Skip to main content

Attribute-Based Encryption for Preserving Smart Home Data Privacy

  • Conference paper
  • First Online:
Enhanced Quality of Life and Smart Living (ICOST 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10461))

Included in the following conference series:

Abstract

Cloud Computing is emerging as the new trending technology for storing, sharing and processing data. Smart home is one of the Internet of Things (IoT) applications that is following this trend. However, sensors and smart devices are generating data that may reveal personal information about home inhabitants. Therefore, outsourcing sensed data from smart home to the cloud is raising serious privacy concerns. In particular, when untrusted third party cloud services are accessing personal identifiable information (PII) beyond their collection purpose. One privacy preserving approach consists of encrypting the data, before it is outsourced to the cloud, according to user settings. In this paper, we target preserving data privacy of smart home inhabitants. For this purpose, we proposed an architecture integrating attribute based encryption (ABE) schemes to the Smart Home Middleware ‘Openhab’. To evaluate our framework, we conducted experiments to measure the performances and the overheads introduced by the proposed privacy preserving solution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wilbanks, L.: The impact of personally identifiable information. IT Prof. 9, 62–64 (2007)

    Google Scholar 

  2. Gartner: Seven cloud-computing security risks. http://www.infoworld.com/article/2652198/security/gartner-seven-cloud-computing-security-risks.html. Accessed 20 Mar 2017

  3. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), pp. 89–98. ACM, New York (2006)

    Google Scholar 

  4. The open home automation bus (openhab). http://www.openhab.org/. Accessed 20 Mar 2017

  5. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP 2007). IEEE Computer Society, Washington, DC (2007)

    Google Scholar 

  6. Stankovic, J.A.: Research directions for the Internet of Things. IEEE Internet Things J. 1, 3–9 (2014)

    Article  Google Scholar 

  7. Razzaque, M.A., Milojevic-Jevric, M., Palade, A., Clarke, S.: Middleware for Internet of Things: a survey. IEEE Internet Things J. 3, 70–95 (2016)

    Article  Google Scholar 

  8. Fernandes, E., Jung, J., Prakash, A.: Security analysis of emerging smart home applications. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 636–654, May 2016

    Google Scholar 

  9. Marin, A., Mueller, W., Schaefer, R., Almenarez, F., Diaz, D., Ziegler, M.: Middleware for secure home access and control. In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops 2007), pp. 489–494, March 2007

    Google Scholar 

  10. Moncrieff, S., Venkatesh, S., West, G.: Dynamic privacy in a smart house environment. In: 2007 IEEE International Conference on Multimedia and Expo, pp. 2034–2037, July 2007

    Google Scholar 

  11. Jung, M., Kienesberger, G., Granzer, W., Unger, M., Kastner, W.: Privacy enabled web service access control using SAML and XACML for home automation gateways. In: 2011 International Conference for Internet Technology and Secured Transactions, pp. 584–591, December 2011

    Google Scholar 

  12. Henze, M., Hummen, R., Matzutt, R., Wehrle, K.: A trust point-based security architecture for sensor data in the cloud. In: Krcmar, H., Reussner, R., Rumpe, B. (eds.) Trusted Cloud Computing, pp. 77–106. Springer, Cham (2014). doi:10.1007/978-3-319-12718-7_6

    Google Scholar 

  13. Henze, M., Hermerschmidt, L., Kerpen, D., Häußling, R., Rumpe, B., Wehrle, K.: A comprehensive approach to privacy in the cloud-based Internet of Things. Futur. Gener. Comput. Syst. 56, 701–718 (2016)

    Article  Google Scholar 

  14. Liu, J., Huang, X., Liu, J.K.: Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption. Futur. Gener. Comput. Syst. 52, 67–76 (2015). Special Section: Cloud Computing: Security, Privacy and Practice

    Article  Google Scholar 

  15. Ribeiro, R., Santin, A., Abreu, V., Marynowski, J., Viegas, E.: Providing security and privacy in smart house through mobile cloud computing. In: 2016 8th IEEE Latin-American Conference on Communications (LATINCOM), pp. 1–6, November 2016

    Google Scholar 

  16. Kumar, P., Gurtov, A., Iinatti, J., Ylianttila, M., Sain, M.: Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sens. J. 16, 254–264 (2016)

    Article  Google Scholar 

  17. Yao, X., Chen, Z., Tian, Y.: A lightweight attribute-based encryption scheme for the Internet of Things. Futur. Gener. Comput. Syst. 49, 104–112 (2015)

    Article  Google Scholar 

  18. Charm: A tool for rapid cryptographic prototyping. http://charm-crypto.com/. Accessed 20 Mar 2017

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rasel Chowdhury .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Chowdhury, R., Ould-Slimane, H., Talhi, C., Cheriet, M. (2017). Attribute-Based Encryption for Preserving Smart Home Data Privacy. In: Mokhtari, M., Abdulrazak, B., Aloulou, H. (eds) Enhanced Quality of Life and Smart Living. ICOST 2017. Lecture Notes in Computer Science(), vol 10461. Springer, Cham. https://doi.org/10.1007/978-3-319-66188-9_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-66188-9_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-66187-2

  • Online ISBN: 978-3-319-66188-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics