Secure Data Exchange Using Authenticated Attribute-Based Encdryption with Revocation for Environmental Monitoring

- Munsyi (1), Amang Sudarsono (2), M. Udin Harun Al Rasyid (3)
(1) Politeknik Elektronika Negeri Surabaya PENS), Surabaya, Indonesia
(2) Politeknik Elektronika Negeri Surabaya PENS), Surabaya, Indonesia
(3) Politeknik Elektronika Negeri Surabaya PENS), Surabaya, Indonesia
Fulltext View | Download
How to cite (IJASEIT) :
Munsyi, -, et al. “Secure Data Exchange Using Authenticated Attribute-Based Encdryption With Revocation for Environmental Monitoring”. International Journal on Advanced Science, Engineering and Information Technology, vol. 8, no. 5, Oct. 2018, pp. 1948-55, doi:10.18517/ijaseit.8.5.7223.
Internet of things grown very rapidly, one of them is application smartcity for monitoring the environment. The environmental monitoring use the wireless sensor networks (WSN) technology to collect all of the data. All the data collected by the WSN will be sotred in the Data Center, where all of the data in the Data Center can be accessed by the user everytime and everywhere. The data center without security mechanism is very dangerous because all of data can be tracked and even modified by the users. There are need security mechanism for securing the data and monitoring access from each user. Chipertext Policy Attribute Based-Encryption (CP-ABE) with Authentication and Revocation can become a solution for this problem, where all of data in the data center can be protected with encryption and decryption mechanism. Its jut not protect the data, the security will give a guarantee for originality in the data and can give a control access for user who did the illegal access. The user who did the illegal access will be revoked by the system. Our security mechanism using the CP-ABE and timestamp digital signature using Rivest, Shamir Adleman (RSA) 2048 does not affect to performance of the system.

Nurul Fahmi, M. Udin Harun Al Rasyid, Amang Sudarsono. Adaptive Schedulling for Health Monitoring System Based on the IEEE 802.15.4 Sleep Standart. EMITTER International Journal of Engineering Technology, Vol. 4, No.1, pp. 91-114, 2016.

M. Udin Harun Al Rasyid, Achmad SayfudinAchmad Sayfudin, Arif Basofi, Amang Sudarsono. Development of Semantic Sensor Web for Monitoring Environment Conditions. International Seminar on Intelligent Technology and Its Applications (ISITIA),pp. 607-612, 2016.

M.F.Othmana, K.Shazali. 2012. Wireless Sensor Network Applications: A Study in Environment Monitoring System. International Symposium on Robotics and Intelligent Sensors, pp.1204 - 1210, 2012.

J.Bethencourt, A.Sahai, and B.Waters, Ciphertext-policy Attribute-Based Encryption. IEEE Symposium on Security and Privacy. pp. 321-334, 2007.

Munsyi, Amang Sudarsono, and M.U.H. Al Rasyid, “Secure Data Sensor In Environmental Monitoring System Using Attribute-Based Encryption With Encryption”, International Journal on Advanced Science, Engineering and Information Technology, Vol 7, pp., 2017.

A.Sudarsono, M.Udin Harun Al Rasyid,An Anonymous Authentication System in Wireless Networks Using Verifier-Local Revocation Group Signature Scheme. International Seminar on Intelligent Technology and Its Application Technology, 2016.

Munsyi, Amang Sudarsono, M. Udin Harun Al Rasyid, "Secure Data Sensor Access Using Attribute-Based Encryption With Revocation Environmental Monitoring", Knowledge Creation & Intelligent Computing (KCIC), pp. 73-79, 2016.

K. H. Patel, S.S Patel. 2016, “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing” International Journal for Scientific Research & Development, vol. 4, pp.543-548, 2016.

J.Benthencourt, A.Sahai, and B.Waters. cpabe toolkit in advanced Crypto Software Collection. [Online]. From: http://hms.isi.jhu.edu/acsc/cpabe. [accessed on Oktober 2016].

B.Lynn. PBC (Pairing-Based Cryptography) library. [Online]. From: http://crypto.stanford.edu/pbc. [accessed on Oktober 2016].

M.U.H. Al Rasyid, Bih-Hwang Lee, A.Sudarsono, and Taufiqurrahman, Implementation of Body Temperature and Pulseoximeter Sensors for Wireless Body Area Network. Sensors and Materials, International Journal on Sensor Technology. 27(8), pp. 727-732, 2015.

S.Huda, A.Sudarsono, and T.Harsono, Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network. EMITTER International Journal of Engineering Technology, Vol. 4, No.1 , pp. 115-140, 2016.

M.F.Othmana, K.Shazali, Wireless Sensor Network Applications: A Study in Environment Monitoring System. International Symposium on Robotics and Intelligent Sensors 2012 (IR IS 2012), pp. 1204 - 1210, 2012.

S. Roy, M. Chuah. Secure Data Retrieval Based on Ciphertext Policy Attribute-Based Encryption (CP-ABE) System for the DTNs. Journal of Cryptology, vol. 17, No.4, pp.297-319,2004.

J.H. Chen, Y.T.Wang, and K. Chen, Attribute-Based Key-Insulated Encryption, Journal of Information Science and Engineering, Vol.27, pp. 437-449, 2011.

W. Stalling, Network Security Essentials: Applications and Standards, Prentice Hall Press, 4th edition, ISBN-13: 978-0136108054, 2010.

J.H. Chen, Y.T.Wang, and K. Chen, Attribute-Based Key-Insulated Encryption,Journal of Information Science and Engineering, Vol.27, pp.437-449, 2011.

H. Kwon, D. Kim, C. Hahn, and J. Hur, Secure Authentication using Ciphertext Policy Attribute-Based Encryption in Mobile Multi-hop Networks,Multimedia Tools and Applications,pp.1-15, 2016.

L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker,“Mediated Ciphertext-Policy Attribute-Based Encryption and ItsApplication,” Proc. Int’l Workshop Information Security Applications (WISA ’09), pp. 309-323, 2009.

Koo, D., Hur, J., and Yoon, H. "Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage.", Computers & Electrical Engineering, vol 39, no1, pp 34-46, 2013.

M. Chase and S.S.M. Chow, “Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,”Proc. ACM Conf.Computer and Comm. Security, pp. 121-130, 2009.

A. Lewko, A Sahai and B Waters,“Revocation Systems with Very Small Private Keys”. IEEE Symposium on Security and Privacy 2010, pp. 273-285, 2010.

L. Touati, Y. Challal and A. Bouabdallah, “Cooperative Ciphertext-Policy Attribute-Based Encryption for the Internet of Things”, International Conference on Advanced Networking, Distributed System and Applications. pp.64-69, 2014.

Authors who publish with this journal agree to the following terms:

    1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
    2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
    3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).