A Secure and Efficient Scheme Based on Unlinkability and Anonymous Traceable Protocol for Cloud-Assisted IoT Environment

被引:1
|
作者
Gaur, Rajkumar [1 ]
Prakash, Shiva [1 ]
Prasad, L. V. Narasimha [2 ]
Kumar, Sanjay [3 ]
Abhishek, Kumar [4 ]
Guduri, Manisha [5 ]
机构
[1] MMMUT, Dept ITCA, Gorakhpur 273014, UP, India
[2] Inst Aeronaut Engn, Dept CSE, Hyderabad, India
[3] Rajkiya Engn Coll Azamgarh, ITD, Deogaon 276201, India
[4] Natl Inst Technol Patna, CSED, Patna 800005, India
[5] KG Reddy Coll Engn & Technol, Dept Elect & Commun Engn, Hyderabad, Telangana, India
关键词
Group sign; key escrow; assumptions; bilinear pairing; scheme; ECC; protocol; GROUP SIGNATURES; FOUNDATIONS;
D O I
10.1142/S0218126623503164
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The authenticity, privacy, and nonrepudiation of IoT applications are all guaranteed by the ID-Based Signature (IDBS) cryptographic technique. Digital communication presents challenges for information evaluation and removal-back transmission. Security was consequently needed in a cloud-based system to interact with the correct location or nodes. Furthermore, in a cloud-based environment, it is difficult to track a group's key escrow and secret key generations. We improve group signature security, an identity-based method, to address these problems. The strategy asks a member to sign documents on the group's behalf. The group manager (GM) membership is controlled by two protocols: join and revoke. The GM may utilize the Open protocol to determine who signed a communication. The classic ID-Based Group Signature (IDBGS) method uses a public-key generator (PKG). This method is founded on difficult mathematical ideas like the computational Diffie-Hellman assumptions. Based on the ID-Based GS system, this technique enhances group members' identity, legitimacy and visibility. The public key size and signature depend on the group members' autonomy. The improved method guarantees realistic confirmation of nodes and fortifies them against forgery attempts. This solution promises faster execution and increased dependability for secure nodes.
引用
收藏
页数:21
相关论文
共 50 条
  • [21] Enabling secure mutual authentication and storage checking in cloud-assisted IoT
    Liu, Dengzhi
    Li, Zhimin
    Wang, Chen
    Ren, Yongjun
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2022, 19 (11) : 11034 - 11046
  • [22] Designing Secure Data Storage and Retrieval Scheme in Cloud-Assisted Internet-of-Drones Environment
    Prasad, Suryakant
    Rao, Y. Sreenivasa
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08): : 13734 - 13751
  • [23] ESDedup: An efficient and secure deduplication scheme based on data similarity and blockchain for cloud-assisted medical storage systems
    Ling Xiao
    Beiji Zou
    Chengzhang Zhu
    Fanbo Nie
    The Journal of Supercomputing, 2023, 79 : 2932 - 2960
  • [24] Provable Secure Anonymous Device Authentication Protocol in IoT Environment
    Ren, Shanyao
    Liu, Yizhong
    Yu, Beiyuan
    Liu, Jianwei
    Li, Dongyu
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 12266 - 12277
  • [25] A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS
    Kumar, Vinod
    Ahmad, Musheer
    Kumari, Adesh
    TELEMATICS AND INFORMATICS, 2019, 38 : 100 - 117
  • [26] Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system
    Bagga, Palak
    Mitra, Ankush
    Das, Ashok Kumar
    Vijayakumar, Pandi
    Park, YoungHo
    Karuppiah, Marimuthu
    COMPUTER COMMUNICATIONS, 2022, 195 : 27 - 39
  • [27] Blockchain-Based Secure and Verifiable Deduplication Scheme for Cloud-Assisted Internet of Things
    Zhang, Guipeng
    Chen, Pinghua
    Liao, Yongwei
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08): : 13995 - 14006
  • [28] A Note on "A Lightweight Cloud-Assisted Identity-Based Anonymous Authentication and Key Agreement Protocol for Secure Wireless Body Area Network"
    Cao, Zhengjun
    IEEE SYSTEMS JOURNAL, 2024, 18 (01): : 391 - 393
  • [29] MMDS: A secure and verifiable multimedia data search scheme for cloud-assisted
    Zhang, Shiwen
    He, Jiayi
    Liang, Wei
    Li, Keqin
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 151 : 32 - 44
  • [30] Computationally efficient and secure anonymous authentication scheme for cloud users
    Arasan, Anakath
    Sadaiyandi, Rajakumar
    Al-Turjman, Fadi
    Rajasekaran, Arun Sekar
    Selvi Karuppuswamy, Kalai
    Personal and Ubiquitous Computing, 2024, 28 (01) : 111 - 121