Ciphertext-policy attribute-based encryption for securing IoT devices in fog computing
Proceedings of the 2022 International Conference on Computer, Information and Telecommunication Systems, CITS 2022
School of Engineering
Beijing Natural Science Foundation (No. 4212015) / China Ministry of Education - China Mobile Scientific Research Foundation (No. MCM20200102) / Deanship of Scientific Research at King Khalid University for funding this work through Large Groups Project under grant number RGP.2/201/44
Securing Internet of Things (IoT) devices in fog computing systems can be challenging due to the inherent limitations of IoT devices. For instance, cryptographic primitives, such as attribute-based encryption (ABE) schemes, are computationally expensive for deployment on IoT devices. Thus, ABE is not realistic in facilitating real-Time updates in various applications of IoT. Therefore, attribute-based and multi-Authority encryption schemes are designed that help attribute revocation and computation outsourcing from IoT devices to fog computing servers. The attribute revocation scheme is based on the ciphertext-policy attribute-based encryption (CP-ABE) technique. The CP-ABE scheme allows secret keys between IoT devices and fog nodes to be dynamically generated by incorporating the attribute group keys. Then, the encryption and decryption functions for IoT devices are outsourced to fog nodes, which present the CP-ABE validation.