IoT device security based on proxy re-encryption

被引:3
|
作者
SuHyun Kim
ImYeong Lee
机构
[1] Soonchunhyang University,IoT Security and Privacy Research Center
[2] Soonchunhyang University,Department of Computer Software Engineering
来源
Journal of Ambient Intelligence and Humanized Computing | 2018年 / 9卷
关键词
Internet of things; Lightweight device; Proxy re-encryption; Data sharing;
D O I
暂无
中图分类号
学科分类号
摘要
It appears that interest in the Internet of things (IoT) has recently reached its peak, with a great deal of focus from both the private and public sectors. IoT, a technology that enables the exchange of data through linkage among all objects surrounding the user, can create new services. Data communication among objects is not limited to personal information, but can also deliver different data types, such as sensing information collected from the surrounding environment. When such data is collected and used maliciously by an attacker, it is more vulnerable to threats than in conventional network environments. Security of all data transmitted in the IoT environment is therefore essential for preventing attacks. However, it is difficult to apply the conventional cipher algorithm to lightweight devices. Therefore, we propose a method for sharing and managing data using the conventional cipher algorithm on lightweight devices in various circumstances. This method implements proxy re-encryption in order to manage data with fewer encryptions, and provides a data sharing function to supplement the insufficient capacity of lightweight device networks.
引用
收藏
页码:1267 / 1273
页数:6
相关论文
共 50 条
  • [41] Attribute-Based Proxy Re-Encryption with Dynamic Membership
    Fan, Chun-I
    Wu, Chien-Nan
    Chen, Chun-Hung
    Tseng, Yi-Fan
    Feng, Cheng-Chun
    2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 26 - 32
  • [42] Anonymous Attribute-Based Conditional Proxy Re-encryption
    Mao, Xianping
    Li, Xuefeng
    Wu, Xiaochuan
    Wang, Chuansheng
    Lai, Junzuo
    NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 95 - 110
  • [43] Lattice-based Fuzzy Conditional Proxy Re-encryption
    Li, BaoHong
    Xu, JieFei
    Liu, YanZhi
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (05): : 1379 - 1385
  • [44] Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
    Guo, Lifeng
    Hu, Lei
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 63 (01) : 151 - 157
  • [45] Proxy re-encryption via indistinguishability obfuscation
    Ohata, Satsuya
    Matsuura, Kanta
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1786 - 1795
  • [46] Efficient and Secure Certificateless Proxy Re-Encryption
    Liu, Ya
    Wang, Hongbing
    Wang, Chunlu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (04): : 2254 - 2275
  • [47] Digital forensics evidence management based on proxy re-encryption
    Patil, Rachana Yogesh
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2022, 68 (04) : 405 - 413
  • [48] Non-transferable Proxy Re-encryption
    Guo, Hui
    Zhang, Zhenfeng
    Xu, Jing
    An, Ningyu
    COMPUTER JOURNAL, 2019, 62 (04) : 490 - 506
  • [49] Improved Proxy Re-Encryption With Delegatable Verifiability
    Zhan, Yu
    Wang, Baocang
    Wang, Zheng
    Pei, Tao
    Chen, Yuan
    Qu, Quanbo
    Zhang, Zhili
    IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 592 - 602
  • [50] Identity Based Proxy Re-encryption Scheme under LWE
    Yin, Wei
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zheng Ping
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (12): : 6116 - 6132