[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3664476.3670909acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article
Open access

Telemetry data sharing based on Attribute-Based Encryption schemes for cloud-based Drone Management system

Published: 30 July 2024 Publication History

Abstract

The research presented in the paper evaluates practices of Attribute-Based Encryption, leading to a proposed end-to-end encryption strategy for a cloud-based drone management system. Though extensively used for efficiently gathering and sharing video surveilance data, these systems also collect telemetry information with sensitive data. This paper presents a study addressing the current state of knowledge, methodologies, and challenges associated with supporting cryptographic agility for End-to-End Encryption (E2EE) for telemetry data confidentiality.
To enhance cryptographic agility performance, a new metric has been introduced for cryptographic library analysis that improves the methodology by considering Attribute-Based Encryption (ABE) with a conventional key-encapsulation mechanism in OpenSSL. A comprehensive series of experiments are undertaken to simulate cryptographic agility within the proposed system, showcasing the practical applicability of the proposed approach in measuring cryptographic agility performance.

References

[1]
Shashank Agrawal and Melissa Chase. 2017. FAME: Fast Attribute-based Message Encryption. https://eprint.iacr.org/2017/807 Publication info: Published elsewhere. ACM CCS 2017.
[2]
Matilda Backendal, Miro Haller, and Kenneth G. Paterson. 2023. MEGA: malleable encryption goes awry. In 2023 IEEE Symposium on Security and Privacy (SP). IEEE, 146–163.
[3]
John Bethencourt, Amit Sahai, and Brent Waters. 2007. Ciphertext-Policy Attribute-Based Encryption. In 2007 IEEE Symposium on Security and Privacy (SP ’07). IEEE, Berkeley, CA, 321–334. https://doi.org/10.1109/SP.2007.11
[4]
C. Bird, T. Menzies, and T. Zimmermann. 2015. The Art and Science of Analyzing Software Data. https://doi.org/10.1016/C2012-0-07289-4 Pages: 648.
[5]
Niccolò Cecchinato, Andrea Toma, Carlo Drioli, Giuseppe Oliva, Gianluigi Sechi, and Gian Luca Foresti. 2022. A Secure Real-time Multimedia Streaming through Robust and Lightweight AES Encryption in UAV Networks for Operational Scenarios in Military Domain. Procedia Computer Science 205 (Jan. 2022), 50–57. https://doi.org/10.1016/j.procs.2022.09.006
[6]
Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, and Douglas Stebila. 2016. A Formal Security Analysis of the Signal Messaging Protocol. https://eprint.iacr.org/2016/1013 Publication info: Published elsewhere. Major revision. IEEE EuroS&P 2017.
[7]
Bolin Ding, Janardhan Kulkarni, and Sergey Yekhanin. 2017. Collecting Telemetry Data Privately. In Advances in Neural Information Processing Systems, Vol. 30. Curran Associates, Inc.https://proceedings.neurips.cc/paper_files/paper/2017/hash/253614bbac999b38b5b60cae531c4969-Abstract.html
[8]
Yun Ding and Karsten Klein. 2010. Model-Driven Application-Level Encryption for the Privacy of E-health Data. In 2010 International Conference on Availability, Reliability and Security. 341–346. https://doi.org/10.1109/ARES.2010.91
[9]
Christian Esposito, Massimo Ficco, Aniello Castiglione, Francesco Palmieri, and Alfredo De Santis. 2020. Distributed Group Key Management for Event Notification Confidentiality Among Sensors. IEEE Transactions on Dependable and Secure Computing 17, 3 (May 2020), 566–580. https://doi.org/10.1109/TDSC.2018.2799227 Conference Name: IEEE Transactions on Dependable and Secure Computing.
[10]
Qi Gao, Junwei Zhang, Jianfeng Ma, Chao Yang, Jingjing Guo, and Yinbin Miao. 2018. LIP-PA: A Logistics Information Privacy Protection Scheme with Position and Attribute-Based Access Control on Mobile Devices. Wireless Communications and Mobile Computing 2018 (July 2018), e9436120. https://doi.org/10.1155/2018/9436120 Publisher: Hindawi.
[11]
Peter Leo Gorski, Luigi Lo Iacono, Dominik Wermke, Christian Stransky, Sebastian Möller, Yasemin Acar, and Sascha Fahl. 2018. Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic {API} Misuse. 265–281. https://www.usenix.org/conference/soups2018/presentation/gorski
[12]
Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters. 2006. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. https://eprint.iacr.org/2006/309 Publication info: Published elsewhere. Extended abstract to appear in ACM CCS 2006. This is the full version.
[13]
Britta Hale and Chelsea Komlo. 2022. On End-to-End Encryption. https://eprint.iacr.org/2022/449 Publication info: Preprint. MINOR revision.
[14]
Syed Wasif Abbas Hamdani, Haider Abbas, Abdul Rehman Janjua, Waleed Bin Shahid, Muhammad Faisal Amjad, Jahanzaib Malik, Malik Hamza Murtaza, Mohammed Atiquzzaman, and Abdul Waheed Khan. 2021. Cybersecurity Standards in the Context of Operating System: Practical Aspects, Analysis, and Comparisons. Comput. Surveys 54, 3 (May 2021), 57:1–57:36. https://doi.org/10.1145/3442480
[15]
Julie Haney, Mary Theofanos, Yasemin Acar, and Sandra Spickard Prettyman. 2018. Organizational views of NIST cryptographic standards and testing and validation programs. Technical Report NIST IR 8241. National Institute of Standards and Technology, Gaithersburg, MD. NIST IR 8241 pages. https://doi.org/10.6028/NIST.IR.8241
[16]
Sheng Hong, Haowen Pan, Yijia Fang, Jie Ma, Xiaojing Qi, and Yanghong Hu. 2022. A Logistics Privacy Protection Scheme Based on Ciphertext Policy Attribute-Based Key Encapsulation. In 2022 International Conference on Blockchain Technology and Information Security (ICBCTIS). 218–224. https://doi.org/10.1109/ICBCTIS55569.2022.00057
[17]
Xiaolong Huang and Ruining Chen. 2018. A Survey of Key Management Service in Cloud. In 2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS). 916–919. https://doi.org/10.1109/ICSESS.2018.8663805 ISSN: 2327-0594.
[18]
Raza Imam, Kaushal Kumar, Syed Mehran Raza, Rumi Sadaf, Faisal Anwer, Noor Fatima, Mohammad Nadeem, Mohamed Abbas, and Obaidur Rahman. 2022. A systematic literature review of attribute based encryption in health services. Journal of King Saud University - Computer and Information Sciences 34, 9 (Oct. 2022), 6743–6774. https://doi.org/10.1016/j.jksuci.2022.06.018
[19]
Tao Li, Rui Zhang, and Yanchao Zhang. 2016. PriExpress: Privacy-preserving express delivery with fine-grained attribute-based access control. In 2016 IEEE Conference on Communications and Network Security (CNS). 333–341. https://doi.org/10.1109/CNS.2016.7860501
[20]
Siddhesh Mhatre, Anant V. Nimkar, and Sudhir N. Dhage. 2017. Comparative study on attribute-based encryption for health records in cloud storage. 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) (May 2017), 647–652. https://doi.org/10.1109/RTEICT.2017.8256677 Conference Name: 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) ISBN: 9781509037049 Place: Bangalore Publisher: IEEE.
[21]
Aintzane Mosteiro-Sanchez, Marc Barceló, Jasone Astorga, and Aitor Urbieta. 2022. All Cryptolibraries Are Beautiful, But Some Are More Beautiful Than Others: A Survey of CP-ABE Libraries.
[22]
Leysan Nurgalieva, Alisa Frik, and Gavin Doherty. 2023. A Narrative Review of Factors Affecting the Implementation of Privacy and Security Practices in Software Development. Comput. Surveys 55, 14s (July 2023), 320:1–320:27. https://doi.org/10.1145/3589951
[23]
David Ott, Kenny Paterson, and Dennis Moreau. 2023. Where Is the Research on Cryptographic Transition and Agility?Commun. ACM 66, 4 (April 2023), 29–32. https://doi.org/10.1145/3567825
[24]
Kenneth G. Paterson, Matteo Scarlata, and Kien Tuong Truong. 2023. Three lessons from threema: Analysis of a secure messenger. In 32nd USENIX Security Symposium (USENIX Security 23). 1289–1306.
[25]
Shardha Porwal and Sangeeta Mittal. 2017. Implementation of Ciphertext Policy-Attribute Based Encryption (CP-ABE) for fine grained access control of university data. In 2017 Tenth International Conference on Contemporary Computing (IC3). IEEE, Noida, 1–7. https://doi.org/10.1109/IC3.2017.8284289
[26]
Amit Sahai and Brent Waters. 2004. Fuzzy Identity Based Encryption. https://eprint.iacr.org/2004/086 Publication info: Published elsewhere. Unknown where it was published.
[27]
Sarah Scheffler and Jonathan Mayer. 2023. SoK: Content Moderation for End-to-End Encryption. Proceedings on Privacy Enhancing Technologies 2023, 2 (April 2023), 403–429. https://doi.org/10.56553/popets-2023-0060
[28]
Alexandr Silonosov. 2023. SECMAR Project: Enhancing Maritime Cybersecurity with Drones and Drone Management in the South Baltic Region.
[29]
M. Sinnema, S. Deelstra, J. Nijhuis, and J. Bosch. 2004. COVAMOF: A Framework for Modeling Variability in Software Product Families. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 3154 (2004), 197–213. https://doi.org/10.1007/978-3-540-28630-1_12 ISBN: 9783540229186.
[30]
N. P. Smart. 2005. Efficient Key Encapsulation to Multiple Parties. In Security in Communication Networks(Lecture Notes in Computer Science), Carlo Blundo and Stelvio Cimato (Eds.). Springer, Berlin, Heidelberg, 208–219. https://doi.org/10.1007/978-3-540-30598-9_15
[31]
Asha. V, A. P. Nirmala, Bhavani. K, Aldred Christi, and Naveen. A. 2022. A Review on Cloud Cryptography Techniques to Improve Security in E-health Systems. In 2022 6th International Conference on Computing Methodologies and Communication (ICCMC). 100–104. https://doi.org/10.1109/ICCMC53470.2022.9753999
[32]
Theo von Arx and Kenneth G. Paterson. 2023. On the cryptographic fragility of the Telegram ecosystem. In Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security. 328–341.
[33]
Changji Wang, Xuan Liu, and Wentao Li. 2012. Implementing a Personal Health Record Cloud Platform Using Ciphertext-Policy Attribute-Based Encryption. https://doi.org/10.1109/iNCoS.2012.65 Journal Abbreviation: Proceedings of the 2012 4th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012 Pages: 14 Publication Title: Proceedings of the 2012 4th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012.
[34]
Brent Waters. 2008. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. https://eprint.iacr.org/2008/290 Publication info: Published elsewhere. Unknown where it was published.
[35]
Brent Waters, Dirk Balfanz, Glenn Durfee, and Diana Smetters. 2003. Building an Encrypted and Searchable Audit Log. (Dec. 2003).
[36]
Jun Zhao, Kai Zhang, Junqing Gong, and Haifeng Qian. 2024. Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health Cloud. IEEE Transactions on Information Forensics and Security 19 (2024), 2732–2745. https://doi.org/10.1109/TIFS.2024.3350925 Conference Name: IEEE Transactions on Information Forensics and Security.
[37]
Xiaoping Zhao and Qianqian Su. 2023. Revocable Attribute-Base Scheme with Enhanced Security and Privacy for Healthcare Data Sharing. In 2023 IEEE 14th International Symposium on Parallel Architectures, Algorithms and Programming (PAAP). IEEE, Beijing, China, 1–8. https://doi.org/10.1109/PAAP60200.2023.10391571
[38]
Yang Zhao, Pengcheng Fan, H. Cai, Zhiguang Qin, and H. Xiong. 2017. Attribute-based Encryption with Non-Monotonic Access Structures Supporting Fine-Grained Attribute Revocation in M-healthcare. Int. J. Netw. Secur. (2017). https://www.semanticscholar.org/paper/Attribute-based-Encryption-with-Non-Monotonic-in-Zhao-Fan/69d30e6155489c6bc92eeabac5931ae99c2806c2

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and Security
July 2024
2032 pages
ISBN:9798400717185
DOI:10.1145/3664476
This work is licensed under a Creative Commons Attribution International 4.0 License.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 July 2024

Check for updates

Author Tags

  1. attribute based encryption.
  2. audit log data
  3. cryptographic agility
  4. end-to-end encryption
  5. key-encapsulation mechanism
  6. telemetry

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ARES 2024

Acceptance Rates

Overall Acceptance Rate 228 of 451 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 137
    Total Downloads
  • Downloads (Last 12 months)137
  • Downloads (Last 6 weeks)42
Reflects downloads up to 04 Jan 2025

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media