A Secure and Efficient Scheme Based on Unlinkability and Anonymous Traceable Protocol for Cloud-Assisted IoT Environment

被引:1
|
作者
Gaur, Rajkumar [1 ]
Prakash, Shiva [1 ]
Prasad, L. V. Narasimha [2 ]
Kumar, Sanjay [3 ]
Abhishek, Kumar [4 ]
Guduri, Manisha [5 ]
机构
[1] MMMUT, Dept ITCA, Gorakhpur 273014, UP, India
[2] Inst Aeronaut Engn, Dept CSE, Hyderabad, India
[3] Rajkiya Engn Coll Azamgarh, ITD, Deogaon 276201, India
[4] Natl Inst Technol Patna, CSED, Patna 800005, India
[5] KG Reddy Coll Engn & Technol, Dept Elect & Commun Engn, Hyderabad, Telangana, India
关键词
Group sign; key escrow; assumptions; bilinear pairing; scheme; ECC; protocol; GROUP SIGNATURES; FOUNDATIONS;
D O I
10.1142/S0218126623503164
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The authenticity, privacy, and nonrepudiation of IoT applications are all guaranteed by the ID-Based Signature (IDBS) cryptographic technique. Digital communication presents challenges for information evaluation and removal-back transmission. Security was consequently needed in a cloud-based system to interact with the correct location or nodes. Furthermore, in a cloud-based environment, it is difficult to track a group's key escrow and secret key generations. We improve group signature security, an identity-based method, to address these problems. The strategy asks a member to sign documents on the group's behalf. The group manager (GM) membership is controlled by two protocols: join and revoke. The GM may utilize the Open protocol to determine who signed a communication. The classic ID-Based Group Signature (IDBGS) method uses a public-key generator (PKG). This method is founded on difficult mathematical ideas like the computational Diffie-Hellman assumptions. Based on the ID-Based GS system, this technique enhances group members' identity, legitimacy and visibility. The public key size and signature depend on the group members' autonomy. The improved method guarantees realistic confirmation of nodes and fortifies them against forgery attempts. This solution promises faster execution and increased dependability for secure nodes.
引用
收藏
页数:21
相关论文
共 50 条
  • [11] An identity-based public auditing protocol in cloud-assisted IoT
    Ramezani, Asal
    Asaar, Maryam Rajabzadeh
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (06): : 4339 - 4354
  • [12] An identity-based public auditing protocol in cloud-assisted IoT
    Asal Ramezani
    Maryam Rajabzadeh Asaar
    Cluster Computing, 2022, 25 : 4339 - 4354
  • [13] Secure and lightweight authentication protocol for anonymous data access in cloud assisted IoT system
    Vinod Mahor
    R. Padmavathy
    Santanu Chatterjee
    Peer-to-Peer Networking and Applications, 2024, 17 : 321 - 336
  • [14] Secure and lightweight authentication protocol for anonymous data access in cloud assisted IoT system
    Mahor, Vinod
    Padmavathy, R.
    Chatterjee, Santanu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (01) : 321 - 336
  • [15] A Secure Cloud-Assisted Certificateless Group Authentication Scheme for VANETs in Big Data Environment
    Tan, Haowen
    Chung, Ilyong
    BDE 2019: 2019 INTERNATIONAL CONFERENCE ON BIG DATA ENGINEERING, 2019, : 101 - 107
  • [16] Secure Data Collection, Storage, and Access in Cloud-Assisted IoT
    Wang, Wei
    Xu, Peng
    Yang, Laurence Tianruo
    IEEE CLOUD COMPUTING, 2018, 5 (04): : 77 - 88
  • [17] A secure data transmission protocol for cloud-assisted edge-Internet of Things environment
    Kumar, Manoj
    Verma, Harsh Kumar
    Sikka, Geeta
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (06)
  • [18] A secure and efficient data aggregation scheme for cloud-assisted wireless body area network
    Liu, Huaijin
    Chen, Yonghong
    Tian, Hui
    Wang, Tian
    International Journal of Network Security, 2019, 21 (02): : 243 - 249
  • [19] A Lightweight Cloud-Assisted Identity-Based Anonymous Authentication and Key Agreement Protocol for Secure Wireless Body Area Network
    Kumar, Mahender
    Chand, Satish
    IEEE SYSTEMS JOURNAL, 2021, 15 (02): : 2779 - 2786
  • [20] ESDedup: An efficient and secure deduplication scheme based on data similarity and blockchain for cloud-assisted medical storage systems
    Xiao, Ling
    Zou, Beiji
    Zhu, Chengzhang
    Nie, Fanbo
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (03): : 2932 - 2960