A Secure and Efficient Scheme Based on Unlinkability and Anonymous Traceable Protocol for Cloud-Assisted IoT Environment

被引:1
|
作者
Gaur, Rajkumar [1 ]
Prakash, Shiva [1 ]
Prasad, L. V. Narasimha [2 ]
Kumar, Sanjay [3 ]
Abhishek, Kumar [4 ]
Guduri, Manisha [5 ]
机构
[1] MMMUT, Dept ITCA, Gorakhpur 273014, UP, India
[2] Inst Aeronaut Engn, Dept CSE, Hyderabad, India
[3] Rajkiya Engn Coll Azamgarh, ITD, Deogaon 276201, India
[4] Natl Inst Technol Patna, CSED, Patna 800005, India
[5] KG Reddy Coll Engn & Technol, Dept Elect & Commun Engn, Hyderabad, Telangana, India
关键词
Group sign; key escrow; assumptions; bilinear pairing; scheme; ECC; protocol; GROUP SIGNATURES; FOUNDATIONS;
D O I
10.1142/S0218126623503164
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The authenticity, privacy, and nonrepudiation of IoT applications are all guaranteed by the ID-Based Signature (IDBS) cryptographic technique. Digital communication presents challenges for information evaluation and removal-back transmission. Security was consequently needed in a cloud-based system to interact with the correct location or nodes. Furthermore, in a cloud-based environment, it is difficult to track a group's key escrow and secret key generations. We improve group signature security, an identity-based method, to address these problems. The strategy asks a member to sign documents on the group's behalf. The group manager (GM) membership is controlled by two protocols: join and revoke. The GM may utilize the Open protocol to determine who signed a communication. The classic ID-Based Group Signature (IDBGS) method uses a public-key generator (PKG). This method is founded on difficult mathematical ideas like the computational Diffie-Hellman assumptions. Based on the ID-Based GS system, this technique enhances group members' identity, legitimacy and visibility. The public key size and signature depend on the group members' autonomy. The improved method guarantees realistic confirmation of nodes and fortifies them against forgery attempts. This solution promises faster execution and increased dependability for secure nodes.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] Efficient and Secure Cloud-Assisted Pattern Matching Protocol for Intelligent Environment
    Wei X.
    Xu L.
    Zheng Z.
    Wang H.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (11): : 2365 - 2374
  • [2] Secure and Real-Time Traceable Data Sharing in Cloud-Assisted IoT
    Lu, Jintian
    Li, Weilong
    Sun, Jiakun
    Xiao, Ruizhi
    Liao, Bolin
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 6521 - 6536
  • [3] A Secure Certificateless Signature Scheme for Cloud-Assisted Industrial IoT
    Shim, Kyung-Ah
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (04) : 6834 - 6843
  • [4] Secure Anonymous Authentication Protocol with Unlinkability for Mobile Wireless Environment
    Tsai, Jia-Lun
    Lo, Nai-Wei
    Wu, Tzong-Chen
    2012 INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION (ASID), 2012,
  • [5] Secure Data Sharing Scheme Based on Dual Attribute Conversion for Cloud-Assisted IoT
    Tan, Zuowen
    Chen, Yanliang
    Yu, Mengjiang
    Jiao, Jintao
    Cao, Faxin
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (20): : 33577 - 33591
  • [6] Secure, Efficient, and Weighted Access Control for Cloud-Assisted Industrial IoT
    Li, Qi
    Zhang, Qianqian
    Huang, Haiping
    Zhang, Wei
    Chen, Wei
    Wang, Huaqun
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (18) : 16917 - 16927
  • [7] A Secure and Efficient Medical Data Sharing Protocol for Cloud-Assisted WBAN
    Liu, Jingwei
    Zhong, Qian
    Sun, Rong
    Du, Xiaojiang
    Guizani, Mohsen
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [8] HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems
    Zhang, Yuan
    Xu, Chunxiang
    Li, Hongwei
    Yang, Kan
    Zhou, Jianying
    Lin, Xiaodong
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (09) : 4101 - 4112
  • [9] Anonymous decentralized attribute-based access control for cloud-assisted IoT
    Nasiraee, Hassan
    Ashouri-Talouki, Maede
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 110 : 45 - 56
  • [10] Secure and Traceable Multikey Image Retrieval in Cloud-Assisted Internet of Things
    Yang, Tengfei
    Li, Yuanyuan
    He, Jiawei
    Liu, Zhiquan
    Ren, Fang
    Wang, Teng
    Hou, Gaopan
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (24): : 40875 - 40887