Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments

被引:0
|
作者
Lin, Han-Yu [1 ]
Chen, Pei-Ru [1 ]
机构
[1] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung 202, Taiwan
关键词
fog computing; proxy; re-encryption; revocation; IoT;
D O I
10.3390/s24196290
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
As technology advances rapidly, a diverse array of Internet of Things (IoT) devices finds widespread application across numerous fields. The intelligent nature of these devices not only gives people more convenience, but also introduces new challenges especially in security when transmitting data in fog-based cloud environments. In fog computing environments, data need to be transmitted across multiple devices, increasing the risk of data being intercepted or tampered with during transmission. To securely share cloud ciphertexts, an alleged proxy re-encryption approach is a commonly adopted solution. Without decrypting the original ciphertext, such a mechanism permits a ciphertext intended for user A to be easily converted into the one intended for user B. However, to revoke the decryption privilege of data users usually relies on the system authority to maintain a user revocation list which inevitably increases the storage space. In this research, the authors come up with a fog-based proxy re-encryption system with revocable identity. Without maintaining the traditional user revocation list, the proposed scheme introduces a time-updated key mechanism. The time-update key could be viewed as a partial private key and should be renewed with different time periods. A revoked user is unable to obtain the renewed time-update key and hence cannot share or decrypt cloud ciphertexts. We formally demonstrate that the introduced scheme satisfies the security of indistinguishability against adaptively chosen identity and chosen plaintext attacks (IND-PrID-CPA) assuming the hardness of the Decisional Bilinear Diffie-Hellman (DBDH) problem in the random oracle model. Furthermore, compared with similar systems, the proposed one also has lower computational complexity as a whole.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] Analytical framework to compare handover mechanisms for fog-enabled IoT networks
    Sathish, Sanjay
    Ghosh, Shankar K.
    Ghosh, Sasthi C.
    2023 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2024,
  • [42] Efficient privacy-preserving data replication in fog-enabled IoT
    Sarwar, Kinza
    Yongchareon, Sira
    Yu, Jian
    Rehman, Saeed Ur
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 128 : 538 - 551
  • [43] Proxy re-encryption architect for storing and sharing of cloud contents
    Rawal, Bharat S.
    INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2020, 35 (03) : 219 - 235
  • [44] Privacy-Preserving Distributed Analytics in Fog-Enabled IoT Systems
    Zhao, Liang
    SENSORS, 2020, 20 (21) : 1 - 23
  • [45] Secure Content Distribution Using Multi-hop Proxy Re-encryption
    Lin, Han-Yu
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (03) : 1449 - 1459
  • [46] Secure Data Sharing using Proxy Re-Encryption for Intelligent Customized Services
    Cha, Hyun-Jong
    Yang, Ho-Kyung
    Song, You-Jin
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2018, 11 (10): : 29 - 39
  • [47] Proxy Re-encryption Schemes with Proxy Having Its Own Public/Private Keys
    Wei, Ping
    Wang, Xu An
    Yang, Xiaoyuan
    2010 2ND INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS PROCEEDINGS (DBTA), 2010,
  • [48] FESDA: Fog-Enabled Secure Data Aggregation in Smart Grid IoT Network
    Saleem, Ahsan
    Khan, Abid
    Malik, Saif Ur Rehman
    Pervaiz, Haris
    Malik, Hassan
    Alam, Muhammad Masoom
    Jindal, Anish
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (07) : 6132 - 6142
  • [49] A secure re-encryption scheme for data services in a cloud computing environment
    Xiong, Lizhi
    Xu, Zhengquan
    Xu, Yanyan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (17) : 4573 - 4585
  • [50] Routing in Fog-Enabled IoT Platforms: A Survey and an SDN-Based Solution
    Okay, Feyza Yildirim
    Ozdemir, Suat
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (06): : 4871 - 4889