Cite Article

Secure Data Sensor In Environmental Monitoring System Using Attribute-Based Encryption With Revocation

Choose citation format

BibTeX

@article{IJASEIT2175,
   author = {- Munsyi and Amang Sudarsono and M. Udin Harun Al Rasyid},
   title = {Secure Data Sensor In Environmental Monitoring System Using Attribute-Based Encryption With Revocation},
   journal = {International Journal on Advanced Science, Engineering and Information Technology},
   volume = {7},
   number = {2},
   year = {2017},
   pages = {609--624},
   keywords = {wireless sensor networks; environment monitoring; CP-ABE; user revocation.},
   abstract = {Wireless sensor networks in internet of thing era have many applications, one of them for environment system, in environmental monitoring system everybody can access data anytime and anywhere. Information was collected using wireless sensor network, all of the data will be sent and stored in the data center. All of data in the data center can be accessed by users through HTTP protocol using a laptop, smartphone and Personal computer. The data in the data center must be secured and the data should be protected from the illegal access by the users from the environment monitoring. To secure the data from the illegal access by the user then the environment monitoring required a security with revocation aspect and encryption the data. CP-ABE (Ciphertext-Policy Attribute-Based Encryption) becomes a solution for this issue, to protect the sensor data and revoke the user. We propose a secure system using CP-ABE with user revocation for protecting the data in data center. Our system is not only encrypting the data sensor, but also revoke to the user. Our experiments system using CP-ABE showed the result for secure the sensor data and revoked the user who does not have the access rights. there are only 2 second processing time for revocation check users.  },
   issn = {2088-5334},
   publisher = {INSIGHT - Indonesian Society for Knowledge and Human Development},
   url = {http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=2175},
   doi = {10.18517/ijaseit.7.2.2175}
}

EndNote

%A Munsyi, -
%A Sudarsono, Amang
%A Al Rasyid, M. Udin Harun
%D 2017
%T Secure Data Sensor In Environmental Monitoring System Using Attribute-Based Encryption With Revocation
%B 2017
%9 wireless sensor networks; environment monitoring; CP-ABE; user revocation.
%! Secure Data Sensor In Environmental Monitoring System Using Attribute-Based Encryption With Revocation
%K wireless sensor networks; environment monitoring; CP-ABE; user revocation.
%X Wireless sensor networks in internet of thing era have many applications, one of them for environment system, in environmental monitoring system everybody can access data anytime and anywhere. Information was collected using wireless sensor network, all of the data will be sent and stored in the data center. All of data in the data center can be accessed by users through HTTP protocol using a laptop, smartphone and Personal computer. The data in the data center must be secured and the data should be protected from the illegal access by the users from the environment monitoring. To secure the data from the illegal access by the user then the environment monitoring required a security with revocation aspect and encryption the data. CP-ABE (Ciphertext-Policy Attribute-Based Encryption) becomes a solution for this issue, to protect the sensor data and revoke the user. We propose a secure system using CP-ABE with user revocation for protecting the data in data center. Our system is not only encrypting the data sensor, but also revoke to the user. Our experiments system using CP-ABE showed the result for secure the sensor data and revoked the user who does not have the access rights. there are only 2 second processing time for revocation check users.  
%U http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=2175
%R doi:10.18517/ijaseit.7.2.2175
%J International Journal on Advanced Science, Engineering and Information Technology
%V 7
%N 2
%@ 2088-5334

IEEE

- Munsyi,Amang Sudarsono and M. Udin Harun Al Rasyid,"Secure Data Sensor In Environmental Monitoring System Using Attribute-Based Encryption With Revocation," International Journal on Advanced Science, Engineering and Information Technology, vol. 7, no. 2, pp. 609-624, 2017. [Online]. Available: http://dx.doi.org/10.18517/ijaseit.7.2.2175.

RefMan/ProCite (RIS)

TY  - JOUR
AU  - Munsyi, -
AU  - Sudarsono, Amang
AU  - Al Rasyid, M. Udin Harun
PY  - 2017
TI  - Secure Data Sensor In Environmental Monitoring System Using Attribute-Based Encryption With Revocation
JF  - International Journal on Advanced Science, Engineering and Information Technology; Vol. 7 (2017) No. 2
Y2  - 2017
SP  - 609
EP  - 624
SN  - 2088-5334
PB  - INSIGHT - Indonesian Society for Knowledge and Human Development
KW  - wireless sensor networks; environment monitoring; CP-ABE; user revocation.
N2  - Wireless sensor networks in internet of thing era have many applications, one of them for environment system, in environmental monitoring system everybody can access data anytime and anywhere. Information was collected using wireless sensor network, all of the data will be sent and stored in the data center. All of data in the data center can be accessed by users through HTTP protocol using a laptop, smartphone and Personal computer. The data in the data center must be secured and the data should be protected from the illegal access by the users from the environment monitoring. To secure the data from the illegal access by the user then the environment monitoring required a security with revocation aspect and encryption the data. CP-ABE (Ciphertext-Policy Attribute-Based Encryption) becomes a solution for this issue, to protect the sensor data and revoke the user. We propose a secure system using CP-ABE with user revocation for protecting the data in data center. Our system is not only encrypting the data sensor, but also revoke to the user. Our experiments system using CP-ABE showed the result for secure the sensor data and revoked the user who does not have the access rights. there are only 2 second processing time for revocation check users.  
UR  - http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=2175
DO  - 10.18517/ijaseit.7.2.2175

RefWorks

RT Journal Article
ID 2175
A1 Munsyi, -
A1 Sudarsono, Amang
A1 Al Rasyid, M. Udin Harun
T1 Secure Data Sensor In Environmental Monitoring System Using Attribute-Based Encryption With Revocation
JF International Journal on Advanced Science, Engineering and Information Technology
VO 7
IS 2
YR 2017
SP 609
OP 624
SN 2088-5334
PB INSIGHT - Indonesian Society for Knowledge and Human Development
K1 wireless sensor networks; environment monitoring; CP-ABE; user revocation.
AB Wireless sensor networks in internet of thing era have many applications, one of them for environment system, in environmental monitoring system everybody can access data anytime and anywhere. Information was collected using wireless sensor network, all of the data will be sent and stored in the data center. All of data in the data center can be accessed by users through HTTP protocol using a laptop, smartphone and Personal computer. The data in the data center must be secured and the data should be protected from the illegal access by the users from the environment monitoring. To secure the data from the illegal access by the user then the environment monitoring required a security with revocation aspect and encryption the data. CP-ABE (Ciphertext-Policy Attribute-Based Encryption) becomes a solution for this issue, to protect the sensor data and revoke the user. We propose a secure system using CP-ABE with user revocation for protecting the data in data center. Our system is not only encrypting the data sensor, but also revoke to the user. Our experiments system using CP-ABE showed the result for secure the sensor data and revoked the user who does not have the access rights. there are only 2 second processing time for revocation check users.  
LK http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=2175
DO  - 10.18517/ijaseit.7.2.2175