Abstract
The study attempts to do a thorough analysis of existing research papers, conference papers, and other pertinent publications related to Attribute-Based Encryption for IoT. Due to the variety and dynamism of connected devices and data, the Internet of Things (IoT) poses new security issues. With the aim of safeguarding IoT environments, the advanced cryptography technique Attribute-Based Encryption (ABE) facilitates fine-grained access control according to certain attributes. Traditional access control strategies frequently rely on user identities or roles, which in some circumstances can be rigid and difficult to manage. These restrictions are addressed by Attribute-Based Encryption (ABE), which allows access to data depending on certain attributes. In-depth analysis of ABE in the context of IoT is provided in this paper, starting with its foundational ideas. The review employs to locate, choose, and study the literature while providing insights into security challenges, importance of access control, ABE variants and applicability for IoT, ABE security models, ABE libraries or frameworks, and conclusion with potential future directions. This review is useful for researchers or academicians working in the field of IoT security using ABE scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hersent O, David B, Omar E (2011) The internet of things: key applications and protocols. https://doi.org/10.1002/9781119958352
Perera C, Liu CH, Jayawardena S, Chen M (2015) A survey on the internet of things from an industrial market perspective. IEEE Access 2:1660–1679. https://doi.org/10.1109/ACCESS.2015.2389854
Nasiraee H, Ashouri-Talouki M (2020) Anonymous decentralized attribute-based access control for cloud-assisted IoT. Futur Gener Comput Syst 110:45–56. https://doi.org/10.1016/j.future.2020.04.011
Görmüş S, Aydın H, Ulutaş G (2018) Security for the internet of things: a survey of existing mechanisms, protocols and open research issues. J Fac Eng Architect Gazi Univ 33(4):1247–1272
Mahmoud R, Yousuf T, Aloul F, Zualkernan I (2016) Internet of things (IoT) security: current status, challenges and prospective measures”. 2015 10th international conference for internet technology and secured transactions. ICITST 2015:336–341. https://doi.org/10.1109/ICITST.2015.7412116
Han Y (2019) Attribute-based encryption with adaptive policy. Soft Comput 23:4009–4017. https://doi.org/10.1007/s00500-018-3370-z
Sahai A, Waters B (2005) Fuzzy identity based encryption. In: Advances in cryptology—Eurocrypt, vol 3494 of LNCS, Springer, pp 457–473
Vipul G, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the ACM conference on computer and communications security, pp 89–98. https://doi.org/10.1145/1180405.1180418
Attrapadung N, Herranz J, Laguillaumie F, Libert B, De Panafieu E, Ràfols C (2012) Attribute-based encryption schemes with constant-size ciphertexts. Theoret Comput Sci 422:15–38. https://doi.org/10.1016/j.tcs.2011.12.004
Bethencourt J, Amit S, Brent W (2007) Ciphertext-policy attribute-based encryption. In: Proceedings—IEEE symposium on security and privacy, pp 321–334. https://doi.org/10.1109/SP.2007.11
Balu A, Kuppusamy K (2014) An expressive and provably secure ciphertext-policy attribute-based encryption. Inform Sci 276(subaward 641):354–362. https://doi.org/10.1016/j.ins.2013.12.027.
Shruti SR, Sah DK, Gianini G (2023) Attribute-based encryption schemes for next generation wireless IoT networks: a comprehensive survey. Sensors 23(13):5921. https://doi.org/10.3390/s23135921
Chiquito A, Bodin U, Schelen O (2023) Attribute-based approaches for secure data sharing in industrial contexts. IEEE Access 11:10180–10195. https://doi.org/10.1109/ACCESS.2023.3240000
Arshad H, Johansen C, Owe O, Picazo-Sanchez P, Schneider G (2022) Semantic attribute-based encryption: a framework for combining ABE schemes with semantic technologies. Inf Sci 616:558–576. https://doi.org/10.1016/j.ins.2022.10.132
Lee E, Young DS, Se RO, Young GK (2021) A survey on standards for interoperability and security in the internet of things. IEEE Commun Surv Tut 23(2):1020–1047. https://doi.org/10.1109/COMST.2021.3067354
Koo J, Young GK (2021) Interoperability requirements for a smart city. In: Proceedings of the ACM symposium on applied computing, pp 690–698. https://doi.org/10.1145/3412841.3441948
Bruhadeshwar B, Ray I (2018) Attribute-based encryption: applications and future directions. lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics). Vol. 11170 LNCS. Springer International Publishing. https://doi.org/10.1007/978-3-030-04834-1_18
Alfredo R, Danezis G (2011) Privacy-preserving smart metering. In: Proceedings of the ACM conference on computer and communications security, pp 49–60. https://doi.org/10.1145/2046556.2046564
Jammula M, Vakamulla VM, Kondoju SK (2022) Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system. Connect Sci. https://doi.org/10.1080/09540091.2022.2124957
Phuong X, Viet T, Ning R, Xin X, Wu H (2018) Puncturable attribute-based encryption for secure data delivery in the internet of things. In: Proceedings—IEEE INFOCOM 2018, pp 1511–1519. https://doi.org/10.1109/INFOCOM.2018.8485909
Ge C, Susilo W, Baek J, Liu Z, Xia J, Fang L (2022) Revocable attribute-based encryption with data integrity in clouds. IEEE Trans Depend Sec Comput 19(5):2864–2872. https://doi.org/10.1109/TDSC.2021.3065999
Liu Y, Shengwei X, Ziyan Y (2023) A lightweight CP-ABE scheme with direct attribute revocation for vehicular ad hoc network. Entropy 25(7):979. https://doi.org/10.3390/e25070979
Kennedy E, Jang B, Wook Kim J (2021) CESCR: CP-ABE for efficient and secure sharing of data in collaborative ehealth with revocation and no dummy attribute. PLoS ONE 16. https://doi.org/10.1371/journal.pone.0250992
Hur J (2013) Attribute-based secure data sharing with hidden policies in smart grid. IEEE Trans Parallel Distrib Syst 24(11):2171–2180. https://doi.org/10.1109/TPDS.2012.61
Shen X, Chuanhe H, Danxin W, Jiaoli S (2021) A privacy-preserving attribute-based encryption system for data sharing in smart cities. Wireless Commun Mob Comput.https://doi.org/10.1155/2021/6686675
Rasori M, La Manna M, Perazzo P, Dini G (2022) A survey on attribute-based encryption schemes suitable for the internet of things. IEEE Internet Things J 9(11):8269–8290. https://doi.org/10.1109/JIOT.2022.3154039
Tamizharasi GS, Balamurugan B, Aarthy SL (2016) Scalable and efficient attribute based encryption scheme for point to multipoint communication in cloud computing. In: Proceedings of the international conference on inventive computation technologies, ICICT 2016, pp 1. https://doi.org/10.1109/INVENTIVE.2016.7823292
Taha MB, Talhi C, Ould-Slimane H (2019) Performance evaluation of cp-abe schemes under constrained devices. Procedia Comput Sci 155:425–432. https://doi.org/10.1016/j.procs.2019.08.059
Ambrosin M, Anzanpour A, Conti M, Dargahi T, Moosavi SR, Rahmani AM, Liljeberg P (2016) On the feasibility of attribute-based encryption on internet of things devices. IEEE Micro 36(6):25–35. https://doi.org/10.1109/MM.2016.101
Wang X, Jianqing Z, Eve M, Schooler MI (2014) Performance evaluation of attribute-based encryption: toward data privacy in the IoT. In: 2014 IEEE international conference on communications, ICC 2014, pp 725–730. https://doi.org/10.1109/ICC.2014.6883405
Guo F, Yi M, Willy S, Duncan SW, Vijay V (2014) CP-ABE with constant-size keys for lightweight devices. IEEE Transact Inform Foren Secur 9(5):763–771. https://doi.org/10.1109/TIFS.2014.2309858
Asim M, Milan P, Tanya I (2014) Attribute-based encryption with encryption and decryption outsourcing. In: Proceedings of 12th Australian information security management conference, AISM 2014, pp 21–28. https://doi.org/10.4225/75/57b65cc3343d0
Zhang J, Xin Y, Gao Y, Lei X, Yang Y (2021) Secure ABE scheme for access management in blockchain-based IoT. IEEE Access 9:54840–54849. https://doi.org/10.1109/ACCESS.2021.3071031
Fun TS, Samsudin A (2017) Attribute based encryption—a data centric approach for securing internet of things (IoT). Adv Sci Lett 23(5):4219–4223. https://doi.org/10.1166/asl.2017.8315
Sadeeq Mohammed AM, Subhi RM, Zeebaree RQ, Sarkar HA, Karwan J (2018) Internet of things security: a survey. In: ICOASE 2018—international conference on advanced science and engineering, pp 162–66. https://doi.org/10.1109/ICOASE.2018.8548785
Zhang Y, Zheng D, Deng RH (2018) Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet Things J 5(3):2130–2145. https://doi.org/10.1109/JIOT.2018.2825289
Imam R, Kumar K, Raza SM, Sadaf R, Anwer F, Fatima N, Nadeem M, Abbas M, Rahman O (2022) A systematic literature review of attribute based encryption in health services. J King Saud Univ Comput Inform Sci 34(9):6743–6774. https://doi.org/10.1016/j.jksuci.2022.06.018
Yang W, Zhitao G (2019) An efficient attribute based encryption scheme in smart grid. Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in Bioinformatics) 11982 LNCS: 159–72. https://doi.org/10.1007/978-3-030-37337-5_13
Li T, Jiawei Z, Yanbo Y, Wei Q, Yangxu L (2021) Auditable and times limitable secure data access control for cloud-based industrial internet of things. J Netw Netw Appl 1(3):129–138. https://doi.org/10.33969/j-nana.2021.010306
Karankar N, Seth A (2023) A comprehensive survey on internet of things security: challenges and solutions. Lect Notes Data Eng Commun Technol 166:711–728. https://doi.org/10.1007/978-981-99-0835-6_51
Sajid A, Shah SW, Magsi T (2022) Comprehensive survey on smart cities architectures and protocols. EAI Endors Transact Smart Cities 6(18):e5. https://doi.org/10.4108/eetsc.v6i18.2065
Fawaz K, Shin KG (2019) Security and privacy in the internet of things. Computer 52(4):40–49. https://doi.org/10.1109/MC.2018.2888765
Cui H, Deng RH, Wang G (2019) An Attribute-based framework for secure communications in vehicular ad hoc networks. IEEE/ACM Trans Netw 27(2):721–733. https://doi.org/10.1109/TNET.2019.2894625
Utomo IS, Celine MP, Daniel JVM, Bakti AJ (2022) A systematic literature review of privacy, security, and challenges on applying IoT to create smart home. In: Proceedings—IEIT 2022: 2022 international conference on electrical and information technology, pp 154–159. https://doi.org/10.1109/IEIT56384.2022.9967907
Chowdhury R, Hakima OS, Chamseddine T, Mohamed C (2017) Attribute-based encryption for preserving smart home data privacy. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10461 LNCS, pp 185–97. https://doi.org/10.1007/978-3-319-66188-9_16
Chukkapalli S, Laya SS, Piplai A, Mittal S, Gupta M, Joshi A (2020) A smart-farming ontology for attribute based access control. In: Proceedings—2020 IEEE 6th intl conference on big data security on cloud, BigDataSecurity 2020, 2020 IEEE intl conference on high performance and smart computing, HPSC 2020 and 2020 IEEE Intl conference on intelligent data and security, IDS 2020, pp 29–34. https://doi.org/10.1109/BigDataSecurity-HPSC-IDS49724.2020.00017
Ferrag MA, Shu L, Yang X, Derhab A, Maglaras L (2020) Security and privacy for green IoT-based agriculture: review, blockchain solutions, and challenges. IEEE Access 8:32031–32053. https://doi.org/10.1109/ACCESS.2020.2973178
Huan L, Xueyan L, Ruirui S, Linpeng L (2023) Privacy-preserving attribute-based educational service recommendation in online education system. In: Proceedings of the 2022 international conference on computer science, information engineering and digital economy (CSIEDE 2022) 103, pp 826–38. https://doi.org/10.2991/978-94-6463-108-1_92
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
More, K.D., Pramod, D. (2024). Attribute-Based Encryption for the Internet of Things: A Review. In: Sharma, H., Shrivastava, V., Tripathi, A.K., Wang, L. (eds) Communication and Intelligent Systems. ICCIS 2023. Lecture Notes in Networks and Systems, vol 968. Springer, Singapore. https://doi.org/10.1007/978-981-97-2079-8_26
Download citation
DOI: https://doi.org/10.1007/978-981-97-2079-8_26
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-2078-1
Online ISBN: 978-981-97-2079-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)