A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT.pptx

streamwaytechnologie 11 views 22 slides Oct 03, 2024
Slide 1
Slide 1 of 22
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22

About This Presentation

Streamway Technologies pvt ltd is helping to student to get preprepared ppt to submit their academic project


Slide Content

ABSTRACT In Information-Centric Internet of Things ( ICIoT ), IoT data can be cached throughout a network for close data copy retrievals. Such a distributed data caching environment, however, poses a challenge to flexible authorization in the network. To address this challenge, Ciphertext -Policy Attribute-Based Encryption (CP-ABE) has been identified as a promising approach . However in the existing CP-ABE scheme, publishers need to retrieve attributes from a centralized server for encrypting data, which leads to high communication overhead. To solve this problem, we incorporate CP-ABE and propose a novel Distributed Publisher-driven secure Data sharing for ICIoT (DPD- ICIoT ) to enable only authorized users to retrieve IoT data from distributed cache.

CONT.. 4. In DPDICIoT , newly introduced Attribute Manifest (AM) is cached in the network, through which publishers can retrieve the attributes from nearby copy holders instead of a centralized attribute server. 5. In addition, a key chain mechanism is utilized for efficient cryptographic operations, and an Automatic Attribute Self-update Mechanism (AASM) is proposed to enable fast updates of attributes without querying centralized servers. 6. According to the performance evaluation, DPD- ICIoT achieves lower bandwidth cost compared to the existing CPABE scheme

EXISTING SYSTEM Flexible and fine-grained access control in cloud computing has been realized through Cipher text Policy Attribute-Based Encryption (CPABE) with centralized server(s), wherein all attribute values and access policies are retrieved from the servers. In this paper, we denote these schemes as the existing CP-ABE scheme. The existing CP-ABE scheme does not consider a ubiquitous distributed caching environment and completely relies on centralized servers/clouds, which restricts the scalability of IoT systems.

DIS ADVANTAGES None of them focus on flexible IoT data access control in ICIoT Existing system conventional work on IoT network security and AAA is designed based on an end-to-end principle, which is not adequate for emerging ICIoT . The existing CP-ABE scheme does not consider a ubiquitous distributed caching environment and completely relies on centralized servers/clouds, which restricts the scalability of IoT systems.

PROPOSED SYSTEM We propose a Distributed Publisher driven secure Data sharing for ICIoT (DPD- ICIoT ) to enable IoT data to be securely shared based on publisher defined policy. DPD- ICIoT provides flexible authorization from publishers to users. In DPD- ICIoT , CP-ABE is employed to provide flexible authorization from publishers to users. To balance centralized management and distributed retrievals for attributes, attribute manifest (AM) and data manifest (DM) are introduced and distributedly cached in the network. Thus, publishers can retrieve AMs from close copyholders instead of the centralized attribute servers. Herein , AM and DM are the data chunks, with the type of “Manifest”, that describe attributes and data, respectively. Further, to reduce the large traffic overhead of attribute updates, we propose an Automatic Attribute Self-update Mechanism (AASM) to enable the update of attributes without querying the distant server.

ADVANTAGES Compared with the existing CP-ABE scheme, the total bandwidth cost in packet transmissions consumed for attribute retrievals can be greatly reduced. To the best of our knowledge, this is the first work to investigate publisher-driven fine-grained access control in a ubiquitously distributed caching scenario for ICIoT . We integrate CP-ABE with the typical ICN, CCN/NDN and propose a novel DPD- ICIoT scheme for providing distributed, secure, and flexible data sharing for ICIoT . We employ a key chain mechanism for efficient data encryption and decryption.

MODULES: Publisher User Publisher: Here the publisher no need to register he can directly login with default username and password provided by the developer, the publisher has three modules such as upload and dsa . here the publisher can upload the file. DSA: Here the dsa responsibility to send the key to the user who are sent the request for the file download, if the dsa send key to the user only he can download the file, until and unless he can’t download the file.

2.User Here the user has to register with the project then only he can login into the main project, The user responsibilities are request , download .the user can download the requested file after he got the key from the dsa . then use that key for the key verification then only user can download the requested file

ARCHITECTURE

UML DIAGRAMS USECASE

CONT..

CONT..

CLASS DIAGRAM

SEQUENCE DIAGRAM

COLLABORATION

SCREEN SHOTS

CONT..

CONT..

CONT..

CONT..

C ONCLUSION To march toward secure IoT data sharing, we investigated the IoT data sharing problem with regard to unauthorized access, illegal modifications , and impersonation attack, when IoT data are cached in a distributed manner in the network. The contributions in this paper are summarized as follows. We provided system descriptions and identified the security requirements for atypical IoT datasharingscenario in distributed caching environment. We proposed a novel DPD- ICIoT scheme to enable secure and flexible access control for IoT data, which absorbs the merits from both CP-ABE and CCN. The DPD- ICIoT scheme employs a key chain mechanism to provide efficient cryptographic operations.

REFERENCES 1. A. Al- Fuqaha M. Guizani M. Mohammadi M. Aledhari M. Ayyash "Internet of Things: A survey on enabling technologies protocols and applications" < em >IEEE Commun . Surveys Tuts .</ em > vol. 17 no. 4 pp. 2347-2376 4th Quart. 2015.  2. J. Granjal E. Monteiro J. S. Silva "Security for the Internet of Things: A survey of existing protocols and open research issues" < em >IEEE Commun . Surveys Tuts .</ em > vol. 17 no. 3 pp. 1294-1312 3rd Quart. 2015.  3. M. Al- Naday M. Reed D. Trossen K. Yang "Information resilience: Source recovery in an information-centric network" < em >IEEE Netw .</ em > vol. 28 no. 3 pp. 36-42 May/Jun. 2014.  4. R. Li H. Asaeda "A community-oriented route coordination using information centric networking approach" < em >Proc. 38th IEEE Conf. Local Comput . Netw . (LCN)</ em > pp. 793-800 Oct. 2013.  5. G. Piro I. Cianci L. A. Grieco G. Boggia P. Camarda "Information centric services in smart cities" < em >J. Syst. Softw .</ em > vol. 88 pp. 169-188 Feb. 2014. 
Tags