SECURE DATA SENSOR SHARING ON UBIQUITOUS ENVIRONMENTAL HEALTH MONITORING APPLICATION

Samsul Huda, Nurul Fahmi, Amang Sudarsono, M. Udin Harun Al Rasyid

Abstract


In Internet of Things (IoT) era, The limitation storage on Wireless Sensor Network (WSN) can be solved by synchronized data sensors from the gateway node to the data center server. Data in the data center can be remotely accessed by the user at any time and anywhere from end user devices such as PCs, laptop PCs, and smart phones., and data should be accessed securely. The Only legitimated user can access the data sensor from an environmental health data center. CP-ABE (Ciphertext-Policy Attribute-Based Encryption) is becoming a robust cryptographic scheme solution to this issue. To enable a secure data sensor sharing and access on an environmental health data center, we propose a secure system model using CP-ABE which ensures confidentiality, integrity, and user privacy features. Experimental results prove that the implementation of CP-ABE does not overload the system.


Keywords


Secure data sensor; environmental health data center; access policy

Full Text:

PDF

References


Othmana, M. F., Shazali. K. 2012. Wireless Sensor Network Applications: A Study in Environment Monitoring System. International Symposium on Robotics and Intelligent Sensors 2012 (IR IS 2012).1204 – 1210.

Liu, J. H., Chen, Y. F., Lin, T. S., Chen, C. P., Chen, P. T., Wen, T. H., Sun, C.H. Juang, J.Y. and iangAN J.A.J. 2012. Air Quality Monitoring System for Urban Areas Based on The Technology of Wireless Sensor Networks. International Journal on Smart Sensing and Intelligent Systems. 5(1): 191-214.

Al Rasyid, M.U.H. Bih-Hwang Lee, A.Sudarsono, and Taufiqurrahman. 2015. Implementation of Body Temperature and Pulseoximeter Sensors for Wireless Body Area Network. Sensors and Materials, International Journal on Sensor Technology. 27(8): 727-732.

Bethencourt, J. Sahai, A. and Waters. B. 2007. Ciphertext-policy Attribute-Based Encryption. IEEE Symposium on Security and Privacy. 321-334.

Fu, J Huang, Q., Yang Y. 2014. Secure personal data sharing in cloud computing using attribute-based broadcast encryption. The Journal of China Universities of Posts and Telecommunications. 21(6): 45–51.

Fabian, B. Ermakova, T. and Junghanns P. 2015. Collaborative and secure sharing of healthcare data in multi-clouds. Information Systems. 48: 132–150.

Yu, S. Wang, C. Ren, K. and Lou W. 2010. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. INFOCOM, 2010 Proceedings IEEE.1-9.

Huda, S. Sudarsono, A. and Harsono T. 2015. Secure Data Exchange using Authenticated Ciphertext-Policy Attributed-Based Encryption. 2015 International Electronics Symposium (IES 2015). Surabaya, Indonesia. 29-30 September 2015. 140-145.

Sudarsono A. and Nakanishi. T. 2014. An Implementation of Secure Data Exchange in Wireless Delay Tolerant Network Using Attribute-Based Encryption. 2nd International Symposium on Computing and Networking (CANDAR 2014). Shizuoka, Japan. 10-12 December 2014. 536-542.

Tsai, K. Leu, F. Wu, Chiou, T. S. Liu, Y. and Liu H. 2014. A Secure ECC-based Electronic Medical Record System. Journal of Internet Services and Information Security (JISIS). 4(1): 47-57.

Rong, C. and Cheng, H. 2012. A Secure Data Access Mechanism for Cloud Tenants. Cloud Computing 2012: The Third International Conference on Cloud Computing, GRIDs, and Virtualization. Nice, France. 22-27 July 2012.113-119.

Benthencourt, J. Sahai, A. and Waters B. 2015 Cpabe Toolkit In Advanced Crypto Software Collection. [Online]. From: http://hms.isi.jhu.edu/acsc/cpabe. [Accessed on Oktober 2015].

Lynn B. 2015. PBC (Pairing-Based Cryptography) library. [Online]. From: http://crypto.stanford.edu/pbc. [Accessed on Oktober 2015].

Topal. M. 2015. Libgcrypt. Standalone HMAC-256 implementation. [Online]. From:http://svn.cubrid.org/cubridengine/trunk/external/libgcrypt-1.5.2/src/hmac256.c. [Accessed on Oktober 2015].




DOI: http://dx.doi.org/10.11113/jt.v78.8928

Refbacks

  • There are currently no refbacks.


Copyright © 2012 Penerbit UTM Press, Universiti Teknologi Malaysia.
Disclaimer : This website has been updated to the best of our knowledge to be accurate. However, Universiti Teknologi Malaysia shall not be liable for any loss or damage caused by the usage of any information obtained from this web site.
Best viewed: Mozilla Firefox 4.0 & Google Chrome at 1024 × 768 resolution.