Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments

被引:0
|
作者
Lin, Han-Yu [1 ]
Chen, Pei-Ru [1 ]
机构
[1] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung 202, Taiwan
关键词
fog computing; proxy; re-encryption; revocation; IoT;
D O I
10.3390/s24196290
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
As technology advances rapidly, a diverse array of Internet of Things (IoT) devices finds widespread application across numerous fields. The intelligent nature of these devices not only gives people more convenience, but also introduces new challenges especially in security when transmitting data in fog-based cloud environments. In fog computing environments, data need to be transmitted across multiple devices, increasing the risk of data being intercepted or tampered with during transmission. To securely share cloud ciphertexts, an alleged proxy re-encryption approach is a commonly adopted solution. Without decrypting the original ciphertext, such a mechanism permits a ciphertext intended for user A to be easily converted into the one intended for user B. However, to revoke the decryption privilege of data users usually relies on the system authority to maintain a user revocation list which inevitably increases the storage space. In this research, the authors come up with a fog-based proxy re-encryption system with revocable identity. Without maintaining the traditional user revocation list, the proposed scheme introduces a time-updated key mechanism. The time-update key could be viewed as a partial private key and should be renewed with different time periods. A revoked user is unable to obtain the renewed time-update key and hence cannot share or decrypt cloud ciphertexts. We formally demonstrate that the introduced scheme satisfies the security of indistinguishability against adaptively chosen identity and chosen plaintext attacks (IND-PrID-CPA) assuming the hardness of the Decisional Bilinear Diffie-Hellman (DBDH) problem in the random oracle model. Furthermore, compared with similar systems, the proposed one also has lower computational complexity as a whole.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] Data sharing using proxy re-encryption based on DNA computing
    Ahmed Elhadad
    Soft Computing, 2020, 24 : 2101 - 2108
  • [32] Fine-Grained Access Control Scheme Based on Improved Proxy Re-Encryption in Cloud
    Xu, Zhenwu
    Shen, Jinan
    Liang, Fang
    Chen, Yingjie
    JOURNAL OF ADVANCED COMPUTATIONAL INTELLIGENCE AND INTELLIGENT INFORMATICS, 2021, 25 (02) : 170 - 176
  • [33] Revocation in attribute-based encryption for fog-enabled internet of things: A systematic survey
    Penuelas-Angulo, Alejandro
    Feregrino-Uribe, Claudia
    Morales-Sandoval, Miguel
    INTERNET OF THINGS, 2023, 23
  • [34] Task Offloading Strategy and Pricing Scheme in Fog-Enabled Networks
    Yang, Fuqian
    Cai, Penghao
    Qian, Hua
    Luo, Xiliang
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [35] SMRETO: Stable Matching for Reliable and Efficient Task Offloading in Fog-Enabled IoT Networks
    Malik, Usman Mahmood
    Javed, Muhammad Awais
    Frnda, Jaroslav
    Nedoma, Jan
    IEEE ACCESS, 2022, 10 : 111579 - 111590
  • [36] JOTE: Joint Offloading of Task and Energy in Fog-Enabled IoT Networks
    Cai, Penghao
    Yang, Fuqian
    Zhao, Yao
    Qian, Hua
    Luo, Xiliang
    2019 IEEE 90TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-FALL), 2019,
  • [37] Fog-Enabled IoT Robotic System for Efficient Date Palm Monitoring in Moroccan Oases
    Mohamed, Baghrous
    Abdellatif, Ezzouhairi
    IOT, 2025, 6 (01):
  • [38] Secure Content Distribution Using Multi-hop Proxy Re-encryption
    Han-Yu Lin
    Wireless Personal Communications, 2015, 82 : 1449 - 1459
  • [39] FoMS: Fog-enabled Mobile Sensor Virtualization Architecture for IoT Applications
    Roy, Arijit
    Kusumanjali, Krovvidi
    Kiran, Padala Abhinav
    Nait-Abdesselam, Farid
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 3536 - 3541
  • [40] JOTE: Joint Offloading of Tasks and Energy in Fog-Enabled IoT Networks
    Cai, Penghao
    Yang, Fuqian
    Wang, Jianjia
    Wu, Xing
    Yang, Yang
    Luo, Xiliang
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04): : 3067 - 3082