lishments for new connections. We measured our im-
plementation (one microservice) repeatedly with TLS
and without TLS, in order to understand the connec-
tion overhead. For 1000 repeated new connections the
mean proportion of using TLS compared to not using
TLS was ∆ = 0.9227, i.e. about 92% of the total con-
nection time is dedicated to the TLS protocol.
Table 4: Communication analysis of the scheme’s API con-
nections.
API no TLS (ms) TLS (ms)
/registerClient 96.657 540.98
/requestAccess 169.18 926.81
/proveAccess 175.54 985.12
Total execution time: 441.38 2452.91
The API consists of three main endpoints:
/registerClient is the initial registration of a client in-
cluding key access value generation, /requestAccess
is for requesting access and thus handle the ephemeral
value g
z·sk
ID
, and finally /proveAccess will trigger the
actual crypto function f
k
(·). These HTTP endpoints
take a set of parameters in base64 string format and
are converted into byte streams when handled by the
node. To conclude the experiment, the timing results
for our proof of concept implementation lies within
reasonable timings. As a comparison, a microservice
node in our experiment that only connects to a se-
cure website and receives a HTTP OK response, had
a mean timing of 768.95 ms.
6 CONCLUSION
We have shown a theoretical construction of an
authenticated accumulator-based master key access
scheme, proven its security under type I and II secu-
rity experiments, i.e. secure against forgery and reply
attacks. Our proof-of-concept implementation shows
promising results indicating the feasibility and easy-
to-adopt approach in a microservices context. We ar-
gue that the level of implementation is significantly
easier using wrapper crypto libraries such as jPBC,
than developing code using low-level languages; it
is also closer to real-world microservices applica-
tions where high-level programming languages such
as Java and C# is de facto choice in industry.
REFERENCES
Benaloh, J., de Mare, M., and Automation, G. (1993). One-
Way Accumulators: A Decentralized Alternative To
Digital Signatures. pages 274–285. Springer-Verlag.
Boneh, D., Lynn, B., and Shacham, H. (2001). Short
signatures from the weil pairing. In Advances in
Cryptology–ASIACRYPT ’01, LNCS, pages 514–532.
Springer.
De Caro, A. and Iovino, V. (2011). jpbc: Java pairing based
cryptography. In Proceedings of the 16th IEEE Sym-
posium on Computers and Communications, ISCC
2011, pages 850–855. IEEE. [Online; accessed 08-
February-2022].
Ferreira, L. C. and Dahab, R. (2002). Blinded-key sig-
natures: securing private keys embedded in mobile
agents. In In Proceedings of the 2002 ACM sympo-
sium on Applied computing (ACM SAC’02, pages 82–
86. ACM Press.
Harn, L. (2012). Group authentication. IEEE Transactions
on computers, 62(9):1893–1898.
Joinup (2021). Intelligent transport systems - coopera-
tive, connected and automated mobility (its-ccam) and
electromobility (rp2020). https://joinup.ec.europa.eu/
collection/rolling-plan-ict-standardisation/. [Online;
accessed 27-November-2021].
Karantaidou, I. and Baldimtsi, F. (2021). Efficient construc-
tions of pairing based accumulators. In 2021 2021
IEEE 34th Computer Security Foundations Sympo-
sium (CSF), pages 373–388, Los Alamitos, CA, USA.
IEEE Computer Society.
Ker
¨
anen, A., Kovatsch, F. M., and Hartke, K. (2021).
Guidance on restful design for internet of things
systems. Internet-Draft draft-irtf-t2trg-rest-iot-08,
IETF Secretariat. https://www.ietf.org/archive/id/
draft-irtf-t2trg-rest-iot-08.txt.
Li, J., Chen, X., Li, M., Li, J., Lee, P. P., and Lou, W. (2014).
Secure deduplication with efficient and reliable con-
vergent key management. IEEE Transactions on Par-
allel and Distributed Systems, 25(6):1615–1625.
NordicWay (2021). Interchange node under the nordic way
project. https://github.com/NordicWayInterchange.
[Online; accessed 08-February-2022].
Pahl, M.-O. and Donini, L. (2018). Securing iot mi-
croservices with certificates. In NOMS 2018 -
2018 IEEE/IFIP Network Operations and Manage-
ment Symposium, pages 1–5.
Pereira-Vale, A., M
´
arquez, G., Astudillo, H., and Fernan-
dez, E. B. (2019). Security mechanisms used in
microservices-based systems: A systematic mapping.
In 2019 XLV Latin American Computing Conference
(CLEI), pages 01–10.
Salin, H. and Fokin, D. (2021). Mission impossible: Secur-
ing master keys.
Selvi, S. S. D., Paul, A., Rangan, C. P., Dirisala, S., and
Basu, S. (2019). Splitting and aggregating signatures
in cryptocurrency protocols. In 2019 IEEE Interna-
tional Conference on Decentralized Applications and
Infrastructures (DAPPCON), pages 100–108.
IoTBDS 2022 - 7th International Conference on Internet of Things, Big Data and Security
126