Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation

被引:7
作者
Lin, Han-Yu [1 ]
Tsai, Tung-Tso [1 ]
Ting, Pei-Yih [1 ]
Fan, Yan-Rong [1 ]
机构
[1] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung 202, Taiwan
关键词
identity based; proxy re-encryption; fog computing; anonymous; cloud;
D O I
10.3390/s23052706
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In the fog computing architecture, a fog is a node closer to clients and responsible for responding to users' requests as well as forwarding messages to clouds. In some medical applications such as the remote healthcare, a sensor of patients will first send encrypted data of sensed information to a nearby fog such that the fog acting as a re-encryption proxy could generate a re-encrypted ciphertext designated for requested data users in the cloud. Specifically, a data user can request access to cloud ciphertexts by sending a query to the fog node that will forward this query to the corresponding data owner who preserves the right to grant or deny the permission to access his/her data. When the access request is granted, the fog node will obtain a unique re-encryption key for carrying out the re-encryption process. Although some previous concepts have been proposed to fulfill these application requirements, they either have known security flaws or incur higher computational complexity. In this work, we present an identity-based proxy re-encryption scheme on the basis of the fog computing architecture. Our identity-based mechanism uses public channels for key distribution and avoids the troublesome problem of key escrow. We also formally prove that the proposed protocol is secure in the IND-PrID-CPA notion. Furthermore, we show that our work exhibits better performance in terms of computational complexity.
引用
收藏
页数:13
相关论文
共 33 条
  • [1] Akhil N.V., 2016, P 2016 INT C CIRCUIT, P1
  • [2] Bajaj Karan, 2022, 2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS), P983, DOI 10.1109/ICSCDS53736.2022.9760897
  • [3] Bonomi F., 2012, P 1 ED MCC WORKSH MO, P13, DOI DOI 10.1145/2342509.2342513
  • [4] Chandini A.G., 2022, P 2022 IEEE INT C DA, P1
  • [5] Chellappa R., 1997, INFORMS ANN M, P26
  • [6] Chen Z., 2022, J COMPUT COGN ENG, V1, P103
  • [7] Devaki K., 2022, 2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC)., P1331, DOI 10.1109/ICAAIC53929.2022.9793070
  • [8] Dostalek L., 2017, P 2017 INT C APPL EL, P1
  • [9] Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    [J]. THEORETICAL COMPUTER SCIENCE, 2012, 462 : 39 - 58
  • [10] Boosting image watermarking authenticity spreading secrecy from counting-based secret-sharing
    Gutub, Adnan
    [J]. CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2023, 8 (02) : 440 - 452