A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch

Author:

Fang Liming,Li Minghui,Zhou LuORCID,Zhang Hanyi,Ge Chunpeng

Abstract

A smart watch is a kind of emerging wearable device in the Internet of Things. The security and privacy problems are the main obstacles that hinder the wide deployment of smart watches. Existing security mechanisms do not achieve a balance between the privacy-preserving and data access control. In this paper, we propose a fine-grained privacy-preserving access control architecture for smart watches (FPAS). In FPAS, we leverage the identity-based authentication scheme to protect the devices from malicious connection and policy-based access control for data privacy preservation. The core policy of FPAS is two-fold: (1) utilizing a homomorphic and re-encrypted scheme to ensure that the ciphertext information can be correctly calculated; (2) dividing the data requester by different attributes to avoid unauthorized access. We present a concrete scheme based on the above prototype and analyze the security of the FPAS. The performance and evaluation demonstrate that the FPAS scheme is efficient, practical, and extensible.

Funder

National Natural Science Foundation of China

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry

Reference46 articles.

1. The Smartwatch Reporthttps://www.businessinsider.com/smartwatch-and-wearables-research-forecasts-trends-market-use-cases-2016-9

2. I am a "Smart" watch, Smart Enough to Know the Accuracy of My Own Heart Rate Sensor

3. IDC: China’s Smart Watch Market Grew Rapidly in the Third Quarter of 2018, up 72% Year-on-Yearhttps://www.idc.com/getdoc.jsp?containerId=prCHC44586018

4. Germany Bans Children’s Smartwatcheshttps://www.bbc.com/news/technology-42030109

5. Significant Security Flaws in Smartwatches for Childrenhttps://www.forbrukerradet.no/side/significant-security-flaws-in-smartwatches-for-children/

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Vulnerability Analysis and Exploitation Attacks on Smart Wearable Devices;2024 2nd International Conference on Advancement in Computation & Computer Technologies (InCACCT);2024-05-02

2. A Cloud-Assisted Proxy Re-Encryption Scheme for Efficient Data Sharing Across IoT Systems;Research Anthology on Convergence of Blockchain, Internet of Things, and Security;2022-07-08

3. Cloud Computing Storage Data Access Control Method Based on Dynamic Re-Encryption;Security and Communication Networks;2021-12-09

4. A Cloud-Assisted Proxy Re-Encryption Scheme for Efficient Data Sharing Across IoT Systems;International Journal of Information Technology and Web Engineering;2020-10

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3