Cargando…

Attribute-Based Encryption Schemes for Next Generation Wireless IoT Networks: A Comprehensive Survey

Most data nowadays are stored in the cloud; therefore, cloud computing and its extension—fog computing—are the most in-demand services at the present time. Cloud and fog computing platforms are largely used by Internet of Things (IoT) applications where various mobile devices, end users, PCs, and sm...

Descripción completa

Detalles Bibliográficos
Autores principales: Shruti, Rani, Shalli, Sah, Dipak Kumar, Gianini, Gabriele
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10346245/
https://www.ncbi.nlm.nih.gov/pubmed/37447769
http://dx.doi.org/10.3390/s23135921
_version_ 1785073269325430784
author Shruti
Rani, Shalli
Sah, Dipak Kumar
Gianini, Gabriele
author_facet Shruti
Rani, Shalli
Sah, Dipak Kumar
Gianini, Gabriele
author_sort Shruti
collection PubMed
description Most data nowadays are stored in the cloud; therefore, cloud computing and its extension—fog computing—are the most in-demand services at the present time. Cloud and fog computing platforms are largely used by Internet of Things (IoT) applications where various mobile devices, end users, PCs, and smart objects are connected to each other via the internet. IoT applications are common in several application areas, such as healthcare, smart cities, industries, logistics, agriculture, and many more. Due to this, there is an increasing need for new security and privacy techniques, with attribute-based encryption (ABE) being the most effective among them. ABE provides fine-grained access control, enables secure storage of data on unreliable storage, and is flexible enough to be used in different systems. In this paper, we survey ABE schemes, their features, methodologies, benefits/drawbacks, attacks on ABE, and how ABE can be used with IoT and its applications. This survey reviews ABE models suitable for IoT platforms, taking into account the desired features and characteristics. We also discuss various performance indicators used for ABE and how they affect efficiency. Furthermore, some selected schemes are analyzed through simulation to compare their efficiency in terms of different performance indicators. As a result, we find that some schemes simultaneously perform well in one or two performance indicators, whereas none shines in all of them at once. The work will help researchers identify the characteristics of different ABE schemes quickly and recognize whether they are suitable for specific IoT applications. Future work that may be helpful for ABE is also discussed.
format Online
Article
Text
id pubmed-10346245
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-103462452023-07-15 Attribute-Based Encryption Schemes for Next Generation Wireless IoT Networks: A Comprehensive Survey Shruti Rani, Shalli Sah, Dipak Kumar Gianini, Gabriele Sensors (Basel) Article Most data nowadays are stored in the cloud; therefore, cloud computing and its extension—fog computing—are the most in-demand services at the present time. Cloud and fog computing platforms are largely used by Internet of Things (IoT) applications where various mobile devices, end users, PCs, and smart objects are connected to each other via the internet. IoT applications are common in several application areas, such as healthcare, smart cities, industries, logistics, agriculture, and many more. Due to this, there is an increasing need for new security and privacy techniques, with attribute-based encryption (ABE) being the most effective among them. ABE provides fine-grained access control, enables secure storage of data on unreliable storage, and is flexible enough to be used in different systems. In this paper, we survey ABE schemes, their features, methodologies, benefits/drawbacks, attacks on ABE, and how ABE can be used with IoT and its applications. This survey reviews ABE models suitable for IoT platforms, taking into account the desired features and characteristics. We also discuss various performance indicators used for ABE and how they affect efficiency. Furthermore, some selected schemes are analyzed through simulation to compare their efficiency in terms of different performance indicators. As a result, we find that some schemes simultaneously perform well in one or two performance indicators, whereas none shines in all of them at once. The work will help researchers identify the characteristics of different ABE schemes quickly and recognize whether they are suitable for specific IoT applications. Future work that may be helpful for ABE is also discussed. MDPI 2023-06-26 /pmc/articles/PMC10346245/ /pubmed/37447769 http://dx.doi.org/10.3390/s23135921 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Shruti
Rani, Shalli
Sah, Dipak Kumar
Gianini, Gabriele
Attribute-Based Encryption Schemes for Next Generation Wireless IoT Networks: A Comprehensive Survey
title Attribute-Based Encryption Schemes for Next Generation Wireless IoT Networks: A Comprehensive Survey
title_full Attribute-Based Encryption Schemes for Next Generation Wireless IoT Networks: A Comprehensive Survey
title_fullStr Attribute-Based Encryption Schemes for Next Generation Wireless IoT Networks: A Comprehensive Survey
title_full_unstemmed Attribute-Based Encryption Schemes for Next Generation Wireless IoT Networks: A Comprehensive Survey
title_short Attribute-Based Encryption Schemes for Next Generation Wireless IoT Networks: A Comprehensive Survey
title_sort attribute-based encryption schemes for next generation wireless iot networks: a comprehensive survey
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10346245/
https://www.ncbi.nlm.nih.gov/pubmed/37447769
http://dx.doi.org/10.3390/s23135921
work_keys_str_mv AT shruti attributebasedencryptionschemesfornextgenerationwirelessiotnetworksacomprehensivesurvey
AT ranishalli attributebasedencryptionschemesfornextgenerationwirelessiotnetworksacomprehensivesurvey
AT sahdipakkumar attributebasedencryptionschemesfornextgenerationwirelessiotnetworksacomprehensivesurvey
AT gianinigabriele attributebasedencryptionschemesfornextgenerationwirelessiotnetworksacomprehensivesurvey