TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoT

The convergence of software-defined networking (SDN) and the Internet of Things (IoT) provides a scalable method for handling the considerable volumes of data produced by IoT devices. However, the lack of appropriate security measures can lead to unauthorized access to sensitive data, potential brea...

Full description

Saved in:
Bibliographic Details
Main Authors: Jiamin Hu, Zhonghua Shen, Kefei Chen, Yuying Liu, Qian Meng, Fuqun Wang, Yong Liu
Format: Article
Language:English
Published: Wiley 2024-01-01
Series:IET Information Security
Online Access:http://dx.doi.org/10.1049/2024/8059692
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850171354894041088
author Jiamin Hu
Zhonghua Shen
Kefei Chen
Yuying Liu
Qian Meng
Fuqun Wang
Yong Liu
author_facet Jiamin Hu
Zhonghua Shen
Kefei Chen
Yuying Liu
Qian Meng
Fuqun Wang
Yong Liu
author_sort Jiamin Hu
collection DOAJ
description The convergence of software-defined networking (SDN) and the Internet of Things (IoT) provides a scalable method for handling the considerable volumes of data produced by IoT devices. However, the lack of appropriate security measures can lead to unauthorized access to sensitive data, potential breaches, and privacy violations, as well as time-consuming and inefficient data retrieval methods in SDN-IoT systems that require decrypting the entire dataset. To address these challenges, this article proposes the time-attribute-based access control scheme in SDN-IoT (TAAC). The TAAC scheme combines ciphertext-policy attribute-based encryption with a novel time-attribute-based access tree to ensure fine-grained access control on time and attributes, enabling secure ciphertext interaction and information sharing across domains. Furthermore, the TAAC scheme also incorporates searchable encryption, which enhances the efficiency of data retrieval. By implementing searchable encryption techniques, the data receiver can generate trapdoors to search and retrieve specific encrypted data without the need to decrypt the entire dataset. In summary, the TAAC scheme improves storage efficiency and computation, enhances scalability, and provides robust security, offering an efficient and secure solution for ciphertext sharing in SDN-IoT environments. Experimental results have demonstrated that the TAAC scheme shows excellent performance and outperforms other attribute-based searchable encryption algorithms.
format Article
id doaj-art-9cff21de61ac488e8ed5d7b739e265d7
institution OA Journals
issn 1751-8717
language English
publishDate 2024-01-01
publisher Wiley
record_format Article
series IET Information Security
spelling doaj-art-9cff21de61ac488e8ed5d7b739e265d72025-08-20T02:20:18ZengWileyIET Information Security1751-87172024-01-01202410.1049/2024/8059692TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoTJiamin Hu0Zhonghua Shen1Kefei Chen2Yuying Liu3Qian Meng4Fuqun Wang5Yong Liu6School of MathematicsSchool of MathematicsSchool of MathematicsKey Laboratory of Cryptography of Zhejiang ProvinceSchool of MathematicsSchool of MathematicsSchool of Information Science and TechnologyThe convergence of software-defined networking (SDN) and the Internet of Things (IoT) provides a scalable method for handling the considerable volumes of data produced by IoT devices. However, the lack of appropriate security measures can lead to unauthorized access to sensitive data, potential breaches, and privacy violations, as well as time-consuming and inefficient data retrieval methods in SDN-IoT systems that require decrypting the entire dataset. To address these challenges, this article proposes the time-attribute-based access control scheme in SDN-IoT (TAAC). The TAAC scheme combines ciphertext-policy attribute-based encryption with a novel time-attribute-based access tree to ensure fine-grained access control on time and attributes, enabling secure ciphertext interaction and information sharing across domains. Furthermore, the TAAC scheme also incorporates searchable encryption, which enhances the efficiency of data retrieval. By implementing searchable encryption techniques, the data receiver can generate trapdoors to search and retrieve specific encrypted data without the need to decrypt the entire dataset. In summary, the TAAC scheme improves storage efficiency and computation, enhances scalability, and provides robust security, offering an efficient and secure solution for ciphertext sharing in SDN-IoT environments. Experimental results have demonstrated that the TAAC scheme shows excellent performance and outperforms other attribute-based searchable encryption algorithms.http://dx.doi.org/10.1049/2024/8059692
spellingShingle Jiamin Hu
Zhonghua Shen
Kefei Chen
Yuying Liu
Qian Meng
Fuqun Wang
Yong Liu
TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoT
IET Information Security
title TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoT
title_full TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoT
title_fullStr TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoT
title_full_unstemmed TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoT
title_short TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoT
title_sort taac secure and efficient time attribute based access control scheme in sdn iot
url http://dx.doi.org/10.1049/2024/8059692
work_keys_str_mv AT jiaminhu taacsecureandefficienttimeattributebasedaccesscontrolschemeinsdniot
AT zhonghuashen taacsecureandefficienttimeattributebasedaccesscontrolschemeinsdniot
AT kefeichen taacsecureandefficienttimeattributebasedaccesscontrolschemeinsdniot
AT yuyingliu taacsecureandefficienttimeattributebasedaccesscontrolschemeinsdniot
AT qianmeng taacsecureandefficienttimeattributebasedaccesscontrolschemeinsdniot
AT fuqunwang taacsecureandefficienttimeattributebasedaccesscontrolschemeinsdniot
AT yongliu taacsecureandefficienttimeattributebasedaccesscontrolschemeinsdniot