Encryption-based access control for building management
نویسندگان
چکیده
The vision of ubiquitous computing is a network of small, inexpensive, robust processing devices, distributed throughout everyday life. Wireless Sensor Networks (WSNs) are an essential part to realize this dream. Sensor Networks can be seen as sources of input, delivering data from the real world into the digital world. Wireless sensors have the advantage of lower installation costs and ease of deployment compared with wired sensors. Low cost often arises as a requirement to justify the adoption of WSN technology for particular business scenarios: this results in sensors often being simple devices, with limited computing and transmitting power as well as limited battery capacity. In addition to technical challenges (e.g. data routing from the sensor nodes to the business applications, data processing, filtering), the integration of WSNs with business applications raises security issues. Although each business application has its own specific security requirements, a controlled access to sensor data, from its production at sensor nodes to its use at business applications is a general requirement.
منابع مشابه
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملFuzzy retrieval of encrypted data by multi-purpose data-structures
The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...
متن کاملEfficient Cryptographic Access Control Protocol for Sensitive Data Management
--In view of sensitive data management, an efficient cryptographic access control scheme is proposed. Based on attribute-based encryption, the proposed scheme not only inherits flexibility and fine-grained access control for users, but also realizes cryptographic management for servers. In additional, the scheme alleviates the administering burdens on the server, and handle dynamic access polic...
متن کاملTemporal , Delegable and Cheap Update Access Control to Published XML
Providing access control for published XML documents on the Web is an important topic. It involves the use of cryptographic techniques, addressing different requirements and, as a result, facing several challenges. Existing solutions still have some weaknesses such as system update cost, number of required secret encryption/decryption keys, size of encrypted document and supporting temporal and...
متن کاملAchieving fine-grained access control for secure data sharing on cloud servers
With more and more enterprises sharing their sensitive data on cloud servers, building a secure cloud environment for data sharing has attracted a lot of attention in both industry and academic communities. In this paper, we propose a conjunctive precise and fuzzy identity-based encryption (PFIBE) scheme for secure data sharing on cloud servers, which allows the encryption of data by specifying...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008