Limits...
Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things.

Hernández-Ramos JL, Bernabe JB, Moreno MV, Skarmeta AF - Sensors (Basel) (2015)

Bottom Line: This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography.The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities.Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

View Article: PubMed Central - PubMed

Affiliation: Department of Information and Communications Engineering, Computer Science Faculty, University of Murcia, Murcia 30100, Spain. jluis.hernandez@um.es.

ABSTRACT
As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

No MeSH data available.


Idemix-based Anonymous DCapBAC. Privacy preserving access performance.
© Copyright Policy
Related In: Results  -  Collection

License
getmorefigures.php?uid=PMC4541847&req=5

f10-sensors-15-15611: Idemix-based Anonymous DCapBAC. Privacy preserving access performance.

Mentions: Figure 10 shows two graphs that sum up the performance times obtained in the Idemix testbed. The left chart shows the time required by the subject to build the proof. The total build proof operations made in the subject side are split in 3 different series, in order to be able to show the times required to build the pseudonym subproof and the CL subproof, which are the most heavy tasks in the whole proving protocol. The series Other proving operations encompasses, among others operations, the time require to load the credential previously obtained, initiate the verification process to obtain the nonce, parse and validate the proof specification, as well as generate the challenge. The X-axis in both charts represent the amount of attributes used in the proof. As can be seen in the left graph, the time required to build the pseudonym subproof is barely the same regardless of the amount of attributes in the proof. The CL subproof generation requires more computation time, since the proof contains a higher amount of attributes. The time required to perform other operations are usually steady across the different tests. Notice that the results does not include the network delay.


Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things.

Hernández-Ramos JL, Bernabe JB, Moreno MV, Skarmeta AF - Sensors (Basel) (2015)

Idemix-based Anonymous DCapBAC. Privacy preserving access performance.
© Copyright Policy
Related In: Results  -  Collection

License
Show All Figures
getmorefigures.php?uid=PMC4541847&req=5

f10-sensors-15-15611: Idemix-based Anonymous DCapBAC. Privacy preserving access performance.
Mentions: Figure 10 shows two graphs that sum up the performance times obtained in the Idemix testbed. The left chart shows the time required by the subject to build the proof. The total build proof operations made in the subject side are split in 3 different series, in order to be able to show the times required to build the pseudonym subproof and the CL subproof, which are the most heavy tasks in the whole proving protocol. The series Other proving operations encompasses, among others operations, the time require to load the credential previously obtained, initiate the verification process to obtain the nonce, parse and validate the proof specification, as well as generate the challenge. The X-axis in both charts represent the amount of attributes used in the proof. As can be seen in the left graph, the time required to build the pseudonym subproof is barely the same regardless of the amount of attributes in the proof. The CL subproof generation requires more computation time, since the proof contains a higher amount of attributes. The time required to perform other operations are usually steady across the different tests. Notice that the results does not include the network delay.

Bottom Line: This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography.The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities.Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

View Article: PubMed Central - PubMed

Affiliation: Department of Information and Communications Engineering, Computer Science Faculty, University of Murcia, Murcia 30100, Spain. jluis.hernandez@um.es.

ABSTRACT
As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

No MeSH data available.