TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoT
The convergence of software-defined networking (SDN) and the Internet of Things (IoT) provides a scalable method for handling the considerable volumes of data produced by IoT devices. However, the lack of appropriate security measures can lead to unauthorized access to sensitive data, potential brea...
Saved in:
| Main Authors: | , , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2024-01-01
|
| Series: | IET Information Security |
| Online Access: | http://dx.doi.org/10.1049/2024/8059692 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850171354894041088 |
|---|---|
| author | Jiamin Hu Zhonghua Shen Kefei Chen Yuying Liu Qian Meng Fuqun Wang Yong Liu |
| author_facet | Jiamin Hu Zhonghua Shen Kefei Chen Yuying Liu Qian Meng Fuqun Wang Yong Liu |
| author_sort | Jiamin Hu |
| collection | DOAJ |
| description | The convergence of software-defined networking (SDN) and the Internet of Things (IoT) provides a scalable method for handling the considerable volumes of data produced by IoT devices. However, the lack of appropriate security measures can lead to unauthorized access to sensitive data, potential breaches, and privacy violations, as well as time-consuming and inefficient data retrieval methods in SDN-IoT systems that require decrypting the entire dataset. To address these challenges, this article proposes the time-attribute-based access control scheme in SDN-IoT (TAAC). The TAAC scheme combines ciphertext-policy attribute-based encryption with a novel time-attribute-based access tree to ensure fine-grained access control on time and attributes, enabling secure ciphertext interaction and information sharing across domains. Furthermore, the TAAC scheme also incorporates searchable encryption, which enhances the efficiency of data retrieval. By implementing searchable encryption techniques, the data receiver can generate trapdoors to search and retrieve specific encrypted data without the need to decrypt the entire dataset. In summary, the TAAC scheme improves storage efficiency and computation, enhances scalability, and provides robust security, offering an efficient and secure solution for ciphertext sharing in SDN-IoT environments. Experimental results have demonstrated that the TAAC scheme shows excellent performance and outperforms other attribute-based searchable encryption algorithms. |
| format | Article |
| id | doaj-art-9cff21de61ac488e8ed5d7b739e265d7 |
| institution | OA Journals |
| issn | 1751-8717 |
| language | English |
| publishDate | 2024-01-01 |
| publisher | Wiley |
| record_format | Article |
| series | IET Information Security |
| spelling | doaj-art-9cff21de61ac488e8ed5d7b739e265d72025-08-20T02:20:18ZengWileyIET Information Security1751-87172024-01-01202410.1049/2024/8059692TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoTJiamin Hu0Zhonghua Shen1Kefei Chen2Yuying Liu3Qian Meng4Fuqun Wang5Yong Liu6School of MathematicsSchool of MathematicsSchool of MathematicsKey Laboratory of Cryptography of Zhejiang ProvinceSchool of MathematicsSchool of MathematicsSchool of Information Science and TechnologyThe convergence of software-defined networking (SDN) and the Internet of Things (IoT) provides a scalable method for handling the considerable volumes of data produced by IoT devices. However, the lack of appropriate security measures can lead to unauthorized access to sensitive data, potential breaches, and privacy violations, as well as time-consuming and inefficient data retrieval methods in SDN-IoT systems that require decrypting the entire dataset. To address these challenges, this article proposes the time-attribute-based access control scheme in SDN-IoT (TAAC). The TAAC scheme combines ciphertext-policy attribute-based encryption with a novel time-attribute-based access tree to ensure fine-grained access control on time and attributes, enabling secure ciphertext interaction and information sharing across domains. Furthermore, the TAAC scheme also incorporates searchable encryption, which enhances the efficiency of data retrieval. By implementing searchable encryption techniques, the data receiver can generate trapdoors to search and retrieve specific encrypted data without the need to decrypt the entire dataset. In summary, the TAAC scheme improves storage efficiency and computation, enhances scalability, and provides robust security, offering an efficient and secure solution for ciphertext sharing in SDN-IoT environments. Experimental results have demonstrated that the TAAC scheme shows excellent performance and outperforms other attribute-based searchable encryption algorithms.http://dx.doi.org/10.1049/2024/8059692 |
| spellingShingle | Jiamin Hu Zhonghua Shen Kefei Chen Yuying Liu Qian Meng Fuqun Wang Yong Liu TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoT IET Information Security |
| title | TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoT |
| title_full | TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoT |
| title_fullStr | TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoT |
| title_full_unstemmed | TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoT |
| title_short | TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoT |
| title_sort | taac secure and efficient time attribute based access control scheme in sdn iot |
| url | http://dx.doi.org/10.1049/2024/8059692 |
| work_keys_str_mv | AT jiaminhu taacsecureandefficienttimeattributebasedaccesscontrolschemeinsdniot AT zhonghuashen taacsecureandefficienttimeattributebasedaccesscontrolschemeinsdniot AT kefeichen taacsecureandefficienttimeattributebasedaccesscontrolschemeinsdniot AT yuyingliu taacsecureandefficienttimeattributebasedaccesscontrolschemeinsdniot AT qianmeng taacsecureandefficienttimeattributebasedaccesscontrolschemeinsdniot AT fuqunwang taacsecureandefficienttimeattributebasedaccesscontrolschemeinsdniot AT yongliu taacsecureandefficienttimeattributebasedaccesscontrolschemeinsdniot |