IoT device security based on proxy re-encryption

被引:3
|
作者
SuHyun Kim
ImYeong Lee
机构
[1] Soonchunhyang University,IoT Security and Privacy Research Center
[2] Soonchunhyang University,Department of Computer Software Engineering
来源
Journal of Ambient Intelligence and Humanized Computing | 2018年 / 9卷
关键词
Internet of things; Lightweight device; Proxy re-encryption; Data sharing;
D O I
暂无
中图分类号
学科分类号
摘要
It appears that interest in the Internet of things (IoT) has recently reached its peak, with a great deal of focus from both the private and public sectors. IoT, a technology that enables the exchange of data through linkage among all objects surrounding the user, can create new services. Data communication among objects is not limited to personal information, but can also deliver different data types, such as sensing information collected from the surrounding environment. When such data is collected and used maliciously by an attacker, it is more vulnerable to threats than in conventional network environments. Security of all data transmitted in the IoT environment is therefore essential for preventing attacks. However, it is difficult to apply the conventional cipher algorithm to lightweight devices. Therefore, we propose a method for sharing and managing data using the conventional cipher algorithm on lightweight devices in various circumstances. This method implements proxy re-encryption in order to manage data with fewer encryptions, and provides a data sharing function to supplement the insufficient capacity of lightweight device networks.
引用
收藏
页码:1267 / 1273
页数:6
相关论文
共 50 条
  • [31] Fuzzy conditional proxy re-encryption
    LiMing Fang
    JianDong Wang
    ChunPeng Ge
    YongJun Ren
    Science China Information Sciences, 2013, 56 : 1 - 13
  • [32] Conditional Proxy Broadcast Re-Encryption
    Chu, Cheng-Kang
    Weng, Jian
    Chow, Sherman S. M.
    Zhou, Jianying
    Deng, Robert H.
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 327 - +
  • [33] Fuzzy conditional proxy re-encryption
    FANG LiMing
    WANG JianDong
    GE ChunPeng
    REN YongJun
    ScienceChina(InformationSciences), 2013, 56 (05) : 211 - 223
  • [34] Proxy re-encryption with keyword search
    Shao, Jun
    Cao, Zhenfu
    Liang, Xiaohui
    Lin, Huang
    INFORMATION SCIENCES, 2010, 180 (13) : 2576 - 2587
  • [35] Decentralized Fair IoT Data Trading via Searchable Proxy Re-Encryption
    Lu, Xin
    Zhang, Zijian
    Zhou, Tyler
    Niu, Tao
    Li, Meng
    Guan, Zhitao
    Ma, Teng
    Zhu, Liehuang
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (11): : 19485 - 19499
  • [36] AN ENHANCED APPROACH FOR CP-ABE WITH PROXY RE-ENCRYPTION IN IOT PARADIGM
    Doshi, Nishant
    JORDANIAN JOURNAL OF COMPUTERS AND INFORMATION TECHNOLOGY, 2022, 8 (03): : 232 - 241
  • [37] Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption
    Mizuno, Takeo
    Doi, Hiroshi
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 288 - +
  • [38] Multi-security-level cloud storage system based on improved proxy re-encryption
    Jinan Shen
    Xuejian Deng
    Zhenwu Xu
    EURASIP Journal on Wireless Communications and Networking, 2019
  • [39] Achieving key privacy without losing CCA security in proxy re-encryption
    Shao, Jun
    Liu, Peng
    Zhou, Yuan
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (03) : 655 - 665
  • [40] Multi-security-level cloud storage system based on improved proxy re-encryption
    Shen, Jinan
    Deng, Xuejian
    Xu, Zhenwu
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (01)