A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain

被引:74
|
作者
Agyekum, Kwame Opuni-Boachie Obour [1 ,2 ]
Xia, Qi [1 ,2 ]
Sifah, Emmanuel Boateng [1 ,2 ]
Cobblah, Christian Nii Aflah [1 ,2 ]
Xia, Hu [1 ]
Gao, Jianbin [1 ,2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[2] UESTC, CDFH, Joint Inst Blockchain, Chengdu Jiaozi Financial Holding Grp Co Ltd, Chengdu 610042, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2022年 / 16卷 / 01期
关键词
Blockchain; Cryptography; Access control; Encryption; Data privacy; Servers; Protocols; blockchain; data security; identity-based proxy re-encryption; information-centric network (ICN); Internet of Things (IoT); ATTRIBUTE-BASED ENCRYPTION; PRIVACY; SCHEME; REVOCATION; NETWORK;
D O I
10.1109/JSYST.2021.3076759
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The evolution of the Internet of Things has seen data sharing as one of its most useful applications in cloud computing. As eye-catching as this technology has been, data security remains one of the obstacles it faces since the wrongful use of data leads to several damages. In this article, we propose a proxy re-encryption approach to secure data sharing in cloud environments. Data owners can outsource their encrypted data to the cloud using identity-based encryption, while proxy re-encryption construction will grant legitimate users access to the data. With the Internet of Things devices being resource-constrained, an edge device acts as a proxy server to handle intensive computations. Also, we make use of the features of information-centric networking to deliver cached content in the proxy effectively, thus improving the quality of service and making good use of the network bandwidth. Further, our system model is based on blockchain, a disruptive technology that enables decentralization in data sharing. It mitigates the bottlenecks in centralized systems and achieves fine-grained access control to data. The security analysis and evaluation of our scheme show the promise of our approach in ensuring data confidentiality, integrity, and security.
引用
收藏
页码:1685 / 1696
页数:12
相关论文
共 50 条
  • [11] Secure Outsourced Blockchain-Based Medical Data Sharing System Using Proxy Re-Encryption
    Park, Young-Hoon
    Kim, Yejin
    Lee, Shin-Ok
    Ko, Kwangman
    APPLIED SCIENCES-BASEL, 2021, 11 (20):
  • [12] A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption
    Liu, Guijiang
    Xie, Haibo
    Wang, Wenming
    Huang, Haiping
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [13] Blockchain-Based Attribute Proxy Re-Encryption Data Sharing Scheme
    Zhai, Sheping
    Tong, Tong
    Bai, Xifang
    Computer Engineering and Applications, 2023, 59 (08) : 270 - 279
  • [14] A Proxy Re-encryption Scheme of Medical Data Sharing Based on Consortium Blockchain
    Li, Juxia
    Zhang, Xing
    Chu, Zhiguang
    BLOCKCHAIN TECHNOLOGY AND APPLICATION, CBCC 2022, 2022, 1736 : 1 - 12
  • [15] A Quantum secure sharing protocol for Cloud data based on proxy re-encryption
    Yan Chang
    Shi-Bin Zhang
    Li-Li Yan
    Guo-gen Wan
    Scientific Reports, 10
  • [16] A Quantum secure sharing protocol for Cloud data based on proxy re-encryption
    Chang, Yan
    Zhang, Shi-Bin
    Yan, Li-Li
    Wan, Guo-gen
    SCIENTIFIC REPORTS, 2020, 10 (01)
  • [17] Secure electronic medical records sharing scheme based on blockchain by using proxy re-encryption
    Zhou, Hanlin
    Si, Xia-Meng
    Zhao, Bobai
    Zhang, Yaochen
    Qu, Yuanjun
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (06) : 4197 - 4209
  • [18] Blockchain data sharing scheme supporting attribute and proxy re-encryption
    Li, Xuelian
    Zhang, Xiachuan
    Gao, Juntao
    Xiang, Dengmei
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2022, 49 (01): : 1 - 16
  • [19] Secure Data Sharing in the Cloud Through Proxy Re-Encryption Technique
    Adilakshmi, Jyothi
    Rithika, Badgoian
    Pushpalatha, Chitikela
    Venkatesh, Thurpati
    Lohitha, Mandapati
    2024 4TH INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND SOCIAL NETWORKING, ICPCSN 2024, 2024, : 700 - 705
  • [20] Blockchain aware proxy re-encryption algorithm-based data sharing scheme
    Keshta, Ismail
    Aoudni, Yassine
    Sandhu, Mukta
    Singh, Abha
    Xalikovich, Pardayev Abdunabi
    Rizwan, Ali
    Soni, Mukesh
    Lalar, Sachin
    PHYSICAL COMMUNICATION, 2023, 58