SECURE DATA SENSOR SHARING ON UBIQUITOUS ENVIRONMENTAL HEALTH MONITORING APPLICATION
DOI:
https://doi.org/10.11113/jt.v78.8928Keywords:
Secure data sensor, environmental health data center, access policyAbstract
In Internet of Things (IoT) era, The limitation storage on Wireless Sensor Network (WSN) can be solved by synchronized data sensors from the gateway node to the data center server. Data in the data center can be remotely accessed by the user at any time and anywhere from end user devices such as PCs, laptop PCs, and smart phones., and data should be accessed securely. The Only legitimated user can access the data sensor from an environmental health data center. CP-ABE (Ciphertext-Policy Attribute-Based Encryption) is becoming a robust cryptographic scheme solution to this issue. To enable a secure data sensor sharing and access on an environmental health data center, we propose a secure system model using CP-ABE which ensures confidentiality, integrity, and user privacy features. Experimental results prove that the implementation of CP-ABE does not overload the system.
References
Othmana, M. F., Shazali. K. 2012. Wireless Sensor Network Applications: A Study in Environment Monitoring System. International Symposium on Robotics and Intelligent Sensors 2012 (IR IS 2012).1204 – 1210.
Liu, J. H., Chen, Y. F., Lin, T. S., Chen, C. P., Chen, P. T., Wen, T. H., Sun, C.H. Juang, J.Y. and iangAN J.A.J. 2012. Air Quality Monitoring System for Urban Areas Based on The Technology of Wireless Sensor Networks. International Journal on Smart Sensing and Intelligent Systems. 5(1): 191-214.
Al Rasyid, M.U.H. Bih-Hwang Lee, A.Sudarsono, and Taufiqurrahman. 2015. Implementation of Body Temperature and Pulseoximeter Sensors for Wireless Body Area Network. Sensors and Materials, International Journal on Sensor Technology. 27(8): 727-732.
Bethencourt, J. Sahai, A. and Waters. B. 2007. Ciphertext-policy Attribute-Based Encryption. IEEE Symposium on Security and Privacy. 321-334.
Fu, J Huang, Q., Yang Y. 2014. Secure personal data sharing in cloud computing using attribute-based broadcast encryption. The Journal of China Universities of Posts and Telecommunications. 21(6): 45–51.
Fabian, B. Ermakova, T. and Junghanns P. 2015. Collaborative and secure sharing of healthcare data in multi-clouds. Information Systems. 48: 132–150.
Yu, S. Wang, C. Ren, K. and Lou W. 2010. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. INFOCOM, 2010 Proceedings IEEE.1-9.
Huda, S. Sudarsono, A. and Harsono T. 2015. Secure Data Exchange using Authenticated Ciphertext-Policy Attributed-Based Encryption. 2015 International Electronics Symposium (IES 2015). Surabaya, Indonesia. 29-30 September 2015. 140-145.
Sudarsono A. and Nakanishi. T. 2014. An Implementation of Secure Data Exchange in Wireless Delay Tolerant Network Using Attribute-Based Encryption. 2nd International Symposium on Computing and Networking (CANDAR 2014). Shizuoka, Japan. 10-12 December 2014. 536-542.
Tsai, K. Leu, F. Wu, Chiou, T. S. Liu, Y. and Liu H. 2014. A Secure ECC-based Electronic Medical Record System. Journal of Internet Services and Information Security (JISIS). 4(1): 47-57.
Rong, C. and Cheng, H. 2012. A Secure Data Access Mechanism for Cloud Tenants. Cloud Computing 2012: The Third International Conference on Cloud Computing, GRIDs, and Virtualization. Nice, France. 22-27 July 2012.113-119.
Benthencourt, J. Sahai, A. and Waters B. 2015 Cpabe Toolkit In Advanced Crypto Software Collection. [Online]. From: http://hms.isi.jhu.edu/acsc/cpabe. [Accessed on Oktober 2015].
Lynn B. 2015. PBC (Pairing-Based Cryptography) library. [Online]. From: http://crypto.stanford.edu/pbc. [Accessed on Oktober 2015].
Topal. M. 2015. Libgcrypt. Standalone HMAC-256 implementation. [Online]. From:http://svn.cubrid.org/cubridengine/trunk/external/libgcrypt-1.5.2/src/hmac256.c. [Accessed on Oktober 2015].
Downloads
Published
Issue
Section
License
Copyright of articles that appear in Jurnal Teknologi belongs exclusively to Penerbit Universiti Teknologi Malaysia (Penerbit UTM Press). This copyright covers the rights to reproduce the article, including reprints, electronic reproductions, or any other reproductions of similar nature.