Secure Adaptive Context-Aware ABE for Smart Environments
Abstract
:1. Introduction
- Proposes a context-aware, adaptable, intelligent, and lightweight security solution.
- Achieves the novel intelligent dynamic creation of context-awareness policies through smart-learning techniques.
- Provides a context-aware dynamic encryption model by leveraging attribute-based encryption (ABE).
- Formulates the ABE context-awareness policies based on machine-learning techniques.
- Presents a solution that fulfills the newly imposed privacy regulations.
2. Background and Literature Review
2.1. Adaptive Context Awareness
2.2. Attribute-Based Encryption
2.3. Summary of the Literature Reviews
3. Architecture
- The context broker is the entry point for all the data coming from the sensors and different services, and it also acts as a medium for the services to access the sensors and service data. The context broker has two functionalities:
- –
- When the context broker receives data, it generates a context based on the location, time, activity, etc., as attributes, and transfers the data and the attributes to the ABE policy generator for further processing.
- –
- When the context broker receives a request from a service provider, it retrieves the context from the environment and uses the classification algorithm to decide whether the service provider has the rights to access the data. If the service provider has access, then the context broker gives the service provider access to the database to access the data; otherwise, it does not. Once the decision is completed, the context and the decision are both sent to the policy storage for future use.
- The ABE policy generator uses the attributes received from the context broker and uses the model generated by the model generator to generate a CP-ABE policy, and then forwards the data and the policy to the encryption engine. Furthermore, it sends the policy to the policy store as a dataset entry for future use.
- The encryption engine encrypts the data using the policy received from the ABE policy generator using CP-ABE and saves it in the database.
- The policy store is a database that stores the context and decision for the service providers, as well as the ABE policy generated for each context, all of which will be used by the model generator.
- The model generator periodically collects the data stored in the policy store to generate machine-learning models, which will be used by the context broker and ABE policy generator. For the context broker, it uses the naive Bayes classification model, while for the ABE policy generator, it generates a Markov chain.
- The key management system (KMS) generates and stores all the necessary keys, such as the master key, public key, and private key, for the whole ecosystem.
- The decryptor is a decryption module used by the service providers to decrypt the data they requested. The decryptor will try to decrypt the data using the secret key from the service provider, and if the service provider has access to the data, then it will return the data, else it will return denied access to the data.
- The data store is storage in the cloud, or can be in the device itself, where the data are stored after the encryption process in complete.
- The service provider is the application or cloud service that the user has subscribed to.
4. Problem Definition
- The applications need to access the data, but due to security reasons, that needs to be controlled based on the permission, context, source, and application details. The access granted to the application is either “Allow” or “Deny”, which is a binary classification problem wherein the permission, context, source, etc., can be viewed as features, and based on these features, we need to classify whether the application will be granted access or not.
- The context provided by the system needs to be transformed into ABE policy automatically, using operators such as “AND” or “OR” and contexts such as “time”, “location”, etc., which can be viewed as prediction problems. We need to predict the best possible operators and contexts for encrypting the data that can satisfy the user’s behaviour.
4.1. Context-Aware Access Control
4.2. Dynamic ABE Policy
4.3. Algorithm
Algorithm 1: Access Control |
|
Algorithm 2: Policy Generator |
|
5. Experimentation and Evaluation
5.1. Use-Cases
5.1.1. Scenario 1: Exercising
- Rule 1: The fitness app may have access to heartbeat and accelerator meter sensors while exercising.
- Rule 2: The fitness app may only access the heartbeat and accelerator meter sensors while Bob is at the park.
- Rule 3: The fitness app may only access the heartbeat and accelerator sensors at 6:00 a.m. or 6:00 p.m.
- Rule 4: The fitness app may never share/access the location.
- ❑
- The context-aware access control policy:
- –
- Allow← Activity∧ Location∧ Time∨ Time← Data
- –
- Deny← Activity∧ Location∧ Time∨ Time← Data
- ❑
- The ABE policy at that specific moment, which are the data collected at 6am for different sensors, is as follows:
- –
- Data → Application = ‘Fitness Application’ AND Location = ‘park’ AND Time = ‘6am’ AND Activity = ‘Sport’
- –
- Data → Application = ‘Fitness Application’ AND Location = ‘park’ AND Time = ‘6am’ AND Activity = ‘Sport’
- –
- Data → Application = ‘’ AND Location = ‘park’ AND Time = ‘6am’ AND Activity = ‘Sport’
5.1.2. Scenario 2: Meeting with a Supervisor
- Rule 1: No app can have access to the voice recorder and camera while in meetings.
- Rule 2: No app can have access to the voice recorder and camera while in a meeting in the meeting room.
- Rule 3: No app can have access to the voice recorder and camera while in a meeting in the meeting room during specific time frames.
- Rule 4: During meetings, no app may ever share/access the location.
- ❑
- The context-aware access control policy:
- –
- Deny ← Activity ∧ Location ∨ Time ∧ Time← Data
- ❑
- The ABE policy at that specific moment, which are the data collected at 11am for different sensors:
- –
- Data → Application = ‘All’ AND Activity = ‘Meeting’ AND Location = ‘Meeting Room’ OR Time = ‘11am’
- –
- Data → Application = ‘Personal’ AND Activity = ‘Meeting’ AND Location = ‘Meeting Room’ OR Time = ‘11am’
- –
- Data → Application = ‘Personal’ AND Activity = ‘Meeting’ AND Location = ‘Meeting Room’ AND Time = ‘11am’
5.1.3. Scenario 3: Driving a Car
- Rule 1: The insurance app has no access to GPS tracking and navigation while driving.
- Rule 2: No app can send/receive notifications while driving.
- ❑
- The context-aware access control policy:
- –
- Deny ← Activity ← Data
- –
- Deny ← Activity ← Data
- ❑
- The ABE policy at that specific moment, which are the data collected at 5pm for the GPS sensor:
- –
- Data → Application = ‘≠ Insurance’ AND Activity = ‘Driving’ AND Location = ‘Peel’ AND Time = ‘5pm’
5.1.4. Scenario 4: Smart Home
- Rule 1: All health apps may have access to heartbeat sensors while sleeping.
- Rule 2: All apps may only access heartbeat and accelerator sensors while Bob is at the park.
- Rule 3: No app may ever share/access the exact location while Bob is at home.
- ❑
- The context-aware access control policy:
- –
- Allow ← Activity ← Data
- –
- Deny ← Activity ← Data
- –
- Deny ← Activity ← Data
- ❑
- The ABE policy at that specific moment, which are the data collected at 11pm for the GPS sensor:
- –
- Data→ Application = ‘Fitness Application’ AND Location = ‘park’ AND Time = ‘11pm’AND Activity = ‘Sleeping’ OR Activity = ‘TV’
- –
- Data→ Application = ‘Fitness Application’ AND Location = ‘park’ AND Time = ‘11pm’ AND Activity = ‘Sleeping’ OR Activity = ‘TV’
- –
- Data→ Application = ‘’ AND Location = ‘park’ AND Time = ‘11pm’ AND AND Activity = ‘Sleeping’ OR Activity = ‘TV’
5.2. Implementation
5.2.1. Dataset
- Permissions requested by applications include the name of the sensor it is accessing, the type of resources, and the security level;
- Google Map data while driving, which includes the latitude and longitude;
- Permissions of the services, mainly the GPS, and services requested by the Fitbit;
- Activity tracking, which includes sleep, exercise, swimming, heart rate, SpO2, steps, time in heart-rate zone, and calories burned during that time.
5.2.2. Deployment
5.3. Evaluation
6. Conclusions and Future Work
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Schilit, B.N.; Theimer, M.M. Disseminating active map information to mobile hosts. IEEE Netw. 1994, 8, 22–32. [Google Scholar] [CrossRef]
- Georgakopoulos, D.; Zaslavsky, A.; Perera, C. Sensing as a service and big data. In Proceedings of the International Conference on Advances in Cloud Computing (ACC’12), Bangalore, India, 26–28 July 2012. [Google Scholar] [CrossRef]
- Text, O.L. General Data Protection Regulation (GDPR). 2022. Available online: https://gdpr-info.eu/ (accessed on 18 October 2022).
- Ftc Privacy and Data Security. 2012. Available online: https://www.ftc.gov/policy/reports (accessed on 18 October 2022).
- Cybersecurity and Infrastructure Security Agency CISA. 2022. Available online: https://www.cisa.gov/federal-information-security-modernization-act (accessed on 18 October 2022).
- Sarker, I.H.; Colman, A.; Han, J.; Khan, A.I.; Abushark, Y.B.; Salah, K. Behavdt: A behavioral decision tree learning to build user-centric context-aware predictive model. Mob. Netw. Appl. 2020, 25, 1151–1161. [Google Scholar] [CrossRef]
- Nawrocki, P.; Sniezynski, B.; Kolodziej, J.; Szynkiewicz, P. Adaptive context-aware service optimization in mobile cloud computing accounting for security aspects. Concurr. Comput. Pract. Exp. 2020, 33, e6070. [Google Scholar] [CrossRef]
- Mshali, H.; Lemlouma, T.; Magoni, D. Adaptive monitoring system for e-health smart homes. Pervasive Mob. Comput. 2018, 43, 1–19. [Google Scholar] [CrossRef]
- Alkhresheh, A.; Elgazzar, K.; Hassanein, H.S. Context-aware automatic access policy specification for iot environments. In Proceedings of the 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), Limassol, Cyprus, 25–29 June 2018; pp. 793–799. [Google Scholar] [CrossRef]
- Sarker, I.H.; Salah, K. Appspred: Predicting context-aware smartphone apps using random forest learning. Internet Things 2019, 8, 100106. [Google Scholar] [CrossRef]
- Phung, P.H.; Mohanty, A.; Rachapalli, R.; Sridhar, M. Hybridguard: A principal-based permission and fine-grained policy enforcement framework for web-based mobile applications. In Proceedings of the 2017 IEEE Security and Privacy Workshops (SPW), San Jose, CA, USA, 25 May 2017; pp. 147–156. [Google Scholar] [CrossRef]
- Inshi, S.; Chowdhury, R.; Elarbi, M.; Ould-Slimane, H.; Talhi, C. LCA-ABE: Lightweight context-aware encryption for android applications. In Proceedings of the 2020 International Symposium on Networks, Computers and Communications (ISNCC), Montreal, QC, Canada, 20–22 October 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Selvan, S.; Mahinderjit Singh, M. Adaptive Contextual Risk-Based Model to Tackle Confidentiality-Based Attacks in Fog-IoT Paradigm. Computers 2022, 11, 16. [Google Scholar] [CrossRef]
- Kim, J.C.; Chung, K. Neural-network based adaptive context prediction model for ambient intelligence. J. Ambient. Intell. Humaniz. Comput. 2020, 11, 1451–1458. [Google Scholar] [CrossRef]
- Michalakis, K.; Caridakis, G. Context awareness in cultural heritage applications: A survey. ACM J. Comput. Cult. Herit. (JOCCH) 2022, 15, 1–31. [Google Scholar] [CrossRef]
- Kavitha, D.; Ravikumar, S. IOT and context-aware learning-based optimal neural network model for real-time health monitoring. Trans. Emerg. Telecommun. Technol. 2021, 32, e4132. [Google Scholar] [CrossRef]
- Jancic, A.; Warren, M.J. PKI-Advantages and Obstacles. In Proceedings of the AISM, Perth, Australia, 26 November 2004; pp. 104–114. [Google Scholar]
- Goyal, V.; Pandey, O.; Sahai, A.; Waters, B. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 30 October–3 November 2006; pp. 89–98. [Google Scholar] [CrossRef]
- Abowd, G.D.; Dey, A.K.; Brown, P.J.; Davies, N.; Smith, M.; Steggles, P. Towards a better understanding of context and context-awareness. In International Symposium on Handheld and Ubiquitous Computing; Springer: Berlin/Heidelberg, Germany, 1999; pp. 304–307. [Google Scholar] [CrossRef]
- Perera, C.; Zaslavsky, A.; Christen, P.; Georgakopoulos, D. Context aware computing for the internet of things: A survey. IEEE Commun. Surv. Tutor. 2013, 16, 414–454. [Google Scholar] [CrossRef]
- Sarker, I.H.; Kayes, A.; Watters, P. Effectiveness analysis of machine-learning classification models for predicting personalized context-aware smartphone usage. J. Big Data 2019, 6, 57. [Google Scholar] [CrossRef]
- Bethencourt, J.; Sahai, A.; Waters, B. Ciphertext-policy attribute-based encryption. In Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP’07), Berkeley, CA, USA, 20–23 May 2007; pp. 321–334. [Google Scholar] [CrossRef]
- Zhang, Y.; Deng, R.H.; Xu, S.; Sun, J.; Li, Q.; Zheng, D. Attribute-based encryption for cloud computing access control: A survey. ACM Comput. Surv. (CSUR) 2020, 53, 1–41. [Google Scholar] [CrossRef]
- Oberko, P.S.K.; Obeng, V.H.K.S.; Xiong, H. A survey on multiauthority and decentralized attribute-based encryption. J. Ambient. Intell. Humaniz. Comput. 2021, 13, 515–533. [Google Scholar] [CrossRef]
- Ullah, A.; Azeem, M.; Ashraf, H.; Alaboudi, A.A.; Humayun, M.; Jhanjhi, N. Secure healthcare data aggregation and transmission in IoT—A survey. IEEE Access 2021, 9, 16849–16865. [Google Scholar] [CrossRef]
- Ambrosin, M.; Conti, M.; Dargahi, T. On the feasibility of attribute-based encryption on smartphone devices. In Proceedings of the 2015 Workshop on IoT Challenges in Mobile and Industrial Systems, Florence, Italy, 21 May 2015; pp. 49–54. [Google Scholar] [CrossRef]
- Maheswari, S.; Gudla, U. Secure sharing of personal health records in Jelastic cloud by attribute based encryption. In Proceedings of the 2017 Fourth International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 6–7 January 2017; pp. 1–4. [Google Scholar] [CrossRef]
- Akinyele, J.A.; Pagano, M.W.; Green, M.D.; Lehmann, C.U.; Peterson, Z.N.; Rubin, A.D. Securing electronic medical records using attribute-based encryption on mobile devices. In Proceedings of the first ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Chicago, IL, USA, 17 October 2011; pp. 75–86. [Google Scholar] [CrossRef]
- Taha, M.B.; Chowdhury, R. GALB: Load Balancing Algorithm for CP-ABE Encryption Tasks in E-Health Environment. In Proceedings of the 2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), Bangalore, India, 26–27 November 2020; pp. 165–170. [Google Scholar] [CrossRef]
- Chowdhury, R.; Ould-Slimane, H.; Talhi, C.; Cheriet, M. Attribute-based encryption for preserving smart home data privacy. In International Conference on Smart Homes and Health Telematics; Springer: Cham, Switzerland, 2017; pp. 185–197. [Google Scholar] [CrossRef]
- Tan, Y.L.; Goi, B.M.; Komiya, R.; Tan, S.Y. A study of attribute-based encryption for body sensor networks. In International Conference on Informatics Engineering and Information Science; Springer: Berlin/Heidelberg, Germany, 2011; pp. 238–247. [Google Scholar] [CrossRef]
- Shao, J.; Lu, R.; Lin, X. Fine-grained data sharing in cloud computing for mobile devices. In Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, 26 April–1 May 2015; pp. 2677–2685. [Google Scholar] [CrossRef]
- Taha, M.B.; Ould-Slimane, H.; Talhi, C. Smart offloading technique for CP-ABE encryption schemes in constrained devices. SN Appl. Sci. 2020, 2, 274. [Google Scholar] [CrossRef]
- Inshi, S.; Elarbi, M.; Chowdhury, R.; Ould-Slimane, H.; Talhi, C. CAPEF: Context-Aware Policy Enforcement Framework for Android Applications. J. Eng. Res. Sci. 2023, 2, 13–23. [Google Scholar] [CrossRef]
- Annane, B.; Alti, A.; Lakehal, A. Blockchain based context-aware CP-ABE schema for Internet of Medical Things security. Array 2022, 14, 100150. [Google Scholar] [CrossRef]
- Annane, B.; Alti, A.; Laouamer, L.; Reffad, H. Cx-CP-ABE: Context-aware attribute-based access control schema and blockchain technology to ensure scalable and efficient health data privacy. Secur. Priv. 2022, 5, e249. [Google Scholar] [CrossRef]
- Raftery, A.E. A model for high-order Markov chains. J. R. Stat. Soc. Ser. (Methodol.) 1985, 47, 528–539. [Google Scholar] [CrossRef]
- Ching, W.K.; Huang, X.; Ng, M.K.; Siu, T.K. Higher-order markov chains. In Markov Chains; Springer: Boston, MA, USA, 2013; pp. 141–176. [Google Scholar] [CrossRef]
- Dalianis, H. Evaluation Metrics and Evaluation. In Clinical Text Mining: Secondary Use of Electronic Patient Records; Springer International Publishing: Cham, Switzerland, 2018; pp. 45–53. [Google Scholar] [CrossRef]
Reference | Domain | Rule Base | Machine Learning Algorithm | Context aware | Dynamic | Multi Users | Privacy | ABE |
---|---|---|---|---|---|---|---|---|
BehavDT [6] | Mobile | ✗ | Decision Tree | ✓ | ✓ | ✗ | ✗ | ✗ |
ACAO [7] | Mobile Cloud Computing | ✗ | Naïve Bayes (NB), Decision Tree, Random Forest | ✓ | ✓ | ✗ | ✓ | ✗ |
SMAF [8] | E-health | ✗ | Grey Model (GM) | ✓ | ✓ | ✗ | ✗ | ✗ |
[9] | IoT | ✓ | ✗ | ✓ | ✓ | ✗ | ✓ | ✗ |
AppsPred [10] | Smart home | ✓ | Random Forest | ✓ | ✓ | ✗ | ✗ | ✗ |
HybridGuard [11] | Hybrid Mobile | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ |
LCA-ABE [12] | Mobile | ✓ | ✗ | ✓ | ✗ | ✗ | ✓ | ✓ |
Our work | Smart Environment | ✓ | Artificial Neural Network Markov Chain | ✓ | ✓ | ✓ | ✓ | ✓ |
Application | Permission | Context | Source | User | Decision | |||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Name | Class | Visibility | API | Name | Resource Type | Security Level | Time | Location | Activity | |||
Fitness | Well-being | Background | Get data | GPS | GPS | Medium | 700 | Park | Jogging | GPS | Bob | Allow |
Fitness | Well-being | Background | Get data | GPS | GPS | High | 900 | Office | Meeting | GPS | Bob | Deny |
Map | Navigation | Background | All | All | Notification | Medium | 800 | Hollywood Boulevard | Driving | Apps | Bob | Deny |
Map | Navigation | Background | GPS | GPS | Notification | Medium | 800 | Hollywood Boulevard | Driving | Apps | Bob | Allow |
Bob | 5am | 7am | Sleep | Exercise | Well-Being | |||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
AND | OR | AND | OR | AND | OR | AND | OR | AND | OR | AND | OR | |
Bob | 0 | 0 | 0.3 | 0 | 0.5 | 0 | 0.02 | 0.02 | 0.03 | 0.04 | 0.03 | 0.06 |
5am | 0 | 0 | 0 | 0 | 0 | 0 | 0.4 | 0.3 | 0.1 | 0.05 | 0.06 | 0.09 |
7am | 0 | 0 | 0 | 0 | 0 | 0 | 0.15 | 0.15 | 0.3 | 0.2 | 0.1 | 0.1 |
Sleep | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 |
Exercise | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.4 | 0.6 |
Raspberry Pi | Desktop PC | |
---|---|---|
Processor | 1.2 GHz 64 bit quad-core ARM Cortex-A53 | 3.2 GHz 4 core |
RAM | 1 GB | 8 GB |
Storage | 16 GB eMMC flash storage | 320 GB |
Operating System | Raspberian Debian OS | Ubuntu |
Algorithm | Precision | Recall | F1 | Training Time | |
---|---|---|---|---|---|
Access Control | Logistic Regression | 0.9183 | 0.8681 | 0.8925 | 0.0086 |
Decision Tree | 0.9248 | 0.8348 | 0.8755 | 0.0024 | |
Algorithm 1 (Naive Bayes) | 0.9515 | 0.9062 | 0.9283 | 0.0037 | |
Policy Generator | Random Forrest | 0.8426 | 0.6775 | 0.7324 | 0.4581 |
LSTM | 0.8936 | 0.7976 | 0.8429 | 34.7515 | |
Algorithm 2 | 0.8926 | 0.913 | 0.9027 | 2.8564 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Inshi, S.; Chowdhury, R.; Ould-Slimane, H.; Talhi, C. Secure Adaptive Context-Aware ABE for Smart Environments. IoT 2023, 4, 112-130. https://doi.org/10.3390/iot4020007
Inshi S, Chowdhury R, Ould-Slimane H, Talhi C. Secure Adaptive Context-Aware ABE for Smart Environments. IoT. 2023; 4(2):112-130. https://doi.org/10.3390/iot4020007
Chicago/Turabian StyleInshi, Saad, Rasel Chowdhury, Hakima Ould-Slimane, and Chamseddine Talhi. 2023. "Secure Adaptive Context-Aware ABE for Smart Environments" IoT 4, no. 2: 112-130. https://doi.org/10.3390/iot4020007
APA StyleInshi, S., Chowdhury, R., Ould-Slimane, H., & Talhi, C. (2023). Secure Adaptive Context-Aware ABE for Smart Environments. IoT, 4(2), 112-130. https://doi.org/10.3390/iot4020007