A Secure and Efficient Scheme Based on Unlinkability and Anonymous Traceable Protocol for Cloud-Assisted IoT Environment

被引:1
|
作者
Gaur, Rajkumar [1 ]
Prakash, Shiva [1 ]
Prasad, L. V. Narasimha [2 ]
Kumar, Sanjay [3 ]
Abhishek, Kumar [4 ]
Guduri, Manisha [5 ]
机构
[1] MMMUT, Dept ITCA, Gorakhpur 273014, UP, India
[2] Inst Aeronaut Engn, Dept CSE, Hyderabad, India
[3] Rajkiya Engn Coll Azamgarh, ITD, Deogaon 276201, India
[4] Natl Inst Technol Patna, CSED, Patna 800005, India
[5] KG Reddy Coll Engn & Technol, Dept Elect & Commun Engn, Hyderabad, Telangana, India
关键词
Group sign; key escrow; assumptions; bilinear pairing; scheme; ECC; protocol; GROUP SIGNATURES; FOUNDATIONS;
D O I
10.1142/S0218126623503164
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The authenticity, privacy, and nonrepudiation of IoT applications are all guaranteed by the ID-Based Signature (IDBS) cryptographic technique. Digital communication presents challenges for information evaluation and removal-back transmission. Security was consequently needed in a cloud-based system to interact with the correct location or nodes. Furthermore, in a cloud-based environment, it is difficult to track a group's key escrow and secret key generations. We improve group signature security, an identity-based method, to address these problems. The strategy asks a member to sign documents on the group's behalf. The group manager (GM) membership is controlled by two protocols: join and revoke. The GM may utilize the Open protocol to determine who signed a communication. The classic ID-Based Group Signature (IDBGS) method uses a public-key generator (PKG). This method is founded on difficult mathematical ideas like the computational Diffie-Hellman assumptions. Based on the ID-Based GS system, this technique enhances group members' identity, legitimacy and visibility. The public key size and signature depend on the group members' autonomy. The improved method guarantees realistic confirmation of nodes and fortifies them against forgery attempts. This solution promises faster execution and increased dependability for secure nodes.
引用
收藏
页数:21
相关论文
共 50 条
  • [31] Lightweight Authentication Scheme for Data Dissemination in Cloud-Assisted Healthcare IoT
    Liu, Jianghua
    Yang, Jian
    Wu, Wei
    Huang, Xinyi
    Xiang, Yang
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (05) : 1384 - 1395
  • [32] Computationally efficient and secure anonymous authentication scheme for cloud users
    Arasan A.
    Sadaiyandi R.
    Al-Turjman F.
    Rajasekaran A.S.
    Selvi Karuppuswamy K.
    Personal and Ubiquitous Computing, 2024, 28 (1) : 111 - 121
  • [33] Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things
    Wang, Chenyu
    Wang, Ding
    Duan, Yihe
    Tao, Xiaofeng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2961 - 2976
  • [34] A Cloud-Assisted Proxy Re-Encryption Scheme for Efficient Data Sharing Across IoT Systems
    Muthukumaran, V
    Ezhilmaran, D.
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2020, 15 (04) : 18 - 36
  • [35] An efficient and access policy-hiding keyword search and data sharing scheme in cloud-assisted IoT
    Yin, Hui
    Li, Yangfan
    Li, Fangmin
    Deng, Hua
    Zhang, Wei
    Li, Keqin
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 128
  • [36] Efficient and Secure Content-Based Image Retrieval in Cloud-Assisted Internet of Things
    Chen, Lin
    Yang, Yiwei
    Yang, Li
    Xu, Chao
    Miao, Yinbin
    Liu, Zhiquan
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Liang, Zhihong
    Hong, Chao
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (05): : 6001 - 6013
  • [37] Forward Secure Public Key Encryption with Keyword Search for Cloud-assisted IoT
    Kim, Hyeongseob
    Hahn, Changhee
    Hur, Junbeom
    2020 IEEE 13TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2020), 2020, : 549 - 556
  • [38] Skyfiles: Efficient and Secure Cloud-assisted File Management for Mobile Devices
    Mao, Ying
    Wang, Jiayin
    Sheng, Bo
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 4202 - 4207
  • [39] Secure identity access and data transmission scheme of cloud-assisted intelligent gymnasium
    Jiang, Li
    Mu, Chunxiao
    ALEXANDRIA ENGINEERING JOURNAL, 2025, 115 : 469 - 478
  • [40] A Secure Lightweight Data Aggregation scheme for Cloud assisted IoT
    Tripathi, Aishwarya
    Pasupuleti, Syam Kumar
    2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), 2018, : 187 - 192