Advertisement

Attribute-Based Encryption for Preserving Smart Home Data Privacy

  • Rasel ChowdhuryEmail author
  • Hakima Ould-Slimane
  • Chamseddine Talhi
  • Mohamed Cheriet
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10461)

Abstract

Cloud Computing is emerging as the new trending technology for storing, sharing and processing data. Smart home is one of the Internet of Things (IoT) applications that is following this trend. However, sensors and smart devices are generating data that may reveal personal information about home inhabitants. Therefore, outsourcing sensed data from smart home to the cloud is raising serious privacy concerns. In particular, when untrusted third party cloud services are accessing personal identifiable information (PII) beyond their collection purpose. One privacy preserving approach consists of encrypting the data, before it is outsourced to the cloud, according to user settings. In this paper, we target preserving data privacy of smart home inhabitants. For this purpose, we proposed an architecture integrating attribute based encryption (ABE) schemes to the Smart Home Middleware ‘Openhab’. To evaluate our framework, we conducted experiments to measure the performances and the overheads introduced by the proposed privacy preserving solution.

Keywords

Data privacy preserving Attribute-based encryption Applied cryptography Smart home 

References

  1. 1.
    Wilbanks, L.: The impact of personally identifiable information. IT Prof. 9, 62–64 (2007)Google Scholar
  2. 2.
    Gartner: Seven cloud-computing security risks. http://www.infoworld.com/article/2652198/security/gartner-seven-cloud-computing-security-risks.html. Accessed 20 Mar 2017
  3. 3.
    Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), pp. 89–98. ACM, New York (2006)Google Scholar
  4. 4.
    The open home automation bus (openhab). http://www.openhab.org/. Accessed 20 Mar 2017
  5. 5.
    Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP 2007). IEEE Computer Society, Washington, DC (2007)Google Scholar
  6. 6.
    Stankovic, J.A.: Research directions for the Internet of Things. IEEE Internet Things J. 1, 3–9 (2014)CrossRefGoogle Scholar
  7. 7.
    Razzaque, M.A., Milojevic-Jevric, M., Palade, A., Clarke, S.: Middleware for Internet of Things: a survey. IEEE Internet Things J. 3, 70–95 (2016)CrossRefGoogle Scholar
  8. 8.
    Fernandes, E., Jung, J., Prakash, A.: Security analysis of emerging smart home applications. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 636–654, May 2016Google Scholar
  9. 9.
    Marin, A., Mueller, W., Schaefer, R., Almenarez, F., Diaz, D., Ziegler, M.: Middleware for secure home access and control. In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops 2007), pp. 489–494, March 2007Google Scholar
  10. 10.
    Moncrieff, S., Venkatesh, S., West, G.: Dynamic privacy in a smart house environment. In: 2007 IEEE International Conference on Multimedia and Expo, pp. 2034–2037, July 2007Google Scholar
  11. 11.
    Jung, M., Kienesberger, G., Granzer, W., Unger, M., Kastner, W.: Privacy enabled web service access control using SAML and XACML for home automation gateways. In: 2011 International Conference for Internet Technology and Secured Transactions, pp. 584–591, December 2011Google Scholar
  12. 12.
    Henze, M., Hummen, R., Matzutt, R., Wehrle, K.: A trust point-based security architecture for sensor data in the cloud. In: Krcmar, H., Reussner, R., Rumpe, B. (eds.) Trusted Cloud Computing, pp. 77–106. Springer, Cham (2014). doi: 10.1007/978-3-319-12718-7_6 Google Scholar
  13. 13.
    Henze, M., Hermerschmidt, L., Kerpen, D., Häußling, R., Rumpe, B., Wehrle, K.: A comprehensive approach to privacy in the cloud-based Internet of Things. Futur. Gener. Comput. Syst. 56, 701–718 (2016)CrossRefGoogle Scholar
  14. 14.
    Liu, J., Huang, X., Liu, J.K.: Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption. Futur. Gener. Comput. Syst. 52, 67–76 (2015). Special Section: Cloud Computing: Security, Privacy and PracticeCrossRefGoogle Scholar
  15. 15.
    Ribeiro, R., Santin, A., Abreu, V., Marynowski, J., Viegas, E.: Providing security and privacy in smart house through mobile cloud computing. In: 2016 8th IEEE Latin-American Conference on Communications (LATINCOM), pp. 1–6, November 2016Google Scholar
  16. 16.
    Kumar, P., Gurtov, A., Iinatti, J., Ylianttila, M., Sain, M.: Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sens. J. 16, 254–264 (2016)CrossRefGoogle Scholar
  17. 17.
    Yao, X., Chen, Z., Tian, Y.: A lightweight attribute-based encryption scheme for the Internet of Things. Futur. Gener. Comput. Syst. 49, 104–112 (2015)CrossRefGoogle Scholar
  18. 18.
    Charm: A tool for rapid cryptographic prototyping. http://charm-crypto.com/. Accessed 20 Mar 2017

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Rasel Chowdhury
    • 1
    Email author
  • Hakima Ould-Slimane
    • 1
  • Chamseddine Talhi
    • 1
  • Mohamed Cheriet
    • 1
  1. 1.Department of Software Engineering and Information TechnologyÉcole de technologie supérieureMontrealCanada

Personalised recommendations