Attribute-Based Encryption for Secure Data Sharing in IOT Ecosystems

Authors

  • Sudhanshu Shekhar
  • Arvind Kumar Shukla

Keywords:

Attribute-Based Encryption, IoT security, data sharing, access control, fine-grained encryption, privacy preservation.

Abstract

The proliferation of Internet of Things (IoT) devices has led to unprecedented levels of data generation and sharing. However, ensuring data security and privacy in such dynamic and resource-constrained environments remains a critical challenge. Attribute-Based Encryption (ABE) has emerged as a promising cryptographic technique to enable fine-grained, flexible, and secure access control over shared data. This paper explores the applicability of ABE in IoT ecosystems, discussing its principles, architectures, advantages, and implementation challenges. Additionally, it reviews recent advances and outlines potential research directions to improve the performance and usability of ABE in IoT-based data-sharing scenarios

Downloads

Download data is not yet available.

References

A. Sahai and B. Waters, “Fuzzy Identity-Based Encryption,” in Advances in Cryptology – EUROCRYPT 2005, Berlin, Germany: Springer, 2005, pp. 457–473.

J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute-Based Encryption,” in IEEE Symposium on Security and Privacy, Oakland, CA, USA, 2007, pp. 321–334.

H. Li, Y. Dai, D. Tian, and C. Yu, “Achieving Secure and Efficient Dynamic Access Control in IoT Using Attribute-Based Encryption,” IEEE Internet of Things Journal, vol. 4, no. 3, pp. 879–889, Jun. 2017.

S. Yu, K. Ren, and W. Lou, “Attribute-Based Data Sharing with Attribute Revocation,” in Proceedings of the 2010 ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, 2010, pp. 261–270.

T. Zhou, L. Yu, X. Chen, and Y. Zhang, “Blockchain-Based Secure Data Sharing in IoT with Attribute-Based Encryption,” IEEE Access, vol. 7, pp. 117904–117917, 2019.

M. Ambrosin, M. Conti, G. Dini, and R. T. Iacono, “On the Feasibility of Attribute-Based Encryption on IoT Devices,” in Proceedings of the 2015 ACM Symposium on Information, Computer and Communications Security, Singapore, 2015, pp. 846–851.

X. Liang, X. Li, T. H. Luan, R. Lu, X. Lin, and X. Shen, “Morality-Driven Data Forwarding with Privacy Preservation in Mobile Social Networks,” IEEE Transactions on Vehicular Technology, vol. 61, no. 7, pp. 3209–3220, Sep. 2012.

R. Bobba, H. Khurana, and M. Prabhakaran, “Attribute-Based Access Control for Smart Grids,” in Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia, 2009, pp. 1–9.

M. Joye and B. Libert, “A Scalable and Efficient Cryptographic Construction for Privacy-Preserving Data Sharing in Cloud Computing,” IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 468–480, Jul.–Sep. 2017.

J. Hur and D. K. Noh, “Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 7, pp. 1214–1221, Jul. 2011.

Downloads

Published

2025-09-12

How to Cite

1.
Shekhar S, Shukla AK. Attribute-Based Encryption for Secure Data Sharing in IOT Ecosystems. J Neonatal Surg [Internet]. 2025Sep.12 [cited 2025Sep.12];14(1):53-9. Available from: https://www.jneonatalsurg.com/index.php/jns/article/view/9137