Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments

被引:0
|
作者
Lin, Han-Yu [1 ]
Chen, Pei-Ru [1 ]
机构
[1] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung 202, Taiwan
关键词
fog computing; proxy; re-encryption; revocation; IoT;
D O I
10.3390/s24196290
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
As technology advances rapidly, a diverse array of Internet of Things (IoT) devices finds widespread application across numerous fields. The intelligent nature of these devices not only gives people more convenience, but also introduces new challenges especially in security when transmitting data in fog-based cloud environments. In fog computing environments, data need to be transmitted across multiple devices, increasing the risk of data being intercepted or tampered with during transmission. To securely share cloud ciphertexts, an alleged proxy re-encryption approach is a commonly adopted solution. Without decrypting the original ciphertext, such a mechanism permits a ciphertext intended for user A to be easily converted into the one intended for user B. However, to revoke the decryption privilege of data users usually relies on the system authority to maintain a user revocation list which inevitably increases the storage space. In this research, the authors come up with a fog-based proxy re-encryption system with revocable identity. Without maintaining the traditional user revocation list, the proposed scheme introduces a time-updated key mechanism. The time-update key could be viewed as a partial private key and should be renewed with different time periods. A revoked user is unable to obtain the renewed time-update key and hence cannot share or decrypt cloud ciphertexts. We formally demonstrate that the introduced scheme satisfies the security of indistinguishability against adaptively chosen identity and chosen plaintext attacks (IND-PrID-CPA) assuming the hardness of the Decisional Bilinear Diffie-Hellman (DBDH) problem in the random oracle model. Furthermore, compared with similar systems, the proposed one also has lower computational complexity as a whole.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] A Multi-users Searchable Encryption Scheme with Proxy Re-encryption
    Zhang Ya-ling
    Liu Kai
    Wang Shang-ping
    Sun Qin-dong
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 563 - 567
  • [32] Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption
    Mizuno, Takeo
    Doi, Hiroshi
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 288 - +
  • [33] Efficient Attribute-Based Encryption Outsourcing Scheme With User and Attribute Revocation for Fog-Enabled IoT
    Li, Ling
    Wang, Zheng
    Li, Na
    IEEE ACCESS, 2020, 8 : 176738 - 176749
  • [34] Secure Multicast using Proxy Re-Encryption in an IoT Environment
    Kim, SuHyun
    Hwang, YongWoon
    Seo, JungTaek
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (02): : 946 - 959
  • [35] Secure Multicast Using Proxy Re-encryption in IoT Environment
    Kim, SuHyun
    Lee, ImYeong
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 : 66 - 70
  • [36] Pairing-free Proxy Re-Encryption scheme with Equality Test for data security of IoT
    Han, Gang
    Li, Le
    Qin, Baodong
    Zheng, Dong
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2024, 36 (06)
  • [37] An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in Clouds
    Lin, Han-Yu
    Hung, Yao-Min
    SENSORS, 2021, 21 (01)
  • [38] A Democratically Collaborative Learning Scheme for Fog-enabled Pervasive Environments
    Zhang, Tiehua
    Shen, Zhishu
    Jin, Jiong
    Zheng, Xi
    2020 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2020,
  • [39] Combined Proxy Re-encryption
    Canard, Sebastien
    Devigne, Julien
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 49 - 66
  • [40] Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation
    Lin, Han-Yu
    Tsai, Tung-Tso
    Ting, Pei-Yih
    Fan, Yan-Rong
    SENSORS, 2023, 23 (05)