Skip to main content
Log in

An Efficient Q-KPABE Framework to Enhance Cloud-Based IoT Security and Privacy

  • Research
  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The Key Policy Attribute-based Encryption (KPABE) standard arises as the utmost appropriate security system for public key encipherment. KP-ABE has been extensively utilized to carry out admittance management resolutions. However, because of its pricey operating expense, it’s hard to employ this encipherment standard over networks with limited resources like IoT and IIoT. Fortunately, the cloud must turn into a base framework to accommodate IoT functions; it is fascinating to take advantage of the resources of the cloud to carry out substantial functions related to IoT. We anticipated an effective Quantum KP-ABE framework for cloud-centric IoT apps; in this connection, our proposed approach is centered on using computational storage and power capabilities of cloud-based servers and reliable associate hosts to perform intense functions. A recital evaluation is directed to exhibit the efficacy of the planned framework. The experimental assessment showed that our model's encryption process computation time was 48% faster than existing methods. Memory occupancy efficacy evaluations showed that our approach uses 22% less cloud storage space than conventional standards even with 1 GB of user data. In comparative assessments of enciphered standards, the suggested model's 18% shorter execution time for key generation compared to conventional hash-based standards showed its feasibility for fast cryptographic procedures.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data Availability

There is no third party of data considered for this research work. Hence it doesn’t require any permission from a third party.

References

  1. Li, S., Li, D. X., & Shanshan, Z. (2015). The internet of things: A survey. Information Systems Frontiers, 17(2), 243–259.

    Article  Google Scholar 

  2. Rodriguez, J. D. P., Schreckling, D., & Posegga, J. (2016). Addressing data-centric security requirements for IoT-based systems. In 2016 international workshop on secure internet of things (SIoT). IEEE.

  3. Novo, O. (2018). Scalable access management in IoT using blockchain: A performance evaluation. IEEE Internet of Things Journal, 6(3), 4694–4701.

    Article  Google Scholar 

  4. Singh, I., & Singh, B. (2023). Access management of IoT devices using access control mechanism and decentralized authentication: A review. Measurement Sensors, 25, 100591.

    Article  Google Scholar 

  5. Bianchi, G., Capossele, A. T., Petrioli, C., & Spenza, D. (2013). AGREE: Exploiting energy harvesting to support data-centric access control in WSNs. Ad Hoc Networks, 11(8), 2625–2636.

    Article  Google Scholar 

  6. Fu, X., Wang, Y., You, L., Ning, J., Hu, Z., & Li, F. (2022). "Offline/Online lattice-based ciphertext policy attribute-based encryption. Journal of Systems Architecture, 130, 102684.

    Article  Google Scholar 

  7. Singamaneni, K. K., & Naidu, P. S. (2022). An efficient quantum hash-based CP-ABE framework on cloud storage data. International Journal of Advanced Intelligence Paradigms, 22(3–4), 336–347.

    Article  Google Scholar 

  8. Salama, R., & Al-Turjman, F. (2023). Mobile cloud computing and the internet of things security and privacy. NEU Journal for Artificial Intelligence and Internet of Things, 2(4) 1–6.

  9. Singhrova, A. (2023). Quantum key distribution-based techniques in IoT. The Scientific Temper, 14(03), 1008–1013.

    Article  Google Scholar 

  10. Singamaneni, K. K., Muhammad, G., & Ali, Z. (2023). A novel multi-qubit quantum key distribution Ciphertext-policy attribute-based encryption model to improve cloud security for consumers. IEEE Transactions on Consumer Electronics 1–8. https://doi.org/10.1109/TCE.2023.3331306

  11. Dhar, S., Khare, A., Dwivedi, A. D., & Singh, R. (2023). Securing IoT devices: A novel approach using blockchain and quantum cryptography. Internet of Things, 25, 101019.

    Article  Google Scholar 

  12. Kamalinejad, P., Mahapatra, C., Sheng, Z., Mirabbasi, S., Leung, V. C., & Guan, Y. L. (2015). Wireless energy harvesting for the Internet of Things. IEEE Communications Magazine, 53(6), 102–108.

    Article  Google Scholar 

  13. Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on computer and communications security.

  14. Mahdavi, M., Tadayon, M. H., Haghighi, M. S., & Ahmadian, Z. (2024). IoT-friendly, pre-computed and outsourced attribute based encryption. Future Generation Computer Systems, 150, 115–126.

    Article  Google Scholar 

  15. He, X., Li, L., & Peng, H. (2023). A key escrow-free KP-ABE scheme and its application in stand-alone authentication in IoT. IEEE Internet of Things Journal.

  16. Bediya, A. K., & Kumar, R. (2023). A novel intrusion detection system for internet of things network security. In Research anthology on convergence of blockchain, internet of things, and security. IGI Global (pp. 330–348).

  17. Uddin, R., & Kumar, S. (2023). SDN-based federated learning approach for satellite-IoT framework to enhance data security and privacy in space communication. IEEE Journal of Radio Frequency Identification, 1–6. https://doi.org/10.1109/WISEE49342.2022.9926943

  18. Mishra, P., Vidyarthi, A., & Siano, P. (2022). Guest editorial: Security and privacy for cloud-assisted internet of things (IoT) and smart grid. IEEE Transactions on Industrial Informatics 18(7), 4966–4968.

  19. Kumar, M., Mukherjee, P., Verma, S., Shafi, J., Wozniak, M., & Ijaz, M. F. (2023). A smart privacy preserving framework for industrial IoT using hybrid meta-heuristic algorithm. Scientific Reports, 13(1), 5372.

    Article  ADS  CAS  PubMed  PubMed Central  Google Scholar 

  20. Parmar, A., & Brahmbhatt, K. (2023). An optimized intelligent malware detection framework for securing digital data. Wireless Personal Communications, 133, 351–371.

    Article  Google Scholar 

  21. Saif, S., Das, P., & Biswas, S. (2023). DHOA-ANFIS: A hybrid technique to detect routing attacks in wireless body area network. Wireless Personal Communications, 2023(133), 1–28.

    Google Scholar 

  22. Alam, T. (2023). Blockchain and big data-based access control for communication among IoT devices in smart cities. Wireless Personal Communications, 132(1), 433–456.

    Article  Google Scholar 

  23. Zhang, J., Li, T., Ying, Z., & Ma, J. (2023). Trust-based secure multi-cloud collaboration framework in cloud-fog-assisted IoT. IEEE Transactions on Cloud Computing 1–8. https://doi.org/10.1063/5.0109836

  24. Kumar, R., Kumar, P., Jolfaei, A., & Islam, A. N. (2023). An integrated framework for enhancing security and privacy in IoT-based business intelligence applications. In 2023 IEEE International Conference on Consumer Electronics (ICCE) (pp. 01–06). IEEE.

  25. Li, J., Li, Y., Ding, C., Yu, J., & Ren, Y. (2022). Identity-based secure and efficient intelligent inference framework for IoT-cloud system. 2022 IEEE 13th International Symposium on Parallel Architectures, Algorithms and Programming (PAAP) (pp. 1-6). IEEE.

  26. Sharma, D. K., Bhardwaj, K. K., Banyal, S., Gupta, R., Gupta, N., & Nkenyereye, L. (2021). An opportunistic approach for cloud service based IoT routing framework administering data transaction and identity security. IEEE Internet of Things Journal, 9, 2505–2512.

    Article  CAS  Google Scholar 

  27. Banyal, S., Bhardwaj, K. K., Gupta, R., Verma, I., & Gaur, P. (2020). OSEPCloud: Opportunistic scenario-based Security and Privacy enhanced data forwarding framework for Cloud computing. In 2020 IEEE 17th India Council International Conference (INDICON) (pp. 1-6). IEEE.

  28. Chaudhary, J., & Pillai, S. (2022). IoT security and privacy concerns in cloud ecosystem. In AIP Conference Proceedings, 2519(1), 1–8. https://doi.org/10.1063/5.0109836

  29. Sotoudeh, S., Hashemi, S., & Garakani, H. G. (2020). Security framework of IoT-based smart home. In 2020 10th International Symposium on Telecommunications (IST) (pp. 251-256). IEEE.

  30. Sadkhan, A. B. (2022). Improving the security framework for privacy in IoT-based health monitoring systems. In 2022 5th International Conference on Engineering Technology and its Applications (IICETA) (pp. 508-514). IEEE.

  31. Huang, M.-D. A. (2018). Trilinear maps for cryptography II, arXiv: Cryptography and Security.

  32. Huang, M.-D. A. (2019). Weil descent and cryptographic trilinear maps, arXiv: Cryptography and Security.

  33. Huang, M.-D. A. (2020). Algebraic blinding and cryptographic trilinear maps, arXiv: Cryptography and Security.

  34. Kumar, M., & Gupta, P. (2018). A Novel and Secure Multiparty Key Exchange Scheme Using Trilinear Pairing Map Based on Elliptic Curve Cryptography. In Soft Computing: Theories and Applications: Proceedings of SoCTA 2016, Volume 1 (pp. 37–50). Springer Singapore.

  35. Da Lio, B., Bacco, D., Ding, Y., Cozzolino, D., Dalgaard, K., Rottwitt, K. & Oxenl, L. K. (2017). Two-Dimensional Quantum Key Distribution (QKD) Protocol for Increased Key Rate Fiber-Based Quantum Communications. In 2017 European conference on optical communication (ECOC), Gothenburg (pp. 1–3).

  36. Wadhwa, S., Ahmad, M., & Vijay, H. (2016). Chaotic hash function based plain-image dependent block ciphering technique. In 2016 International conference on advances in computing, communications, and informatics (ICACCI), Jaipur (pp. 633–637).

  37. Yao, X., Chen, Z., & Tian, Y. (2014). A lightweight attribute-based encryption scheme for the Internet of Things. Future Generation Computer Systems, 49, 104–112. https://doi.org/10.1016/j.future.2014.10.010

    Article  Google Scholar 

  38. Ali, Z., Hossain, M. S., Muhammad, G., Ullah, I., Abachi, H., & Alamri, A. (2018). Edge-centric multimodal authentication system using encrypted biometric templates. Future Generation Computer Systems, 85, 76–87. https://doi.org/10.1016/j.future.2018.02.040

    Article  Google Scholar 

  39. Chaudhary, R., Aujla, G. S., Kumar, N., & Zeadally, S. (2018). Lattice-based public key cryptosystem for internet of things environment: Challenges and solutions. IEEE Internet of Things Journal, 6, 4897–4909. https://doi.org/10.1109/jiot.2018.2878707

    Article  Google Scholar 

  40. Tang, Y., Ba, Y., Li, L., Wang, X., & Yan, X. (2022). Lattice-based public-key encryption with conjunctive keyword search in multiuser set-ting for IIoT. Cluster Computing, 23, 1–2.

    Google Scholar 

  41. Yao, X., Chen, Z., & Tian, Y. (2015). A lightweight attribute-based encryption scheme for the internet of things. Future Generation Computer Systems, 1(49), 104–112.

    Article  Google Scholar 

  42. Chaudhary, R., Aujla, G. S., Kumar, N., & Zeadally, S. (2018). Lattice-based public key cryptosystem for internet of things environment: Challenges and solutions. IEEE Internet of Things Journal., 6(3), 4897–4909.

    Article  Google Scholar 

  43. Tang, Y., Ba, Y., Li, L., Wang, X., & Yan, X. (2022). Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT. Cluster Computing, 23, 1–2.

    Google Scholar 

  44. Nurhadi, A. I., Syambas, N. R. (2018) Quantum key distribution (QKD) protocols: A survey. In Proceedings of the 2018 4th international conference on wireless and telematics (ICWT), Nusa Dua, Indonesia, 12–13 July 2018. IEEE: Piscataway, NJ, USA (pp. 1–5).

  45. Giri, A., Hasnain, M., Behera, B. K., Panigrahi, P. K., & Farouk, A. A step towards a quantum secure IIoT framework approaches and research opportunities. Sensors, 21(20), 6832.

  46. Bennett, C. H., & Brassard, G. (2022). Quantum cryptography: Public key distribution and coin tossing. arXiv preprint arXiv:2003.06557.

  47. Bethencourt, J., Sahai, B., & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In 2007 IEEE symposium on security and privacy (SP'07). IEEE.

  48. Ji, Y. M., Tan, J., Liu, H., Sun, Y. P., Kang, J. B., Kuang, Z., & Zhao, C. (2014). A privacy protection method based on CP-ABE and KP-ABE for cloud computing. J. Softw., 9(6), 1367–1375.

    Article  Google Scholar 

  49. Touati, L., Challal, Y., & Bouabdallah, A. (2014). C-cp-abe: Cooperative ciphertext policy attribute-based encryption for the internet of things. In 2014 international conference on advanced networking distributed systems and applications. IEEE.

  50. Wang, C., & Luo, J. (2013). An efficient key-policy attribute-based encryption scheme with constant ciphertext length. Mathematical Problems in Engineering, 2013, 1–8.

  51. Pandey, N. K., Kumar, K., Saini, G., & Mishra, A. K. (2023). Security issues and challenges in cloud of things-based applications for industrial automation. Annals of Operations Research, 1–20.

  52. Mishra, A. K., Tripathi, N., Bagla, P., Pandey, N. K., Mittal, S., & Rana, D. S. (2023). Optimize a novel integrated solutions to analyses privacy persevering of the internet of things. In 2023 6th international conference on information systems and computer networks (ISCON). IEEE.

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Contributions

KKS—Literature review, methodology proposal, implementation. BAK—Results development. TB—Rough & Main draft preparation.

Corresponding author

Correspondence to Anil Kumar Budati.

Ethics declarations

Conflict of interest

The authors declare that they have no conflicts of interest to report regarding the present study.

Ethics Approval

Whether or not the study included human or animal subjects.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singamaneni, K.K., Budati, A.K. & Bikku, T. An Efficient Q-KPABE Framework to Enhance Cloud-Based IoT Security and Privacy. Wireless Pers Commun (2024). https://doi.org/10.1007/s11277-024-10908-8

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11277-024-10908-8

Keywords

Navigation