. We anticipated an effective Quantum KP-ABE framework for cloud-centric IoT apps; in this connection, our proposed approach is centered on using computational storage and power capabilities of cloud-based servers and reliable associate hosts to perform intense functions. A recital evaluation is directed to exhibit the efficacy of the planned framework. The experimental assessment showed that our model's encryption process computation time was 48% faster than existing methods. Memory occupancy efficacy evaluations showed that our approach uses 22% less cloud storage space than conventional standards even with 1 GB of user data. In comparative assessments of enciphered standards, the suggested model's 18% shorter execution time for key generation compared to conventional hash-based standards showed its feasibility for fast cryptographic procedures.
Similar content being viewed by others
Data Availability
There is no third party of data considered for this research work. Hence it doesn’t require any permission from a third party.
References
Li, S., Li, D. X., & Shanshan, Z. (2015). The internet of things: A survey. Information Systems Frontiers, 17(2), 243–259.
Rodriguez, J. D. P., Schreckling, D., & Posegga, J. (2016). Addressing data-centric security requirements for IoT-based systems. In 2016 international workshop on secure internet of things (SIoT). IEEE.
Novo, O. (2018). Scalable access management in IoT using blockchain: A performance evaluation. IEEE Internet of Things Journal, 6(3), 4694–4701.
Singh, I., & Singh, B. (2023). Access management of IoT devices using access control mechanism and decentralized authentication: A review. Measurement Sensors, 25, 100591.
Bianchi, G., Capossele, A. T., Petrioli, C., & Spenza, D. (2013). AGREE: Exploiting energy harvesting to support data-centric access control in WSNs. Ad Hoc Networks, 11(8), 2625–2636.
Fu, X., Wang, Y., You, L., Ning, J., Hu, Z., & Li, F. (2022). "Offline/Online lattice-based ciphertext policy attribute-based encryption. Journal of Systems Architecture, 130, 102684.
Singamaneni, K. K., & Naidu, P. S. (2022). An efficient quantum hash-based CP-ABE framework on cloud storage data. International Journal of Advanced Intelligence Paradigms, 22(3–4), 336–347.
Salama, R., & Al-Turjman, F. (2023). Mobile cloud computing and the internet of things security and privacy. NEU Journal for Artificial Intelligence and Internet of Things, 2(4) 1–6.
Singhrova, A. (2023). Quantum key distribution-based techniques in IoT. The Scientific Temper, 14(03), 1008–1013.
Singamaneni, K. K., Muhammad, G., & Ali, Z. (2023). A novel multi-qubit quantum key distribution Ciphertext-policy attribute-based encryption model to improve cloud security for consumers. IEEE Transactions on Consumer Electronics 1–8. https://doi.org/10.1109/TCE.2023.3331306
Dhar, S., Khare, A., Dwivedi, A. D., & Singh, R. (2023). Securing IoT devices: A novel approach using blockchain and quantum cryptography. Internet of Things, 25, 101019.
Kamalinejad, P., Mahapatra, C., Sheng, Z., Mirabbasi, S., Leung, V. C., & Guan, Y. L. (2015). Wireless energy harvesting for the Internet of Things. IEEE Communications Magazine, 53(6), 102–108.
Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on computer and communications security.
Mahdavi, M., Tadayon, M. H., Haghighi, M. S., & Ahmadian, Z. (2024). IoT-friendly, pre-computed and outsourced attribute based encryption. Future Generation Computer Systems, 150, 115–126.
He, X., Li, L., & Peng, H. (2023). A key escrow-free KP-ABE scheme and its application in stand-alone authentication in IoT. IEEE Internet of Things Journal.
Bediya, A. K., & Kumar, R. (2023). A novel intrusion detection system for internet of things network security. In Research anthology on convergence of blockchain, internet of things, and security. IGI Global (pp. 330–348).
Uddin, R., & Kumar, S. (2023). SDN-based federated learning approach for satellite-IoT framework to enhance data security and privacy in space communication. IEEE Journal of Radio Frequency Identification, 1–6. https://doi.org/10.1109/WISEE49342.2022.9926943
Mishra, P., Vidyarthi, A., & Siano, P. (2022). Guest editorial: Security and privacy for cloud-assisted internet of things (IoT) and smart grid. IEEE Transactions on Industrial Informatics 18(7), 4966–4968.
Kumar, M., Mukherjee, P., Verma, S., Shafi, J., Wozniak, M., & Ijaz, M. F. (2023). A smart privacy preserving framework for industrial IoT using hybrid meta-heuristic algorithm. Scientific Reports, 13(1), 5372.
Parmar, A., & Brahmbhatt, K. (2023). An optimized intelligent malware detection framework for securing digital data. Wireless Personal Communications, 133, 351–371.
Saif, S., Das, P., & Biswas, S. (2023). DHOA-ANFIS: A hybrid technique to detect routing attacks in wireless body area network. Wireless Personal Communications, 2023(133), 1–28.
Alam, T. (2023). Blockchain and big data-based access control for communication among IoT devices in smart cities. Wireless Personal Communications, 132(1), 433–456.
Zhang, J., Li, T., Ying, Z., & Ma, J. (2023). Trust-based secure multi-cloud collaboration framework in cloud-fog-assisted IoT. IEEE Transactions on Cloud Computing 1–8. https://doi.org/10.1063/5.0109836
Kumar, R., Kumar, P., Jolfaei, A., & Islam, A. N. (2023). An integrated framework for enhancing security and privacy in IoT-based business intelligence applications. In 2023 IEEE International Conference on Consumer Electronics (ICCE) (pp. 01–06). IEEE.
Li, J., Li, Y., Ding, C., Yu, J., & Ren, Y. (2022). Identity-based secure and efficient intelligent inference framework for IoT-cloud system. 2022 IEEE 13th International Symposium on Parallel Architectures, Algorithms and Programming (PAAP) (pp. 1-6). IEEE.
Sharma, D. K., Bhardwaj, K. K., Banyal, S., Gupta, R., Gupta, N., & Nkenyereye, L. (2021). An opportunistic approach for cloud service based IoT routing framework administering data transaction and identity security. IEEE Internet of Things Journal, 9, 2505–2512.
Banyal, S., Bhardwaj, K. K., Gupta, R., Verma, I., & Gaur, P. (2020). OSEPCloud: Opportunistic scenario-based Security and Privacy enhanced data forwarding framework for Cloud computing. In 2020 IEEE 17th India Council International Conference (INDICON) (pp. 1-6). IEEE.
Chaudhary, J., & Pillai, S. (2022). IoT security and privacy concerns in cloud ecosystem. In AIP Conference Proceedings, 2519(1), 1–8. https://doi.org/10.1063/5.0109836
Sotoudeh, S., Hashemi, S., & Garakani, H. G. (2020). Security framework of IoT-based smart home. In 2020 10th International Symposium on Telecommunications (IST) (pp. 251-256). IEEE.
Sadkhan, A. B. (2022). Improving the security framework for privacy in IoT-based health monitoring systems. In 2022 5th International Conference on Engineering Technology and its Applications (IICETA) (pp. 508-514). IEEE.
Huang, M.-D. A. (2018). Trilinear maps for cryptography II, arXiv: Cryptography and Security.
Huang, M.-D. A. (2019). Weil descent and cryptographic trilinear maps, arXiv: Cryptography and Security.
Huang, M.-D. A. (2020). Algebraic blinding and cryptographic trilinear maps, arXiv: Cryptography and Security.
Kumar, M., & Gupta, P. (2018). A Novel and Secure Multiparty Key Exchange Scheme Using Trilinear Pairing Map Based on Elliptic Curve Cryptography. In Soft Computing: Theories and Applications: Proceedings of SoCTA 2016, Volume 1 (pp. 37–50). Springer Singapore.
Da Lio, B., Bacco, D., Ding, Y., Cozzolino, D., Dalgaard, K., Rottwitt, K. & Oxenl, L. K. (2017). Two-Dimensional Quantum Key Distribution (QKD) Protocol for Increased Key Rate Fiber-Based Quantum Communications. In 2017 European conference on optical communication (ECOC), Gothenburg (pp. 1–3).
Wadhwa, S., Ahmad, M., & Vijay, H. (2016). Chaotic hash function based plain-image dependent block ciphering technique. In 2016 International conference on advances in computing, communications, and informatics (ICACCI), Jaipur (pp. 633–637).
Yao, X., Chen, Z., & Tian, Y. (2014). A lightweight attribute-based encryption scheme for the Internet of Things. Future Generation Computer Systems, 49, 104–112. https://doi.org/10.1016/j.future.2014.10.010
Ali, Z., Hossain, M. S., Muhammad, G., Ullah, I., Abachi, H., & Alamri, A. (2018). Edge-centric multimodal authentication system using encrypted biometric templates. Future Generation Computer Systems, 85, 76–87. https://doi.org/10.1016/j.future.2018.02.040
Chaudhary, R., Aujla, G. S., Kumar, N., & Zeadally, S. (2018). Lattice-based public key cryptosystem for internet of things environment: Challenges and solutions. IEEE Internet of Things Journal, 6, 4897–4909. https://doi.org/10.1109/jiot.2018.2878707
Tang, Y., Ba, Y., Li, L., Wang, X., & Yan, X. (2022). Lattice-based public-key encryption with conjunctive keyword search in multiuser set-ting for IIoT. Cluster Computing, 23, 1–2.
Yao, X., Chen, Z., & Tian, Y. (2015). A lightweight attribute-based encryption scheme for the internet of things. Future Generation Computer Systems, 1(49), 104–112.
Chaudhary, R., Aujla, G. S., Kumar, N., & Zeadally, S. (2018). Lattice-based public key cryptosystem for internet of things environment: Challenges and solutions. IEEE Internet of Things Journal., 6(3), 4897–4909.
Tang, Y., Ba, Y., Li, L., Wang, X., & Yan, X. (2022). Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT. Cluster Computing, 23, 1–2.
Nurhadi, A. I., Syambas, N. R. (2018) Quantum key distribution (QKD) protocols: A survey. In Proceedings of the 2018 4th international conference on wireless and telematics (ICWT), Nusa Dua, Indonesia, 12–13 July 2018. IEEE: Piscataway, NJ, USA (pp. 1–5).
Giri, A., Hasnain, M., Behera, B. K., Panigrahi, P. K., & Farouk, A. A step towards a quantum secure IIoT framework approaches and research opportunities. Sensors, 21(20), 6832.
Bennett, C. H., & Brassard, G. (2022). Quantum cryptography: Public key distribution and coin tossing. arXiv preprint arXiv:2003.06557.
Bethencourt, J., Sahai, B., & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In 2007 IEEE symposium on security and privacy (SP'07). IEEE.
Ji, Y. M., Tan, J., Liu, H., Sun, Y. P., Kang, J. B., Kuang, Z., & Zhao, C. (2014). A privacy protection method based on CP-ABE and KP-ABE for cloud computing. J. Softw., 9(6), 1367–1375.
Touati, L., Challal, Y., & Bouabdallah, A. (2014). C-cp-abe: Cooperative ciphertext policy attribute-based encryption for the internet of things. In 2014 international conference on advanced networking distributed systems and applications. IEEE.
Wang, C., & Luo, J. (2013). An efficient key-policy attribute-based encryption scheme with constant ciphertext length. Mathematical Problems in Engineering, 2013, 1–8.
Pandey, N. K., Kumar, K., Saini, G., & Mishra, A. K. (2023). Security issues and challenges in cloud of things-based applications for industrial automation. Annals of Operations Research, 1–20.
Mishra, A. K., Tripathi, N., Bagla, P., Pandey, N. K., Mittal, S., & Rana, D. S. (2023). Optimize a novel integrated solutions to analyses privacy persevering of the internet of things. In 2023 6th international conference on information systems and computer networks (ISCON). IEEE.
Funding
Not applicable.
Author information
Authors and Affiliations
Contributions
KKS—Literature review, methodology proposal, implementation. BAK—Results development. TB—Rough & Main draft preparation.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflicts of interest to report regarding the present study.
Ethics Approval
Whether or not the study included human or animal subjects.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Singamaneni, K.K., Budati, A.K. & Bikku, T. An Efficient Q-KPABE Framework to Enhance Cloud-Based IoT Security and Privacy. Wireless Pers Commun (2024). https://doi.org/10.1007/s11277-024-10908-8
Accepted:
Published:
DOI: https://doi.org/10.1007/s11277-024-10908-8