Attribute-Based Encryption for Secure Data Sharing in IOT Ecosystems
Keywords:
Attribute-Based Encryption, IoT security, data sharing, access control, fine-grained encryption, privacy preservation.Abstract
The proliferation of Internet of Things (IoT) devices has led to unprecedented levels of data generation and sharing. However, ensuring data security and privacy in such dynamic and resource-constrained environments remains a critical challenge. Attribute-Based Encryption (ABE) has emerged as a promising cryptographic technique to enable fine-grained, flexible, and secure access control over shared data. This paper explores the applicability of ABE in IoT ecosystems, discussing its principles, architectures, advantages, and implementation challenges. Additionally, it reviews recent advances and outlines potential research directions to improve the performance and usability of ABE in IoT-based data-sharing scenarios
Downloads
References
A. Sahai and B. Waters, “Fuzzy Identity-Based Encryption,” in Advances in Cryptology – EUROCRYPT 2005, Berlin, Germany: Springer, 2005, pp. 457–473.
J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute-Based Encryption,” in IEEE Symposium on Security and Privacy, Oakland, CA, USA, 2007, pp. 321–334.
H. Li, Y. Dai, D. Tian, and C. Yu, “Achieving Secure and Efficient Dynamic Access Control in IoT Using Attribute-Based Encryption,” IEEE Internet of Things Journal, vol. 4, no. 3, pp. 879–889, Jun. 2017.
S. Yu, K. Ren, and W. Lou, “Attribute-Based Data Sharing with Attribute Revocation,” in Proceedings of the 2010 ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, 2010, pp. 261–270.
T. Zhou, L. Yu, X. Chen, and Y. Zhang, “Blockchain-Based Secure Data Sharing in IoT with Attribute-Based Encryption,” IEEE Access, vol. 7, pp. 117904–117917, 2019.
M. Ambrosin, M. Conti, G. Dini, and R. T. Iacono, “On the Feasibility of Attribute-Based Encryption on IoT Devices,” in Proceedings of the 2015 ACM Symposium on Information, Computer and Communications Security, Singapore, 2015, pp. 846–851.
X. Liang, X. Li, T. H. Luan, R. Lu, X. Lin, and X. Shen, “Morality-Driven Data Forwarding with Privacy Preservation in Mobile Social Networks,” IEEE Transactions on Vehicular Technology, vol. 61, no. 7, pp. 3209–3220, Sep. 2012.
R. Bobba, H. Khurana, and M. Prabhakaran, “Attribute-Based Access Control for Smart Grids,” in Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia, 2009, pp. 1–9.
M. Joye and B. Libert, “A Scalable and Efficient Cryptographic Construction for Privacy-Preserving Data Sharing in Cloud Computing,” IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 468–480, Jul.–Sep. 2017.
J. Hur and D. K. Noh, “Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 7, pp. 1214–1221, Jul. 2011.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
Terms:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.