Smart City Gnosys

Smart city article details

Title Robust Access Control For Secure Iot Outsourcing With Leakage Resilience
ID_Doc 46809
Authors Riad K.
Year 2025
Published Sensors, 25, 3
DOI http://dx.doi.org/10.3390/s25030625
Abstract The Internet of Things (IoT) has revolutionized various industries by enabling seamless connectivity and data exchange among devices. However, the security and privacy of outsourced IoT data remain critical challenges, especially given the resource constraints of IoT devices. This paper proposes a robust and leakage-resilient access control scheme based on Attribute-Based Encryption (ABE) with partial decryption outsourcing. The proposed scheme minimizes computational overhead on IoT devices by offloading intensive decryption tasks to the cloud, while ensuring resilience against master secret key leakage, side-channel attacks, and other common security threats. Comprehensive security analysis demonstrates the scheme’s robustness under standard cryptographic assumptions, and performance evaluations show significant improvements in decryption efficiency, scalability, and computational performance compared to existing solutions. The proposed scheme offers a scalable, efficient, and secure access control framework, making it highly suitable for real-world IoT deployments across domains such as smart healthcare, industrial IoT, and smart cities. © 2025 by the author.
Author Keywords access control; attribute-based encryption (ABE); Internet of Things (IoT); leakage resilience; master secret key protection; outsourced decryption; secure data outsourcing; side-channel attacks


Similar Articles


Id Similarity Authors Title Published
5221 View0.912Rasori M.; Manna M.L.; Perazzo P.; Dini G.A Survey On Attribute-Based Encryption Schemes Suitable For The Internet Of ThingsIEEE Internet of Things Journal, 9, 11 (2022)
1273 View0.906Wu C.-Y.; Huang K.-H.; Hsu C.-Y.A Decentralised Multi-Authority Attribute-Based Encryption For Secure And Scalable Iot Access ControlApplied Sciences (Switzerland), 15, 7 (2025)
11067 View0.902Shruti; Rani S.; Sah D.K.; Gianini G.Attribute-Based Encryption Schemes For Next Generation Wireless Iot Networks: A Comprehensive SurveySensors, 23, 13 (2023)
47934 View0.865Padmavathi V.; Saminathan R.Security For The Internet Of ThingsComputer and Information Security Handbook, Fourth Edition: Volumes 1-2, 1 (2024)