4 research outputs found
A survey on authentication techniques for the internet of things
The Internet of things (IoT) is the technology, which forms the foundation of today;s smart and connected world. The IoT is a network used to interconnect embedded devices, such as sensors, which are able to generate, communicate and share data with one another. In such an enormous network of interconnected smart objects, the identification of a specific object poses a fundamental task that influences all other functions of the system, such as its governance, privacy features, access control, overall architecture, etc. This paper presents a critical review of the prominent and recent authentication techniques for IoT objects. This is followed by a discussion of the limitations of current authentication techniques and future research avenues and opportunities
Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds
In this paper, we propose an accountable privacy
preserving attribute-based framework, called Ins-PAbAC, that
combines attribute based encryption and attribute based signature techniques for securely sharing outsourced data contents via
public cloud servers. The proposed framework presents several
advantages. First, it provides an encrypted access control feature,
enforced at the data owner’s side, while providing the desired
expressiveness of access control policies. Second, Ins-PAbAC
preserves users’ privacy, relying on an anonymous authentication
mechanism, derived from a privacy preserving attribute based
signature scheme that hides the users’ identifying information.
Furthermore, our proposal introduces an accountable attribute
based signature that enables an inspection authority to reveal
the identity of the anonymously-authenticated user if needed.
Third, Ins-PAbAC is provably secure, as it is resistant to both
curious cloud providers and malicious users adversaries. Finally,
experimental results, built upon OpenStack Swift testbed, point
out the applicability of the proposed scheme in real world
scenarios