Design of Data Security Module Using Key-Policy Attribute Based Encryption (KP-ABE) Algorithm for an Internet-of-Things System

Authors

DOI:

10.29303/jppipa.v10i11.8289

Published:

2024-11-25

Issue:

Vol. 10 No. 11 (2024): November

Keywords:

Data protection, Edge processing, Embedded system, Internet-of-things, KP-ABE algorithm

Research Articles

Downloads

How to Cite

Fahlevi, R., & Salman, M. (2024). Design of Data Security Module Using Key-Policy Attribute Based Encryption (KP-ABE) Algorithm for an Internet-of-Things System. Jurnal Penelitian Pendidikan IPA, 10(11), 9825–9831. https://doi.org/10.29303/jppipa.v10i11.8289

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Abstract

Internet becomes more popular over time. Everything can be connected with the internet with larger coverage area which makes everyone have a higher dependence on it. Along with that, internet-based technology development and application is also moving to its best pattern. In the development, there are a lot of devices that can be used for Internet-of-Things system development. However, Internet-of-Things system has the following security vulnerabilities especially for access control and data protection. For the data privacy protection, it becomes more critical especially when using a standard TCP/IP based application layer protocol to secure the data before its transmitted from the client to the server. This work will be focused on the data privacy security development using a cryptographic scheme for Internet-of-Things system. Attribute Based Encryption (ABE) is one of cryptographic scheme that can be one of the best choices for data protection implementation in embedded device using NVIDA Jetson Nano. It will demonstrate the design of Key-Policy Attribute Based Encryption (KP-ABE) scheme to generate a symmetric key that will be used for Advanced Encryption Standard (AES) while encryption and decryption process. The result shows the execution time of key generation, data encryption and decryption using unique number of attributes.

References

Aslan, F. Y., & Aslan, B. (2023). Comparison of IoT Protocols with OSI and TCP/IP Architecture. International Journal of Engineering Research and Development UMAGD, 15(1). Retrieved from https://dergipark.org.tr/en/pub/umagd/issue/72926/1063036

Černja, I., Vejmelka, L., & Rajter, M. (2019). Internet addiction test: Croatian preliminary study. BMC Psychiatry, 19(1), 1–11. https://doi.org/10.1186/s12888-019-2366-2

Ceron, A. (2015). Internet, News, and Political Trust: The Difference Between Social Media and Online Media Outlets. Journal of Computer-Mediated Communication, 20(5). https://doi.org/10.1111/jcc4.12129

Chang, G. (2021). Urban air pollution diffusion status and sports training physical fitness measurement based on the Internet of things system. Arabian Journal of Geosciences, 14. https://doi.org/10.1007/s12517-021-07947-x

Ding, X., Wang, H., Li, G., Li, H., Li, Y., & Liu, Y. (2022). IoT data cleaning techniques: A survey. Intelligent and Converged Networks, 3(4). https://doi.org/10.23919/ICN.2022.0026

Doohan, N. V., Kadam, S., Phursule, R., Wadne, V. S., & Junnarkar, A. (2022). Implementation of AI based Safety and Security System Integration for Smart City. International Journal of Electrical and Electronics Research, 10(3). https://doi.org/10.37391/IJEER.100319

Elkhodr, M., Khan, S., & Gide, E. (2024). A Novel Semantic IoT Middleware for Secure Data Management: Blockchain and AI-Driven Context Awareness. Future Internet, 16(1). https://doi.org/10.3390/fi16010022

Guo, L. (2022). Application of Blockchain Based on Deep Learning Algorithm in Enterprise Internet of Things System. Mobile Information Systems, 2022. https://doi.org/10.1155/2022/9943452

Han, F., Qin, J., Zhao, H., & Hu, J. (2014). A general transformation from KP-ABE to searchable encryption. Future Generation Computer Systems, 30(1). https://doi.org/10.1016/j.future.2013.09.013

Hassan, G. M., Hussien, N. M., & Mohialden, Y. M. (2023). Python TCP/IP libraries: A Review. International Journal Papier Advance and Scientific Review, 4(2). https://doi.org/10.47667/ijpasr.v4i2.202

Kang, P., Zhao, K. Q., Liu, B., Guo, Z., Feng, C. S., & Qing, Y. (2023). A KP-ABE Scheme Supporting Large Universe and Security Classification. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 51(9). https://doi.org/10.12263/DZXB.20210493

Kaur, K., Kaur, M., Kaur, K., & Madaan, A. (2023). A Comparative Study of OSI and TCP/IP Models. International Journal of Engineering and Management Research, 13(2). http://dx.doi.org/10.31033/ijemr.13.2.20

Khan, N., Ray, R. L., Kassem, H. S., & Zhang, S. (2022). Mobile Internet Technology Adoption for Sustainable Agriculture: Evidence from Wheat Farmers. Applied Sciences (Switzerland), 12(10). https://doi.org/10.3390/app12104902

Krishnan, S., Neyaz, A., & Liu, Q. (2021). IoT Network Attack Detection using Supervised Machine Learning. International Journal of Artificial Intelligence and Expert Systems (IJAE), 10, 18–32. Retrieved from https://www.cscjournals.org/manuscript/Journals/IJAE/Volume10/Issue2/IJAE-201.pdf

Kumar, D., & Kumar, M. (2023). Outsourcing decryption of KP-ABE using elliptic curve cryptography. International Journal of Information and Computer Security, 22(2). https://doi.org/10.1504/IJICS.2023.134961

Ma, H., & Li, J. (2021). An Innovative Method for Digital Media Education Based on Mobile Internet Technology. International Journal of Emerging Technologies in Learning, 16(13). https://doi.org/10.3991/ijet.v16i13.24037

Prasad, V., & Shah, P. K. (2021). A data security module based on crypto and steganography techniques. 2021 2nd International Conference for Emerging Technology, INCET 2021. https://doi.org/10.1109/INCET51464.2021.9456373

Sukaatmadja, I. P. G., Yasa, N. N. K., Santika, I. W., Rahanatha, G. B., Rahmayanti, P. L. D., & Muna, N. (2023). The role of international networking to mediate internet technology capabilities and international entrepreneurship orientation to export performance. Uncertain Supply Chain Management, 11(2). https://doi.org/10.5267/j.uscm.2023.2.004

Tyagi, A. (2020). TCP/IP Protocol Suite. International Journal of Scientific Research in Computer Science, Engineering and Information Technology. https://doi.org/10.32628/cseit206420

Vlachogianni, P., & Tselios, N. (2022). Perceived usability evaluation of educational technology using the System Usability Scale (SUS): A systematic review. Journal of Research on Technology in Education, 54(3), 392–409. https://doi.org/10.1080/15391523.2020.1867938

Vladimirov, S. S., Vybornova, A., Muthanna, A., Koucheryavy, A., & El-Latif, A. A. A. (2023). Network Coding Datagram Protocol for TCP/IP Networks. IEEE Access, 11. https://doi.org/10.1109/ACCESS.2023.3266289

Xiao, M., Huang, Q., Miao, Y., Li, S., & Susilo, W. (2022). Blockchain Based Multi-Authority Fine-Grained Access Control System with Flexible Revocation. IEEE Transactions on Services Computing, 15(6). https://doi.org/10.1109/TSC.2021.3086023

Xu, C., Zhang, J., Zhang, Z., Hou, J., & Wen, X. (2023). Data and Service Security of GNSS Sensors Integrated with Cryptographic Module. Micromachines, 14(2). https://doi.org/10.3390/mi14020454

Xue, Q., Wang, H., & Wei, J. (2023). Internet technology and regional financial fraud: evidence from Broadband expansion in China. Journal of Applied Economics, 26(1). https://doi.org/10.1080/15140326.2023.2281167

Yang, D., Zhou, Y., Huang, W., & Zhou, X. (2021). 5G mobile communication convergence protocol architecture and key technologies in satellite internet of things system. Alexandria Engineering Journal, 60(1). https://doi.org/10.1016/j.aej.2020.09.019

Zhang, M. (2020). Influence of internet technology on mental health and positive emotions of college students. Revista Argentina de Clinica Psicologica, 29(2). https://doi.org/10.24205/03276716.2020.271

Author Biographies

Reza Fahlevi, University of Indonesia

Muhammad Salman, University of Indonesia

Universitas Indonesia

License

Copyright (c) 2024 Reza Fahlevi, Muhammad Salman

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Authors who publish with Jurnal Penelitian Pendidikan IPA, agree to the following terms:

  1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution 4.0 International License (CC-BY License). This license allows authors to use all articles, data sets, graphics, and appendices in data mining applications, search engines, web sites, blogs, and other platforms by providing an appropriate reference. The journal allows the author(s) to hold the copyright without restrictions and will retain publishing rights without restrictions.
  2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in Jurnal Penelitian Pendidikan IPA.
  3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).