Design of Data Security Module Using Key-Policy Attribute Based Encryption (KP-ABE) Algorithm for an Internet-of-Things System
DOI:
10.29303/jppipa.v10i11.8289Published:
2024-11-25Issue:
Vol. 10 No. 11 (2024): NovemberKeywords:
Data protection, Edge processing, Embedded system, Internet-of-things, KP-ABE algorithmResearch Articles
Downloads
How to Cite
Downloads
Metrics
Abstract
Internet becomes more popular over time. Everything can be connected with the internet with larger coverage area which makes everyone have a higher dependence on it. Along with that, internet-based technology development and application is also moving to its best pattern. In the development, there are a lot of devices that can be used for Internet-of-Things system development. However, Internet-of-Things system has the following security vulnerabilities especially for access control and data protection. For the data privacy protection, it becomes more critical especially when using a standard TCP/IP based application layer protocol to secure the data before its transmitted from the client to the server. This work will be focused on the data privacy security development using a cryptographic scheme for Internet-of-Things system. Attribute Based Encryption (ABE) is one of cryptographic scheme that can be one of the best choices for data protection implementation in embedded device using NVIDA Jetson Nano. It will demonstrate the design of Key-Policy Attribute Based Encryption (KP-ABE) scheme to generate a symmetric key that will be used for Advanced Encryption Standard (AES) while encryption and decryption process. The result shows the execution time of key generation, data encryption and decryption using unique number of attributes.
References
Aslan, F. Y., & Aslan, B. (2023). Comparison of IoT Protocols with OSI and TCP/IP Architecture. International Journal of Engineering Research and Development UMAGD, 15(1). Retrieved from https://dergipark.org.tr/en/pub/umagd/issue/72926/1063036
Černja, I., Vejmelka, L., & Rajter, M. (2019). Internet addiction test: Croatian preliminary study. BMC Psychiatry, 19(1), 1–11. https://doi.org/10.1186/s12888-019-2366-2
Ceron, A. (2015). Internet, News, and Political Trust: The Difference Between Social Media and Online Media Outlets. Journal of Computer-Mediated Communication, 20(5). https://doi.org/10.1111/jcc4.12129
Chang, G. (2021). Urban air pollution diffusion status and sports training physical fitness measurement based on the Internet of things system. Arabian Journal of Geosciences, 14. https://doi.org/10.1007/s12517-021-07947-x
Ding, X., Wang, H., Li, G., Li, H., Li, Y., & Liu, Y. (2022). IoT data cleaning techniques: A survey. Intelligent and Converged Networks, 3(4). https://doi.org/10.23919/ICN.2022.0026
Doohan, N. V., Kadam, S., Phursule, R., Wadne, V. S., & Junnarkar, A. (2022). Implementation of AI based Safety and Security System Integration for Smart City. International Journal of Electrical and Electronics Research, 10(3). https://doi.org/10.37391/IJEER.100319
Elkhodr, M., Khan, S., & Gide, E. (2024). A Novel Semantic IoT Middleware for Secure Data Management: Blockchain and AI-Driven Context Awareness. Future Internet, 16(1). https://doi.org/10.3390/fi16010022
Guo, L. (2022). Application of Blockchain Based on Deep Learning Algorithm in Enterprise Internet of Things System. Mobile Information Systems, 2022. https://doi.org/10.1155/2022/9943452
Han, F., Qin, J., Zhao, H., & Hu, J. (2014). A general transformation from KP-ABE to searchable encryption. Future Generation Computer Systems, 30(1). https://doi.org/10.1016/j.future.2013.09.013
Hassan, G. M., Hussien, N. M., & Mohialden, Y. M. (2023). Python TCP/IP libraries: A Review. International Journal Papier Advance and Scientific Review, 4(2). https://doi.org/10.47667/ijpasr.v4i2.202
Kang, P., Zhao, K. Q., Liu, B., Guo, Z., Feng, C. S., & Qing, Y. (2023). A KP-ABE Scheme Supporting Large Universe and Security Classification. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 51(9). https://doi.org/10.12263/DZXB.20210493
Kaur, K., Kaur, M., Kaur, K., & Madaan, A. (2023). A Comparative Study of OSI and TCP/IP Models. International Journal of Engineering and Management Research, 13(2). http://dx.doi.org/10.31033/ijemr.13.2.20
Khan, N., Ray, R. L., Kassem, H. S., & Zhang, S. (2022). Mobile Internet Technology Adoption for Sustainable Agriculture: Evidence from Wheat Farmers. Applied Sciences (Switzerland), 12(10). https://doi.org/10.3390/app12104902
Krishnan, S., Neyaz, A., & Liu, Q. (2021). IoT Network Attack Detection using Supervised Machine Learning. International Journal of Artificial Intelligence and Expert Systems (IJAE), 10, 18–32. Retrieved from https://www.cscjournals.org/manuscript/Journals/IJAE/Volume10/Issue2/IJAE-201.pdf
Kumar, D., & Kumar, M. (2023). Outsourcing decryption of KP-ABE using elliptic curve cryptography. International Journal of Information and Computer Security, 22(2). https://doi.org/10.1504/IJICS.2023.134961
Ma, H., & Li, J. (2021). An Innovative Method for Digital Media Education Based on Mobile Internet Technology. International Journal of Emerging Technologies in Learning, 16(13). https://doi.org/10.3991/ijet.v16i13.24037
Prasad, V., & Shah, P. K. (2021). A data security module based on crypto and steganography techniques. 2021 2nd International Conference for Emerging Technology, INCET 2021. https://doi.org/10.1109/INCET51464.2021.9456373
Sukaatmadja, I. P. G., Yasa, N. N. K., Santika, I. W., Rahanatha, G. B., Rahmayanti, P. L. D., & Muna, N. (2023). The role of international networking to mediate internet technology capabilities and international entrepreneurship orientation to export performance. Uncertain Supply Chain Management, 11(2). https://doi.org/10.5267/j.uscm.2023.2.004
Tyagi, A. (2020). TCP/IP Protocol Suite. International Journal of Scientific Research in Computer Science, Engineering and Information Technology. https://doi.org/10.32628/cseit206420
Vlachogianni, P., & Tselios, N. (2022). Perceived usability evaluation of educational technology using the System Usability Scale (SUS): A systematic review. Journal of Research on Technology in Education, 54(3), 392–409. https://doi.org/10.1080/15391523.2020.1867938
Vladimirov, S. S., Vybornova, A., Muthanna, A., Koucheryavy, A., & El-Latif, A. A. A. (2023). Network Coding Datagram Protocol for TCP/IP Networks. IEEE Access, 11. https://doi.org/10.1109/ACCESS.2023.3266289
Xiao, M., Huang, Q., Miao, Y., Li, S., & Susilo, W. (2022). Blockchain Based Multi-Authority Fine-Grained Access Control System with Flexible Revocation. IEEE Transactions on Services Computing, 15(6). https://doi.org/10.1109/TSC.2021.3086023
Xu, C., Zhang, J., Zhang, Z., Hou, J., & Wen, X. (2023). Data and Service Security of GNSS Sensors Integrated with Cryptographic Module. Micromachines, 14(2). https://doi.org/10.3390/mi14020454
Xue, Q., Wang, H., & Wei, J. (2023). Internet technology and regional financial fraud: evidence from Broadband expansion in China. Journal of Applied Economics, 26(1). https://doi.org/10.1080/15140326.2023.2281167
Yang, D., Zhou, Y., Huang, W., & Zhou, X. (2021). 5G mobile communication convergence protocol architecture and key technologies in satellite internet of things system. Alexandria Engineering Journal, 60(1). https://doi.org/10.1016/j.aej.2020.09.019
Zhang, M. (2020). Influence of internet technology on mental health and positive emotions of college students. Revista Argentina de Clinica Psicologica, 29(2). https://doi.org/10.24205/03276716.2020.271
Author Biographies
Reza Fahlevi, University of Indonesia
Muhammad Salman, University of Indonesia
Universitas Indonesia
License
Copyright (c) 2024 Reza Fahlevi, Muhammad Salman

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with Jurnal Penelitian Pendidikan IPA, agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution 4.0 International License (CC-BY License). This license allows authors to use all articles, data sets, graphics, and appendices in data mining applications, search engines, web sites, blogs, and other platforms by providing an appropriate reference. The journal allows the author(s) to hold the copyright without restrictions and will retain publishing rights without restrictions.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in Jurnal Penelitian Pendidikan IPA.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).