A proxy signcryption scheme for secure sharing of industrial IoT data in fog environment

被引:1
|
作者
Patil, Rachana Y. [1 ]
Patil, Yogesh H. [2 ]
机构
[1] Pimpri Chinchwad Coll Engn, Pune, Maharashtra, India
[2] VBK Infra & Engn Projects, IME Div, Pune 11014, Maharashtra, India
关键词
internet of things; IoT; elliptic curve cryptography; ECC; signcryption; fog computing; proxy signature; INTERNET; CLOUD; ENCRYPTION; SYSTEMS; THINGS;
D O I
10.1504/IJCSE.2023.129743
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Rapid technical advancements have transformed the industrial segment. The internet limits the meaning of industrial IoT (IIoT) to the production Industry, which is Industry 4.0. IIoT includes sensors, positioners, and actuators. As a result, various forms of data is produced. Due to delays and safety issues, most industrial processes must be completed locally before data sent to cloud. Fog computing's localised data processing makes it a suitable mediator. Industrial data is regularly shared among different applications for analysis, decision-making, and research. Here, we proposed an ECC-based proxy signcryption for IIoT (ECC-PSC-IIoT) in a fog computing environment. The proposed scheme is providing the features of signature and encryption in a single cycle to active the basic requirements of low computation and communication cost. The ECC-PSC-IIoT is proven to be secured by using AVISPA tool. Moreover, extensive performance assessment indicates the competency of the proposed scheme with respect to computation and communication time.
引用
收藏
页码:118 / 128
页数:12
相关论文
共 50 条
  • [41] The efficient proxy-protected proxy-signcryption scheme based on the ECKCDSA for mobile environment
    Kim, KS
    Kim, JB
    Yang, HK
    [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL X, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS II, 2002, : 26 - 30
  • [42] Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing
    王亮亮
    陈克非
    毛贤平
    王永涛
    [J]. Journal of Shanghai Jiaotong University(Science), 2014, 19 (04) : 398 - 405
  • [43] Efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing
    Wang L.-L.
    Chen K.-F.
    Mao X.-P.
    Wang Y.-T.
    [J]. Journal of Shanghai Jiaotong University (Science), 1600, Shanghai Jiaotong University (19): : 398 - 405
  • [44] A new hybrid encryption in fog–cloud environment for secure medical data-sharing
    G. A. Thushara
    S. Mary Saira Bhanu
    [J]. Iran Journal of Computer Science, 2023, 6 (2) : 169 - 183
  • [45] LightBlocks: A trusted lightweight signcryption and consensus scheme for industrial IoT ecosystems
    Bhattacharya, Pronaya
    Tiwari, Amod Kumar
    Verma, Ashwin
    Alabdulatif, Abdulatif
    Tanwar, Sudeep
    Sharma, Ravi
    [J]. COMPUTER STANDARDS & INTERFACES, 2024, 88
  • [46] Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN
    Ullah, Ata
    Said, Ghawar
    Sher, Muhammad
    Ning, Huansheng
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (01) : 163 - 174
  • [47] Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN
    Ata Ullah
    Ghawar Said
    Muhammad Sher
    Huansheng Ning
    [J]. Peer-to-Peer Networking and Applications, 2020, 13 : 163 - 174
  • [48] Proxy based Resource Management Scheme in IoT Environment
    Lee, DaeWon
    Yim, Kang-Bin
    Lee, HwaMin
    [J]. 2015 10TH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2015), 2015, : 544 - 546
  • [49] Secret Sharing-Based IoT Text Data Outsourcing: A Secure and Efficient Scheme
    Tang, Zhaohui
    [J]. IEEE ACCESS, 2021, 9 : 76908 - 76920
  • [50] A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things
    Chi, Jiancheng
    Li, Yu
    Huang, Jing
    Liu, Jing
    Jin, Yingwei
    Chen, Chen
    Qiu, Tie
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 167 (167)