Abstract
Security is one of the major challenges in the field of sensor cloud. There is a need to implement security over sensor cloud using a technique which involves fine-grained access in virtualized wireless sensor networks. The existing security model to secure the data transmission and stored data at the sensor-cloud environment uses different encryption techniques, but its effectiveness, efficiency, and performance can be further increased. Earlier approaches provided fine-grained access such as Ciphertext-Policy Attribute-Based Encryption (CP-ABE) which involves some complex computations. In this paper, we proposed a security model based on Elliptic Curve Encryption (ECC) and attributes to ensure the overall security of sensor data that guarantees the confidentiality and integrity. It also provides a fine-grained access control. The proposed approach reduces the overall computational overhead as compared to other existing approaches.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Naik, A. K., & Dwivedi, R. K. (2016). A review on use of data mining methods in wireless sensor network. International Journal of Current Engineering and Scientific Research-IJCESR, 3(12), 13–20.
Dwivedi, R. K., Tiwari, R., Rani, D., & Shadab, S. (2012). Modified reliable energy aware routing protocol for wireless sensor network. International Journal of Computer Science & Engineering Technology-IJCSET, 3(4), 114–118.
Verma, K., & Dwivedi, R. K. (2016). A review on energy efficient protocols in wireless sensor networks. International Journal of Current Engineering and Scientific Research-IJCESR, 3(12), 28–34.
Kumar, P., Kumar, R., Kumar, S., & Dwivedi, R. K. (2010). Improved modified reverse AODV protocol. International Journal of Computer Applications-IJCA, 12(4), 22–26.
Dwivedi, R. K., Sharma, P., & Kumar, R. (2018). Detection and prevention analysis of wormhole attack in wireless sensor network. In 2018 8th IEEE international conference on cloud computing, data science & engineering (Confluence), Noida, India (pp. 727–732).
Khan, I., Belqasmi, F., Glitho, R., Crespi, N., Morrow, M., & Polakos, P. (2015). Wireless sensor network virtualization: A survey. IEEE Communications Surveys & Tutorials, 553–576.
Verma, K., & Dwivedi, R. K. (2017). AREDDP: Advance reliable and efficient data dissemination protocol in wireless sensor networks. In Proceeding of 4th IEEE International Conference on Innovations in Information, Embedded and Communication System-ICIIECS’17, Tamil Nadu, India (pp. 04–07).
Sensor-Cloud. http://sensorcloud.com/system-overview.
Dwivedi, R. K., Saran, M., & Kumar, R. (2019). A survey on security over sensor-cloud. In 2019 9th IEEE international conference on cloud computing, data science & engineering (Confluence), Noida, India (pp. 31–37).
Dwivedi, R. K., Singh, S., & Kumar, R. (2019). Integration of wireless sensor networks with cloud: A review. In 2019 9th IEEE international conference on cloud computing, data science & engineering (Confluence), Noida, India (pp. 115–120).
Dwivedi, R. K., & Kumar, R. (2018). Sensor cloud: Integrating wireless sensor networks with cloud computing. In 5th IEEE Uttar Pradesh section international conference on electrical, electronics and computer engineering (UPCON), Gorakhpur, India (pp. 820–825).
Zhou, M., Zhang, R., Xie, W., Qian, W., & Zhou, A. (2010). Security and privacy in the cloud: A survey. In Sixth international conference on semantics knowledge and grid (pp. 105–112).
Alamri, A., Ansari, W. S., Hassan, M. M., Hossain, M. S., Alelaiwi, A., & Hossain, M. A. (2013). A survey on sensor-cloud: Architecture, applications, and approaches. International Journal of Distributed Sensor Networks, 917–923.
Islam, M. M., Hassan, M. M., Lee, G. W., & Huh, E. N.: A survey on virtualization of wireless sensor networks. Sensors, 2175–2207 (2012).
Thilakanathan, D., Chenb, S., Nepal, S., Calvo, R., & Alemb, L. (2014). A platform for secure monitoring and sharing of generic health data in the Cloud. Future Generation Computer Systems, 102–113.
Tu, S., Niu, S., Li, H., Xiao-ming, Y., & Li, M. (2012). Fine-grained access control and revocation for sharing data on clouds. In 26th international parallel and distributed processing symposium workshops and PhD forum (pp. 2146–2155).
Chandrasekaran, B., & Balakrishnan, R. (2016). Efficient pairing computation for attribute based encryption using MBNR for big data in cloud. In 2nd international conference on applied and theoretical computing and communication technology (pp. 243–247).
Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems, 131–143.
Pussewalage, H. S. G., Oleshchuk, V. (2016). A patient-centric attribute based access control scheme for secure sharing of personal health records using cloud computing. In 2nd international conference on collaboration and internet computing (pp. 46–53).
Tran, D. H., Nguyen, H. L., & Zha, W. (2011). Towards security in sharing data on cloud based social networks. In 8th international conference on information, communications and signal processing (pp. 1–5).
Hung, N. T., Giang, D. H., Keong, N. W., & Zhu, H. (2012). Cloud-enabled data sharing model. In IEEE international conference on intelligence and security informatics.
Bethencourt, J., Sahai, A., & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In Symposium on security and privacy (pp. 220–239).
Sayantani, S. (2015). Secure sensor data management model in a sensor-cloud integration environment. In Applications and innovations in mobile computing (pp. 325–332).
Sharma, P., & Dwivedi, R. K. (2019). Detection of high transmission power based wormhole attack using received signal strength indicator. In S. Verma, R. Tomar, B. Chaurasia, V. Singh, & J. Abawajy (Eds.), Communication, Networks and Computing, CNC 2018. Communications in Computer and Information Science (Vol. 839, pp. 142–152). Singapore: Springer.
Dwivedi, R. K., Sharma, P., & Kumar, R. (2018). A scheme for detection of high transmission power based wormhole attack. In 2018 5th IEEE Uttar Pradesh section international conference on electrical, electronics and computer engineering (UPCON), Gorakhpur, India (pp. 826–831).
Dwivedi, R. K., Pandey, S., & Kumar, R. (2018). A study on machine learning approaches for outlier detection in wireless sensor network. In 2018 8th IEEE international conference on cloud computing, data science & engineering (Confluence), Noida, India (pp. 189–192).
Yang, Y., & Zhang, Y. (2011). A generic scheme for secure data sharing in cloud. In 40th international conference on parallel processing workshops.
Li, J., Zhao, G., Chen, X., Xie, D., Rong, C., Li, W., et al. (2010). Fine-grained data access control systems with user accountability in cloud computing. In IEEE second international conference on cloud computing technology and science (pp. 89–96).
Goyal, V., Pandey, O., Sahai, A., & Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In 13th ACM conference on computer and communications security (pp. 89–98 2006.
Yang, K., Han, Q., Li, H., Zheng, K., Su, Z., & Shen, X. (2017). An efficient and fine-grained big data access control scheme with privacy-preserving policy. IEEE Internet of Things Journal, 563–571.
Odelu, V., & Das, A. K. (2016). Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography. Security and Communication Networks, 4048–4059.
Lauter, K. (2004). The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications, 62–67.
Chhabra, A., & Arora, S. (2017). An elliptic curve cryptography based encryption scheme for securing the cloud against eavesdropping attacks. In International conference on collaboration and internet computing (pp. 261–269).
Gupta, D. S., & Biswas, G. P. (2017). A secure cloud storage using ECC-based homomorphic encryption. In International journal of information security and privacy (pp. 550–578).
Pérez, S., Rotondi, D., Pedone, D., Straniero, L., Núñez, M. J., & Gigante, F. (2017). Towards the CP-ABE application for privacy-preserving secure data sharing in IoT contexts. In International conference on innovative mobile and internet services in ubiquitous computing (pp. 917–926).
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Saran, M., Dwivedi, R.K., Kumar, R. (2020). Attribute-Based Elliptic Curve Encryption for Security in Sensor Cloud. In: Kolhe, M., Tiwari, S., Trivedi, M., Mishra, K. (eds) Advances in Data and Information Sciences. Lecture Notes in Networks and Systems, vol 94. Springer, Singapore. https://doi.org/10.1007/978-981-15-0694-9_42
Download citation
DOI: https://doi.org/10.1007/978-981-15-0694-9_42
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0693-2
Online ISBN: 978-981-15-0694-9
eBook Packages: EngineeringEngineering (R0)