Cargando…
Attribute-Based Encryption Schemes for Next Generation Wireless IoT Networks: A Comprehensive Survey
Most data nowadays are stored in the cloud; therefore, cloud computing and its extension—fog computing—are the most in-demand services at the present time. Cloud and fog computing platforms are largely used by Internet of Things (IoT) applications where various mobile devices, end users, PCs, and sm...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10346245/ https://www.ncbi.nlm.nih.gov/pubmed/37447769 http://dx.doi.org/10.3390/s23135921 |
_version_ | 1785073269325430784 |
---|---|
author | Shruti Rani, Shalli Sah, Dipak Kumar Gianini, Gabriele |
author_facet | Shruti Rani, Shalli Sah, Dipak Kumar Gianini, Gabriele |
author_sort | Shruti |
collection | PubMed |
description | Most data nowadays are stored in the cloud; therefore, cloud computing and its extension—fog computing—are the most in-demand services at the present time. Cloud and fog computing platforms are largely used by Internet of Things (IoT) applications where various mobile devices, end users, PCs, and smart objects are connected to each other via the internet. IoT applications are common in several application areas, such as healthcare, smart cities, industries, logistics, agriculture, and many more. Due to this, there is an increasing need for new security and privacy techniques, with attribute-based encryption (ABE) being the most effective among them. ABE provides fine-grained access control, enables secure storage of data on unreliable storage, and is flexible enough to be used in different systems. In this paper, we survey ABE schemes, their features, methodologies, benefits/drawbacks, attacks on ABE, and how ABE can be used with IoT and its applications. This survey reviews ABE models suitable for IoT platforms, taking into account the desired features and characteristics. We also discuss various performance indicators used for ABE and how they affect efficiency. Furthermore, some selected schemes are analyzed through simulation to compare their efficiency in terms of different performance indicators. As a result, we find that some schemes simultaneously perform well in one or two performance indicators, whereas none shines in all of them at once. The work will help researchers identify the characteristics of different ABE schemes quickly and recognize whether they are suitable for specific IoT applications. Future work that may be helpful for ABE is also discussed. |
format | Online Article Text |
id | pubmed-10346245 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-103462452023-07-15 Attribute-Based Encryption Schemes for Next Generation Wireless IoT Networks: A Comprehensive Survey Shruti Rani, Shalli Sah, Dipak Kumar Gianini, Gabriele Sensors (Basel) Article Most data nowadays are stored in the cloud; therefore, cloud computing and its extension—fog computing—are the most in-demand services at the present time. Cloud and fog computing platforms are largely used by Internet of Things (IoT) applications where various mobile devices, end users, PCs, and smart objects are connected to each other via the internet. IoT applications are common in several application areas, such as healthcare, smart cities, industries, logistics, agriculture, and many more. Due to this, there is an increasing need for new security and privacy techniques, with attribute-based encryption (ABE) being the most effective among them. ABE provides fine-grained access control, enables secure storage of data on unreliable storage, and is flexible enough to be used in different systems. In this paper, we survey ABE schemes, their features, methodologies, benefits/drawbacks, attacks on ABE, and how ABE can be used with IoT and its applications. This survey reviews ABE models suitable for IoT platforms, taking into account the desired features and characteristics. We also discuss various performance indicators used for ABE and how they affect efficiency. Furthermore, some selected schemes are analyzed through simulation to compare their efficiency in terms of different performance indicators. As a result, we find that some schemes simultaneously perform well in one or two performance indicators, whereas none shines in all of them at once. The work will help researchers identify the characteristics of different ABE schemes quickly and recognize whether they are suitable for specific IoT applications. Future work that may be helpful for ABE is also discussed. MDPI 2023-06-26 /pmc/articles/PMC10346245/ /pubmed/37447769 http://dx.doi.org/10.3390/s23135921 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Shruti Rani, Shalli Sah, Dipak Kumar Gianini, Gabriele Attribute-Based Encryption Schemes for Next Generation Wireless IoT Networks: A Comprehensive Survey |
title | Attribute-Based Encryption Schemes for Next Generation Wireless IoT Networks: A Comprehensive Survey |
title_full | Attribute-Based Encryption Schemes for Next Generation Wireless IoT Networks: A Comprehensive Survey |
title_fullStr | Attribute-Based Encryption Schemes for Next Generation Wireless IoT Networks: A Comprehensive Survey |
title_full_unstemmed | Attribute-Based Encryption Schemes for Next Generation Wireless IoT Networks: A Comprehensive Survey |
title_short | Attribute-Based Encryption Schemes for Next Generation Wireless IoT Networks: A Comprehensive Survey |
title_sort | attribute-based encryption schemes for next generation wireless iot networks: a comprehensive survey |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10346245/ https://www.ncbi.nlm.nih.gov/pubmed/37447769 http://dx.doi.org/10.3390/s23135921 |
work_keys_str_mv | AT shruti attributebasedencryptionschemesfornextgenerationwirelessiotnetworksacomprehensivesurvey AT ranishalli attributebasedencryptionschemesfornextgenerationwirelessiotnetworksacomprehensivesurvey AT sahdipakkumar attributebasedencryptionschemesfornextgenerationwirelessiotnetworksacomprehensivesurvey AT gianinigabriele attributebasedencryptionschemesfornextgenerationwirelessiotnetworksacomprehensivesurvey |