A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain

被引:95
作者
Agyekum, Kwame Opuni-Boachie Obour [1 ,2 ]
Xia, Qi [1 ,2 ]
Sifah, Emmanuel Boateng [1 ,2 ]
Cobblah, Christian Nii Aflah [1 ,2 ]
Xia, Hu [1 ]
Gao, Jianbin [1 ,2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[2] UESTC, CDFH, Joint Inst Blockchain, Chengdu Jiaozi Financial Holding Grp Co Ltd, Chengdu 610042, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2022年 / 16卷 / 01期
关键词
Blockchain; Cryptography; Access control; Encryption; Data privacy; Servers; Protocols; blockchain; data security; identity-based proxy re-encryption; information-centric network (ICN); Internet of Things (IoT); ATTRIBUTE-BASED ENCRYPTION; PRIVACY; SCHEME; REVOCATION; NETWORK;
D O I
10.1109/JSYST.2021.3076759
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The evolution of the Internet of Things has seen data sharing as one of its most useful applications in cloud computing. As eye-catching as this technology has been, data security remains one of the obstacles it faces since the wrongful use of data leads to several damages. In this article, we propose a proxy re-encryption approach to secure data sharing in cloud environments. Data owners can outsource their encrypted data to the cloud using identity-based encryption, while proxy re-encryption construction will grant legitimate users access to the data. With the Internet of Things devices being resource-constrained, an edge device acts as a proxy server to handle intensive computations. Also, we make use of the features of information-centric networking to deliver cached content in the proxy effectively, thus improving the quality of service and making good use of the network bandwidth. Further, our system model is based on blockchain, a disruptive technology that enables decentralization in data sharing. It mitigates the bottlenecks in centralized systems and achieves fine-grained access control to data. The security analysis and evaluation of our scheme show the promise of our approach in ensuring data confidentiality, integrity, and security.
引用
收藏
页码:1685 / 1696
页数:12
相关论文
共 50 条
[31]   Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing [J].
Eltayieb, Nabeil ;
Elhabob, Rashad ;
Abdelgader, Abdeldime M. S. ;
Liao, Yongjian ;
Li, Fagen ;
Zhou, Shijie .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2025, 162
[32]   A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication [J].
Shweta Mittal ;
Mohona Ghosh .
The Journal of Supercomputing, 2024, 80 :7955-7992
[33]   A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication [J].
Mittal, Shweta ;
Ghosh, Mohona .
JOURNAL OF SUPERCOMPUTING, 2024, 80 (06) :7955-7992
[34]   Secure Data Sharing: Blockchain-Enabled Data Access Control Framework for IoT [J].
Wei, Xin ;
Yan, Yong ;
Guo, Shaoyong ;
Qiu, Xuesong ;
Qi, Feng .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) :8143-8153
[35]   Blockchain-Based Secure and Lightweight Authentication for Internet of Things [J].
Yang, Xu ;
Yang, Xuechao ;
Yi, Xun ;
Khalil, Ibrahim ;
Zhou, Xiaotong ;
He, Debiao ;
Huang, Xinyi ;
Nepal, Surya .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05) :3321-3332
[36]   Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds [J].
Ge, Chunpeng ;
Liu, Zhe ;
Xia, Jinyue ;
Fang, Liming .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) :1214-1226
[37]   A Study on Blockchain-Based Data Proxy Re-Encryption Privacy Protection [J].
Huang, Wenjin ;
Yu, Xuejun ;
Ma, Zhongcheng .
PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, :25-29
[38]   Time-based proxy re-encryption scheme for secure data sharing in a cloud environment [J].
Liu, Qin ;
Wang, Guojun ;
Wu, Jie .
INFORMATION SCIENCES, 2014, 258 :355-370
[39]   Blockchain-Based Secure Cross-Domain Data Sharing for Edge-Assisted Industrial Internet of Things [J].
Wang, Fengqun ;
Cui, Jie ;
Zhang, Qingyang ;
He, Debiao ;
Zhong, Hong .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 :3892-3905
[40]   Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system [J].
Jhong-Ting Lou ;
Showkat Ahmad Bhat ;
Nen-Fu Huang .
Peer-to-Peer Networking and Applications, 2023, 16 :2415-2437