Skip to main content

Attribute-Based Elliptic Curve Encryption for Security in Sensor Cloud

  • Conference paper
  • First Online:
Advances in Data and Information Sciences

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 94))

  • 1734 Accesses

Abstract

Security is one of the major challenges in the field of sensor cloud. There is a need to implement security over sensor cloud using a technique which involves fine-grained access in virtualized wireless sensor networks. The existing security model to secure the data transmission and stored data at the sensor-cloud environment uses different encryption techniques, but its effectiveness, efficiency, and performance can be further increased. Earlier approaches provided fine-grained access such as Ciphertext-Policy Attribute-Based Encryption (CP-ABE) which involves some complex computations. In this paper, we proposed a security model based on Elliptic Curve Encryption (ECC) and attributes to ensure the overall security of sensor data that guarantees the confidentiality and integrity. It also provides a fine-grained access control. The proposed approach reduces the overall computational overhead as compared to other existing approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Naik, A. K., & Dwivedi, R. K. (2016). A review on use of data mining methods in wireless sensor network. International Journal of Current Engineering and Scientific Research-IJCESR, 3(12), 13–20.

    Google Scholar 

  2. Dwivedi, R. K., Tiwari, R., Rani, D., & Shadab, S. (2012). Modified reliable energy aware routing protocol for wireless sensor network. International Journal of Computer Science & Engineering Technology-IJCSET, 3(4), 114–118.

    Google Scholar 

  3. Verma, K., & Dwivedi, R. K. (2016). A review on energy efficient protocols in wireless sensor networks. International Journal of Current Engineering and Scientific Research-IJCESR, 3(12), 28–34.

    Google Scholar 

  4. Kumar, P., Kumar, R., Kumar, S., & Dwivedi, R. K. (2010). Improved modified reverse AODV protocol. International Journal of Computer Applications-IJCA, 12(4), 22–26.

    Article  Google Scholar 

  5. Dwivedi, R. K., Sharma, P., & Kumar, R. (2018). Detection and prevention analysis of wormhole attack in wireless sensor network. In 2018 8th IEEE international conference on cloud computing, data science & engineering (Confluence), Noida, India (pp. 727–732).

    Google Scholar 

  6. Khan, I., Belqasmi, F., Glitho, R., Crespi, N., Morrow, M., & Polakos, P. (2015). Wireless sensor network virtualization: A survey. IEEE Communications Surveys & Tutorials, 553–576.

    Google Scholar 

  7. Verma, K., & Dwivedi, R. K. (2017). AREDDP: Advance reliable and efficient data dissemination protocol in wireless sensor networks. In Proceeding of 4th IEEE International Conference on Innovations in Information, Embedded and Communication System-ICIIECS’17, Tamil Nadu, India (pp. 04–07).

    Google Scholar 

  8. Sensor-Cloud. http://sensorcloud.com/system-overview.

  9. Dwivedi, R. K., Saran, M., & Kumar, R. (2019). A survey on security over sensor-cloud. In 2019 9th IEEE international conference on cloud computing, data science & engineering (Confluence), Noida, India (pp. 31–37).

    Google Scholar 

  10. Dwivedi, R. K., Singh, S., & Kumar, R. (2019). Integration of wireless sensor networks with cloud: A review. In 2019 9th IEEE international conference on cloud computing, data science & engineering (Confluence), Noida, India (pp. 115–120).

    Google Scholar 

  11. Dwivedi, R. K., & Kumar, R. (2018). Sensor cloud: Integrating wireless sensor networks with cloud computing. In 5th IEEE Uttar Pradesh section international conference on electrical, electronics and computer engineering (UPCON), Gorakhpur, India (pp. 820–825).

    Google Scholar 

  12. Zhou, M., Zhang, R., Xie, W., Qian, W., & Zhou, A. (2010). Security and privacy in the cloud: A survey. In Sixth international conference on semantics knowledge and grid (pp. 105–112).

    Google Scholar 

  13. Alamri, A., Ansari, W. S., Hassan, M. M., Hossain, M. S., Alelaiwi, A., & Hossain, M. A. (2013). A survey on sensor-cloud: Architecture, applications, and approaches. International Journal of Distributed Sensor Networks, 917–923.

    Google Scholar 

  14. Islam, M. M., Hassan, M. M., Lee, G. W., & Huh, E. N.: A survey on virtualization of wireless sensor networks. Sensors, 2175–2207 (2012).

    Google Scholar 

  15. Thilakanathan, D., Chenb, S., Nepal, S., Calvo, R., & Alemb, L. (2014). A platform for secure monitoring and sharing of generic health data in the Cloud. Future Generation Computer Systems, 102–113.

    Google Scholar 

  16. Tu, S., Niu, S., Li, H., Xiao-ming, Y., & Li, M. (2012). Fine-grained access control and revocation for sharing data on clouds. In 26th international parallel and distributed processing symposium workshops and PhD forum (pp. 2146–2155).

    Google Scholar 

  17. Chandrasekaran, B., & Balakrishnan, R. (2016). Efficient pairing computation for attribute based encryption using MBNR for big data in cloud. In 2nd international conference on applied and theoretical computing and communication technology (pp. 243–247).

    Google Scholar 

  18. Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems, 131–143.

    Google Scholar 

  19. Pussewalage, H. S. G., Oleshchuk, V. (2016). A patient-centric attribute based access control scheme for secure sharing of personal health records using cloud computing. In 2nd international conference on collaboration and internet computing (pp. 46–53).

    Google Scholar 

  20. Tran, D. H., Nguyen, H. L., & Zha, W. (2011). Towards security in sharing data on cloud based social networks. In 8th international conference on information, communications and signal processing (pp. 1–5).

    Google Scholar 

  21. Hung, N. T., Giang, D. H., Keong, N. W., & Zhu, H. (2012). Cloud-enabled data sharing model. In IEEE international conference on intelligence and security informatics.

    Google Scholar 

  22. Bethencourt, J., Sahai, A., & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In Symposium on security and privacy (pp. 220–239).

    Google Scholar 

  23. Sayantani, S. (2015). Secure sensor data management model in a sensor-cloud integration environment. In Applications and innovations in mobile computing (pp. 325–332).

    Google Scholar 

  24. Sharma, P., & Dwivedi, R. K. (2019). Detection of high transmission power based wormhole attack using received signal strength indicator. In S. Verma, R. Tomar, B. Chaurasia, V. Singh, & J. Abawajy (Eds.), Communication, Networks and Computing, CNC 2018. Communications in Computer and Information Science (Vol. 839, pp. 142–152). Singapore: Springer.

    Google Scholar 

  25. Dwivedi, R. K., Sharma, P., & Kumar, R. (2018). A scheme for detection of high transmission power based wormhole attack. In 2018 5th IEEE Uttar Pradesh section international conference on electrical, electronics and computer engineering (UPCON), Gorakhpur, India (pp. 826–831).

    Google Scholar 

  26. Dwivedi, R. K., Pandey, S., & Kumar, R. (2018). A study on machine learning approaches for outlier detection in wireless sensor network. In 2018 8th IEEE international conference on cloud computing, data science & engineering (Confluence), Noida, India (pp. 189–192).

    Google Scholar 

  27. Yang, Y., & Zhang, Y. (2011). A generic scheme for secure data sharing in cloud. In 40th international conference on parallel processing workshops.

    Google Scholar 

  28. Li, J., Zhao, G., Chen, X., Xie, D., Rong, C., Li, W., et al. (2010). Fine-grained data access control systems with user accountability in cloud computing. In IEEE second international conference on cloud computing technology and science (pp. 89–96).

    Google Scholar 

  29. Goyal, V., Pandey, O., Sahai, A., & Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In 13th ACM conference on computer and communications security (pp. 89–98 2006.

    Google Scholar 

  30. Yang, K., Han, Q., Li, H., Zheng, K., Su, Z., & Shen, X. (2017). An efficient and fine-grained big data access control scheme with privacy-preserving policy. IEEE Internet of Things Journal, 563–571.

    Google Scholar 

  31. Odelu, V., & Das, A. K. (2016). Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography. Security and Communication Networks, 4048–4059.

    Google Scholar 

  32. Lauter, K. (2004). The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications, 62–67.

    Google Scholar 

  33. Chhabra, A., & Arora, S. (2017). An elliptic curve cryptography based encryption scheme for securing the cloud against eavesdropping attacks. In International conference on collaboration and internet computing (pp. 261–269).

    Google Scholar 

  34. Gupta, D. S., & Biswas, G. P. (2017). A secure cloud storage using ECC-based homomorphic encryption. In International journal of information security and privacy (pp. 550–578).

    Google Scholar 

  35. Pérez, S., Rotondi, D., Pedone, D., Straniero, L., Núñez, M. J., & Gigante, F. (2017). Towards the CP-ABE application for privacy-preserving secure data sharing in IoT contexts. In International conference on innovative mobile and internet services in ubiquitous computing (pp. 917–926).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Munish Saran , Rajendra Kumar Dwivedi or Rakesh Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Saran, M., Dwivedi, R.K., Kumar, R. (2020). Attribute-Based Elliptic Curve Encryption for Security in Sensor Cloud. In: Kolhe, M., Tiwari, S., Trivedi, M., Mishra, K. (eds) Advances in Data and Information Sciences. Lecture Notes in Networks and Systems, vol 94. Springer, Singapore. https://doi.org/10.1007/978-981-15-0694-9_42

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0694-9_42

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0693-2

  • Online ISBN: 978-981-15-0694-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics