A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain

被引:74
|
作者
Agyekum, Kwame Opuni-Boachie Obour [1 ,2 ]
Xia, Qi [1 ,2 ]
Sifah, Emmanuel Boateng [1 ,2 ]
Cobblah, Christian Nii Aflah [1 ,2 ]
Xia, Hu [1 ]
Gao, Jianbin [1 ,2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[2] UESTC, CDFH, Joint Inst Blockchain, Chengdu Jiaozi Financial Holding Grp Co Ltd, Chengdu 610042, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2022年 / 16卷 / 01期
关键词
Blockchain; Cryptography; Access control; Encryption; Data privacy; Servers; Protocols; blockchain; data security; identity-based proxy re-encryption; information-centric network (ICN); Internet of Things (IoT); ATTRIBUTE-BASED ENCRYPTION; PRIVACY; SCHEME; REVOCATION; NETWORK;
D O I
10.1109/JSYST.2021.3076759
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The evolution of the Internet of Things has seen data sharing as one of its most useful applications in cloud computing. As eye-catching as this technology has been, data security remains one of the obstacles it faces since the wrongful use of data leads to several damages. In this article, we propose a proxy re-encryption approach to secure data sharing in cloud environments. Data owners can outsource their encrypted data to the cloud using identity-based encryption, while proxy re-encryption construction will grant legitimate users access to the data. With the Internet of Things devices being resource-constrained, an edge device acts as a proxy server to handle intensive computations. Also, we make use of the features of information-centric networking to deliver cached content in the proxy effectively, thus improving the quality of service and making good use of the network bandwidth. Further, our system model is based on blockchain, a disruptive technology that enables decentralization in data sharing. It mitigates the bottlenecks in centralized systems and achieves fine-grained access control to data. The security analysis and evaluation of our scheme show the promise of our approach in ensuring data confidentiality, integrity, and security.
引用
收藏
页码:1685 / 1696
页数:12
相关论文
共 50 条
  • [21] Attribute-based Searchable Proxy Re-encryption Blockchain Data Sharing Scheme
    Xu, Guangxia
    Huang, Yuling
    Ma, Chuang
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 372 - 380
  • [22] A Scheme for Electronic Evidence Sharing Based on Blockchain and Proxy Re-encryption
    Miao, Zhikun
    Ye, Chengxu
    Yang, Ping
    Liu, Rui
    Liu, Bing
    Chen, Ying
    2021 4TH INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY AND APPLICATIONS, ICBTA 2021, 2021, : 11 - 16
  • [23] Secure and Efficient Data Sharing with Attribute-based Proxy Re-encryption Scheme
    Sepehri, Masoomeh
    Trombetta, Alberto
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [24] Effective Blockchain Assisted Certificateless Proxy Re-encryption Scheme for Medical Internet of Things
    Qi, Xin
    Wu, Shu
    Yu, Shu-Hao
    International Journal of Network Security, 2023, 25 (06) : 992 - 1001
  • [25] Dynamic Sharing Algorithm for Power Grid Survey Data Based on Blockchain and Proxy Re-encryption
    He, Bangzheng
    Lv, Jingguo
    Zhang, Jiyong
    Zhao, Chunhui
    Liu, Donghui
    Xu, Hui
    Wu, Bing
    Sun, Xiaohu
    SENSORS AND MATERIALS, 2025, 37 (01) : 207 - 216
  • [26] Improved Functional Proxy Re-encryption Schemes for Secure Cloud Data Sharing
    Wang, Xu An
    Yang, Xiaoyuan
    Li, Cong
    Liu, Yudong
    Ding, Yong
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2018, 15 (03) : 585 - 614
  • [27] Secure Data Sharing using Proxy Re-Encryption for Intelligent Customized Services
    Cha, Hyun-Jong
    Yang, Ho-Kyung
    Song, You-Jin
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2018, 11 (10): : 29 - 39
  • [28] Internet of Things Security Design Based on Blockchain and Identity Re-encryption
    Yang L.
    Journal of Cyber Security and Mobility, 2024, 13 (03): : 369 - 392
  • [29] A certificate-based proxy re-encryption plus scheme for secure medical data sharing
    Liu, Shuanggen
    Qin, Haozhe
    Taniar, David
    Liu, Wandi
    Li, Yuanjun
    Zhang, Jindan
    INTERNET OF THINGS, 2023, 23
  • [30] Blockchain data sharing scheme based on quantum re-encryption
    Xie, Sha
    Yan, Lili
    Zhang, Shibin
    Chang, Yan
    Lv, Zhiying
    QUANTUM INFORMATION PROCESSING, 2024, 23 (08)