Encryption-based access control for building management

نویسندگان

  • Laurent Gomez
  • Annett Laube
  • Vincent Ribière
  • Alessandro Sorniotti
  • Christophe Trefois
  • Marco Valente
  • Patrick Wetterwald
چکیده

The vision of ubiquitous computing is a network of small, inexpensive, robust processing devices, distributed throughout everyday life. Wireless Sensor Networks (WSNs) are an essential part to realize this dream. Sensor Networks can be seen as sources of input, delivering data from the real world into the digital world. Wireless sensors have the advantage of lower installation costs and ease of deployment compared with wired sensors. Low cost often arises as a requirement to justify the adoption of WSN technology for particular business scenarios: this results in sensors often being simple devices, with limited computing and transmitting power as well as limited battery capacity. In addition to technical challenges (e.g. data routing from the sensor nodes to the business applications, data processing, filtering), the integration of WSNs with business applications raises security issues. Although each business application has its own specific security requirements, a controlled access to sensor data, from its production at sensor nodes to its use at business applications is a general requirement.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

Efficient Cryptographic Access Control Protocol for Sensitive Data Management

--In view of sensitive data management, an efficient cryptographic access control scheme is proposed. Based on attribute-based encryption, the proposed scheme not only inherits flexibility and fine-grained access control for users, but also realizes cryptographic management for servers. In additional, the scheme alleviates the administering burdens on the server, and handle dynamic access polic...

متن کامل

Temporal , Delegable and Cheap Update Access Control to Published XML

Providing access control for published XML documents on the Web is an important topic. It involves the use of cryptographic techniques, addressing different requirements and, as a result, facing several challenges. Existing solutions still have some weaknesses such as system update cost, number of required secret encryption/decryption keys, size of encrypted document and supporting temporal and...

متن کامل

Achieving fine-grained access control for secure data sharing on cloud servers

With more and more enterprises sharing their sensitive data on cloud servers, building a secure cloud environment for data sharing has attracted a lot of attention in both industry and academic communities. In this paper, we propose a conjunctive precise and fuzzy identity-based encryption (PFIBE) scheme for secure data sharing on cloud servers, which allows the encryption of data by specifying...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008