IoT device security based on proxy re-encryption

被引:3
|
作者
SuHyun Kim
ImYeong Lee
机构
[1] Soonchunhyang University,IoT Security and Privacy Research Center
[2] Soonchunhyang University,Department of Computer Software Engineering
来源
Journal of Ambient Intelligence and Humanized Computing | 2018年 / 9卷
关键词
Internet of things; Lightweight device; Proxy re-encryption; Data sharing;
D O I
暂无
中图分类号
学科分类号
摘要
It appears that interest in the Internet of things (IoT) has recently reached its peak, with a great deal of focus from both the private and public sectors. IoT, a technology that enables the exchange of data through linkage among all objects surrounding the user, can create new services. Data communication among objects is not limited to personal information, but can also deliver different data types, such as sensing information collected from the surrounding environment. When such data is collected and used maliciously by an attacker, it is more vulnerable to threats than in conventional network environments. Security of all data transmitted in the IoT environment is therefore essential for preventing attacks. However, it is difficult to apply the conventional cipher algorithm to lightweight devices. Therefore, we propose a method for sharing and managing data using the conventional cipher algorithm on lightweight devices in various circumstances. This method implements proxy re-encryption in order to manage data with fewer encryptions, and provides a data sharing function to supplement the insufficient capacity of lightweight device networks.
引用
收藏
页码:1267 / 1273
页数:6
相关论文
共 50 条
  • [21] Fuzzy conditional proxy re-encryption
    Fang LiMing
    Wang JianDong
    Ge ChunPeng
    Ren YongJun
    SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (05) : 1 - 13
  • [22] Proxy Re-encryption from Lattices
    Kirshanova, Elena
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 77 - 94
  • [23] Factoring-Based Proxy Re-Encryption Schemes
    Isshiki, Toshiyuki
    Manh Ha Nguyen
    Tanaka, Keisuke
    PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 309 - 329
  • [24] On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010
    Weng, Jian
    Zhao, Yunlei
    Hanaoka, Goichiro
    PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 284 - +
  • [25] Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications
    Derler, David
    Krenn, Stephan
    Loruenser, Thomas
    Ramacher, Sebastian
    Slamanig, Daniel
    Striecks, Christoph
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 219 - 250
  • [26] Hierarchical conditional proxy re-encryption
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    COMPUTER STANDARDS & INTERFACES, 2012, 34 (04) : 380 - 389
  • [27] Certificate-Based Conditional Proxy Re-Encryption
    Li, Jiguo
    Zhao, Xuexia
    Zhang, Yichen
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 299 - 310
  • [28] Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain
    Manzoor, Ahsan
    Braeken, An
    Kanhere, Salil S.
    Ylianttila, Mika
    Liyanage, Madhsanka
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 176
  • [29] An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in Clouds
    Lin, Han-Yu
    Hung, Yao-Min
    SENSORS, 2021, 21 (01)
  • [30] Proxy Impersonation Safe Conditional Proxy Re-Encryption
    Gandhi, Dheeraj
    Rangan, Pandu
    Selvi, Sharmila Deva
    Vivek, Sree
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2013), 2013, : 33 - 44