A novel traceability approach in IoT paradigm for CP-ABE proxy re-encryption

被引:0
作者
Nishant Doshi
机构
[1] Pandit Deendayal Energy University,
来源
Sādhanā | / 47卷
关键词
IoT; attribute; multi-authority; traceability; constant length;
D O I
暂无
中图分类号
学科分类号
摘要
Internet of Things (IoT) is a technology aimed to provide the cost effective infrastructure for today’s problems. Due to its plus points, it is widely deployed for various applications. Data generated from these applications need to be protected from prying eyes of the attacker. As identified in the research, CP-ABE (Ciphertext Policy Attribute Based Encryption) is a promising technique to provide the security of data with efficient multi casting. The naïve CP-ABE scheme suffers with issues like traceability, proxy re-encryption, constant length ciphertext, etc. Recently, In 2022, Jhang et al proposed the improved approach to improvise the basic CP-ABE scheme having traceability issues. However, it is yet to suffer from other issues like multi authority, proxy re-encryption and variable length ciphertext. One can use different schemes to achieve each of features which result in high computation overhead. Thus, we have improved the existing approach and proposed novel scheme which not only solve traceability but also provide proxy re-encryption as well as multi-authority and constant length ciphertext.
引用
收藏
相关论文
共 34 条
  • [21] IoT Data Blockchain-Based Transaction Model Using Zero-Knowledge Proofs and Proxy Re-encryption
    Guo, Hao
    Cheng, Jieren
    Wang, Janghao
    Chen, Tao
    Yuan, Yuming
    Li, Hui
    Sheng, Victor S.
    [J]. ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT II, 2022, 13339 : 573 - 586
  • [22] Secure Data Sharing using Proxy Re-Encryption for Intelligent Customized Services
    Cha, Hyun-Jong
    Yang, Ho-Kyung
    Song, You-Jin
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2018, 11 (10): : 29 - 39
  • [23] Authorized Shared Electronic Medical Record System with Proxy Re-Encryption and Blockchain Technology
    Chen, Weizhe
    Zhu, Shunzhi
    Li, Jianmin
    Wu, Jiaxin
    Chen, Chin-Ling
    Deng, Yong-Yuan
    [J]. SENSORS, 2021, 21 (22)
  • [24] Assured and Provable Data Expuncturing in cloud using Ciphertext Policy-Attribute Based Encryption (CP-ABE)
    Abinaya, P.
    Kumar, Senthil J.
    [J]. CYBERNETICS AND SYSTEMS, 2024, 55 (04) : 786 - 803
  • [25] Multi-authority proxy re-encryption based on CPABE for cloud storage systems
    Xiaolong Xu
    Jinglan Zhou
    Xinheng Wang
    Yun Zhang
    [J]. Journal of Systems Engineering and Electronics, 2016, 27 (01) : 211 - 223
  • [26] Multi-authority proxy re-encryption based on CPABE for cloud storage systems
    Xu, Xiaolong
    Zhou, Jinglan
    Wang, Xinheng
    Zhang, Yun
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2016, 27 (01) : 211 - 223
  • [27] A Lightweight Pairing-Free Multi-Authority CP-ABE scheme for Cloud-Edge-Assisted IoT
    Guo, Chong
    Peng, Tianqi
    Zhang, Jiangjiang
    Yang, Yuxin
    Luo, Yihang
    Zhu, Guangzhuo
    [J]. 2024 9TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS, ICCCS 2024, 2024, : 991 - 996
  • [28] Preserving Privacy of Classified Authentic Satellite Lane Imagery Using Proxy Re-Encryption and UAV Technologies
    Nagasree, Yarajarla
    Rupa, Chiramdasu
    Akshitha, Ponugumati
    Srivastava, Gautam
    Gadekallu, Thippa Reddy
    Lakshmanna, Kuruva
    [J]. DRONES, 2023, 7 (01)
  • [29] A certificateless signcryption with proxy re-encryption for practical access control in cloud-based reliable smart grid
    Ahene, Emmanuel
    Dai, Junfeng
    Feng, Hao
    Li, Fagen
    [J]. TELECOMMUNICATION SYSTEMS, 2019, 70 (04) : 491 - 510
  • [30] Proxy Re-Encryption-Based Traceability and Sharing Mechanism of the Power Material Data in Blockchain Environment
    Song, Jien
    Yang, Yang
    Mei, Jie
    Zhou, Gaofeng
    Qiu, Weiqiang
    Wang, Yixing
    Xu, Lu
    Liu, Yanran
    Jiang, Jinyu
    Chu, Zhenyue
    Tan, Weitao
    Lin, Zhenzhi
    [J]. ENERGIES, 2022, 15 (07)