An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments

被引:4
作者
Lin, Han-Yu [1 ]
Tsai, Tung-Tso [1 ]
Ting, Pei-Yih [1 ]
Chen, Ching-Chung [1 ]
机构
[1] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung 202, Taiwan
关键词
ID-based; data storage; proxy re-encryption; fog computing; IoT; PROXY RE-ENCRYPTION;
D O I
10.3390/s22114223
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In a fog-enabled IoT environment, a fog node is regarded as the proxy between end users and cloud servers to reduce the latency of data transmission, so as to fulfill the requirement of more real-time applications. A data storage scheme utilizing fog computing architecture allows a user to share cloud data with other users via the assistance of fog nodes. In particular, a fog node obtaining a re-encryption key of the data owner is able to convert a cloud ciphertext into the one which is decryptable by another designated user. In such a scheme, a proxy should not learn any information about the plaintext during the transmission and re-encryption processes. In 2020, an ID-based data storage scheme utilizing anonymous key generation in fog computing was proposed by some researchers. Although their protocol is provably secure in a proof model of random oracles, we will point out that there are some security flaws inherited in their protocol. On the basis of their work, we further present an improved variant, which not only eliminates their security weaknesses, but also preserves the functionalities of anonymous key generation and user revocation mechanism. Additionally, under the Decisional Bilinear Diffie-Hellman (DBDH) assumption, we demonstrate that our enhanced construction is also provably secure in the security notion of IND-PrID-CPA.
引用
收藏
页数:20
相关论文
共 36 条
  • [1] A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain
    Agyekum, Kwame Opuni-Boachie Obour
    Xia, Qi
    Sifah, Emmanuel Boateng
    Cobblah, Christian Nii Aflah
    Xia, Hu
    Gao, Jianbin
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1685 - 1696
  • [2] Efficient Signcryption With Proxy Re-Encryption and Its Application in Smart Grid
    Ahene, Emmanuel
    Qin, Zhangchi
    Adusei, Akua Konadu
    Li, Fagen
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06): : 9722 - 9737
  • [3] Akhil N.V., 2016, P 2016 INT C CIRCUIT, P1
  • [4] [Anonymous], 2005, P NETW DISTR SYST SE
  • [5] Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
  • [6] Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
  • [7] Canetti R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P185
  • [8] A Blockchain-Based Proxy Re-Encryption With Equality Test for Vehicular Communication Systems
    Chen, Biwen
    He, Debiao
    Kumar, Neeraj
    Wang, Huaqun
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (03): : 2048 - 2059
  • [9] Chen WH, 2018, 2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), P70
  • [10] Christos Spandonidis C., 2020, 2020 International Conference on Decision Aid Sciences and Application (DASA), P669, DOI 10.1109/DASA51403.2020.9317030