Secure Data Sensor Access for Environmental Health Monitoring in the Pandemic Covid-19 Era with Ubiquitos Computing using Attribute Based Encryption
Keywords:
Internet of Things, Ubiquitos Computing, Wireless Sensor Networks, Security Mechanism, CP-ABEAbstract
In the pandemic covid-19 era, health environment become the most important issue for reducing the increase in cases that occur. On the internet of things era, many researchers are using Ubiquitos Computing with integrating Wireless Sensor Network (WSN) technology to obtain the data for Environmental Health health monitoring system. All of collected data from WSN will be sent and stored in the Data Center, where all of the data can be accesed by users using their end devices such personal computer, laptop and smart phone. The Data Center without security mechanism system it would be very dangerous, because anytime and anywhere every single user can make an intercept, track and even modified of the data. The system need a security mechanism to ensure the confidentiality all of data in the data center with the authenticity in the data will not be changed during the collection process. Ciphertext Policy Attribute-Based Encryption (CP-ABE) is the one of solutions for securing the security, confidentiality, and authenticity of the data with encrypting process where only users with appropriate rule of policy can make a process for decrypting to get the original data. The system with CP-ABE security mechanism is not only securing the data but also providing the guarantee in the data that is no changes during the collection prosess of the data from the Data Center on the ubiquitos computing. the process for encrypting and decrypting the data using CP-ABE only need 160 ms on the process encryption and 60 ms on the process decryption.
References
Munsyi, A. Sudarsono, and M. U. H. Al Rasyid, “Secure data sensor in environmental monitoring system using attribute-based encryption with revocation,” Int. J. Adv. Sci. Eng. Inf. Technol., vol. 7, no. 2, pp. 609–624, 2017, doi: 10.18517/ijaseit.7.2.2175.
N. Fahmi, M. U. H. Al Rasyid, and A. Sudarsono, “Adaptive Sleep Scheduling for Health Monitoring System Based on the IEEE 802.15.4 Standard,” Emit. Int. J. Eng. Technol., vol. 4, no. 1, pp. 91–114, 2016, doi: 10.24003/emitter.v4i1.115.
N. Fahmi, S. Huda, A. Sudarsono, and M. U. H. Al Rasyid, “Fuzzy logic for an implementation environment health monitoring system based on wireless sensor network,” J. Telecommun. Electron. Comput. Eng., vol. 9, no. 2–4, pp. 119–122, 2017.
A. Sudarsono and T. Nakanishi, “An implementation of secure data exchange in wireless delay tolerant network using attribute-based encryption,” Proc. - 2014 2nd Int. Symp. Comput. Networking, CANDAR 2014, pp. 536–542, 2014, doi: 10.1109/CANDAR.2014.34.
A. Lanzolla and M. Spadavecchia, “Wireless sensor networks for environmental monitoring,” Sensors (Switzerland), vol. 21, no. 4, pp. 1–3, 2021, doi: 10.3390/s21041172.
A. Sudarsono, P. Kristalina, M. U. H. Al Rasyid, and R. Hermawan, “An implementation of secure data sensor transmission in Wireless Sensor Network for monitoring environmental health,” Proceeding - 2015 Int. Conf. Comput. Control. Informatics Its Appl. Emerg. Trends Era Internet Things, IC3INA 2015, pp. 93–98, 2016, doi: 10.1109/IC3INA.2015.7377753.
A. Sudarsono, T. Nakanishi, Y. Nogami, and N. Funabiki, “Anonymous IEEE802.1X authentication system using group signatures,” J. Inf. Process., vol. 18, pp. 63–76, 2010, doi: 10.2197/ipsjjip.18.63.
A. Khalique, K. Singh, and S. Sood, “Implementation of Elliptic Curve Digital Signature Algorithm,” Int. J. Comput. Appl., vol. 2, no. 2, pp. 21–27, 2010, doi: 10.5120/631-876.
M. F. A. Muhammad Rashidi Wahab, “Jurnal Teknologi,” J. Teknol., vol. 3, pp. 31–39, 2013.
L. Touati, Y. Challal, and A. Bouabdallah, “C-CP-ABE: Cooperative ciphertext policy attribute-based encryption for the internet of things,” Proc. - 2014 Int. Conf. Adv. Netw. Distrib. Syst. Appl. INDS 2014, pp. 64–69, 2014, doi: 10.1109/INDS.2014.19.
J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” Proc. - IEEE Symp. Secur. Priv., pp. 321–334, 2007, doi: 10.1109/SP.2007.11.
K. Saritha, “Block Chain Authentication Using Elliptic Curve Digital Signature Algorithm,” vol. 3, no. 2, pp. 71–75, 2020.
Downloads
Published
Issue
Section
License
Copyright (c) 2023 Windarsyah Windarsyah, Ichwan Setiawan, Munsyi Munsyi, Rudy Ansari, Mukhaimy Gazali

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.