Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments

被引:0
|
作者
Lin, Han-Yu [1 ]
Chen, Pei-Ru [1 ]
机构
[1] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung 202, Taiwan
关键词
fog computing; proxy; re-encryption; revocation; IoT;
D O I
10.3390/s24196290
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
As technology advances rapidly, a diverse array of Internet of Things (IoT) devices finds widespread application across numerous fields. The intelligent nature of these devices not only gives people more convenience, but also introduces new challenges especially in security when transmitting data in fog-based cloud environments. In fog computing environments, data need to be transmitted across multiple devices, increasing the risk of data being intercepted or tampered with during transmission. To securely share cloud ciphertexts, an alleged proxy re-encryption approach is a commonly adopted solution. Without decrypting the original ciphertext, such a mechanism permits a ciphertext intended for user A to be easily converted into the one intended for user B. However, to revoke the decryption privilege of data users usually relies on the system authority to maintain a user revocation list which inevitably increases the storage space. In this research, the authors come up with a fog-based proxy re-encryption system with revocable identity. Without maintaining the traditional user revocation list, the proposed scheme introduces a time-updated key mechanism. The time-update key could be viewed as a partial private key and should be renewed with different time periods. A revoked user is unable to obtain the renewed time-update key and hence cannot share or decrypt cloud ciphertexts. We formally demonstrate that the introduced scheme satisfies the security of indistinguishability against adaptively chosen identity and chosen plaintext attacks (IND-PrID-CPA) assuming the hardness of the Decisional Bilinear Diffie-Hellman (DBDH) problem in the random oracle model. Furthermore, compared with similar systems, the proposed one also has lower computational complexity as a whole.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] A revocable multi-authority attribute-based encryption scheme for fog-enabled IoT
    Penuelas-Angulo, Alejandro
    Feregrino-Uribe, Claudia
    Morales-Sandoval, Miguel
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 155
  • [2] Revocable attribute-based proxy re-encryption
    Luo, Fucai
    Al-Kuwari, Saif
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2021, 15 (01) : 465 - 482
  • [3] A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage
    Luo, Wei
    Ma, Wenping
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 519 - 530
  • [4] Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability
    Wang, Xiaolei
    Wang, Yang
    Wang, Mingqiang
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 535 - 544
  • [5] CEaaS: Constrained Encryption as a Service in Fog-Enabled IoT
    Deb, Pallav Kumar
    Mukherjee, Anandarup
    Misra, Sudip
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (20) : 19803 - 19810
  • [6] Security of Cloud-Based Revocable Identity-Based Proxy Re-Encryption Scheme
    Park, Seunghwan
    Lee, Dong Hoon
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (07): : 1933 - 1936
  • [7] An Improved Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme
    Wang, Changji
    Fang, Jian
    Li, Yuan
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 14 - 26
  • [8] Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing
    Manzoor, Ahsan
    Liyanage, Madhsanka
    Braeken, An
    Kanhere, Salil S.
    Ylianttila, Mika
    2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC), 2019, : 99 - 103
  • [9] Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme
    Singh, Kunwar
    Rangan, C. Pandu
    Banerjee, A. K.
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 564 - 575
  • [10] An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments
    Lin, Han-Yu
    Tsai, Tung-Tso
    Ting, Pei-Yih
    Chen, Ching-Chung
    SENSORS, 2022, 22 (11)