Privacy Preserving Framework For Smart Home Using Attribute-Based Encryption

International Journal of Computer Science and Engineering
© 2020 by SSRG - IJCSE Journal
Volume 7 Issue 7
Year of Publication : 2020
Authors : Ekeji, P.U, Bennett, E.O, Sako, D. J. S

pdf
How to Cite?

Ekeji, P.U, Bennett, E.O, Sako, D. J. S, "Privacy Preserving Framework For Smart Home Using Attribute-Based Encryption," SSRG International Journal of Computer Science and Engineering , vol. 7,  no. 7, pp. 51-56, 2020. Crossref, https://doi.org/10.14445/23488387/IJCSE-V7I7P109

Abstract:

In computing sense, home security is becoming necessary nowadays as the possibilities of intrusion is increasing day by day. Safety from theft,
leaking of raw gas and fire are the necessary requirements for home security systems. The primary focus of this paper is to provide security and access
control to smart home using an attribute-based encryption system. Attribute-Based Encryption is a type of public key cryptosystem in which the secret key of a user and the ciphertext are associated with the attributes. The ciphertext is associated with some set of user attributes, such that the decryption of ciphertext is possible only if the set of attributes of the user key matches the attributes of the ciphertext. The system was implemented using Hypertext preprocessor (PHP) along with MYSQL as database. Results show that the system was able to control access to smart home environment with the ability of detecting, preventing intruders from gaining access to smart home system.

Keywords:

Ciphertext, Security, Attribute Based Encryption, Smart Home

References:

[1] Satpathy, L. Smart Housing (2009):Technology to Aid Aging in Place. New Opportunities and Challenges. Master’s Thesis, Mississippi State University, Starkville, MS, USA, 2006. 9. Cook, D.J.; Das, S.K. How smart are our environments? An updated look at the state of the art. Pervasive Mob. Comput. 2007, 3, 53–73. [CrossRef].
[2] Alam and Ali (2012) "A living laboratory for the design and evaluation of ubiquitous computing.vol 33, pp. -55.
[3] Rtylin , I., Barnett, K., Miller, E., Bailey, C. (2005). Smart housing and social sustainability: Learning from the residents of Queensland’s Research House. Australian Journal of Emerging Technologies and Society; 3 (1): 43–57.
[4] Ozkan, ND, Berardi, U, GhaffarianHoseini, A, Makaremi, N. (2013). The essence of future smart houses: From embedding ICT to adapting to sustainability principles. Renewable and Sustainable Energy Reviews; 24: 593– 607.
[5] Sahai and Waters (2005)Interfaces,” in Extended Abstracts of the 2005 Conference on Human Factors in Computing Systems, 2005, pp. 1941 - 1944.
[6] Md. ShoaibAktherKiron,Le, Greichen, (2018)“Value based home automation or today's market,” IEEE Transactions on Consumer Electronics, vol. 38, no. 3, pp.34-38, Aug. 1992. Article (CrossRef Link)
[7] G. Ho, D. Leung, P. Mishra,Sahai, Atkin B.(2016)Intelligent Buildings: “Applications of It and Building Automation to High T echnology Construction Projects”, John Wiley & Son, New York. European Parliament. Directive 2010/31/EU of the European Parliament and of the Council of 19 May
2010 on the Energy Performance of Buildings; Directive 2010/31/EU; The European Parliament and the Council of the European Uninion: Brussels, Belgium, 2010.
[8] Aditi Dixit and Anjali Naik (2014) “work on the use of Prediction Algorithms in Smart Homes”. IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 39, pp.240 – 245, Mar. 2009
[9] Sahar F. Sabbeh "Privacy Preservation in the cloud: current solutions and open issues". International Journal of Computer Trends and Technology (IJCTT) V51(1):10-24, September 2017