4.6 Article

A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain

期刊

IEEE SYSTEMS JOURNAL
卷 16, 期 1, 页码 1685-1696

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSYST.2021.3076759

关键词

Blockchain; Cryptography; Access control; Encryption; Data privacy; Servers; Protocols; Access control; blockchain; data security; identity-based proxy re-encryption; information-centric network (ICN); Internet of Things (IoT)

资金

  1. Program of International Science and Technology Cooperation and Exchange of Sichuan Province [2019YFH0014, 2020YFH0030]
  2. Science and Technology Program of Sichuan Province [2020YFSY0061]

向作者/读者索取更多资源

This article proposes a proxy re-encryption approach to secure data sharing in cloud environments, ensuring data confidentiality, integrity, and security. It utilizes information-centric networking and blockchain technology to improve service quality and achieve decentralization in data sharing.
The evolution of the Internet of Things has seen data sharing as one of its most useful applications in cloud computing. As eye-catching as this technology has been, data security remains one of the obstacles it faces since the wrongful use of data leads to several damages. In this article, we propose a proxy re-encryption approach to secure data sharing in cloud environments. Data owners can outsource their encrypted data to the cloud using identity-based encryption, while proxy re-encryption construction will grant legitimate users access to the data. With the Internet of Things devices being resource-constrained, an edge device acts as a proxy server to handle intensive computations. Also, we make use of the features of information-centric networking to deliver cached content in the proxy effectively, thus improving the quality of service and making good use of the network bandwidth. Further, our system model is based on blockchain, a disruptive technology that enables decentralization in data sharing. It mitigates the bottlenecks in centralized systems and achieves fine-grained access control to data. The security analysis and evaluation of our scheme show the promise of our approach in ensuring data confidentiality, integrity, and security.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据