A Secure and Efficient Scheme Based on Unlinkability and Anonymous Traceable Protocol for Cloud-Assisted IoT Environment

被引:1
|
作者
Gaur, Rajkumar [1 ]
Prakash, Shiva [1 ]
Prasad, L. V. Narasimha [2 ]
Kumar, Sanjay [3 ]
Abhishek, Kumar [4 ]
Guduri, Manisha [5 ]
机构
[1] MMMUT, Dept ITCA, Gorakhpur 273014, UP, India
[2] Inst Aeronaut Engn, Dept CSE, Hyderabad, India
[3] Rajkiya Engn Coll Azamgarh, ITD, Deogaon 276201, India
[4] Natl Inst Technol Patna, CSED, Patna 800005, India
[5] KG Reddy Coll Engn & Technol, Dept Elect & Commun Engn, Hyderabad, Telangana, India
关键词
Group sign; key escrow; assumptions; bilinear pairing; scheme; ECC; protocol; GROUP SIGNATURES; FOUNDATIONS;
D O I
10.1142/S0218126623503164
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The authenticity, privacy, and nonrepudiation of IoT applications are all guaranteed by the ID-Based Signature (IDBS) cryptographic technique. Digital communication presents challenges for information evaluation and removal-back transmission. Security was consequently needed in a cloud-based system to interact with the correct location or nodes. Furthermore, in a cloud-based environment, it is difficult to track a group's key escrow and secret key generations. We improve group signature security, an identity-based method, to address these problems. The strategy asks a member to sign documents on the group's behalf. The group manager (GM) membership is controlled by two protocols: join and revoke. The GM may utilize the Open protocol to determine who signed a communication. The classic ID-Based Group Signature (IDBGS) method uses a public-key generator (PKG). This method is founded on difficult mathematical ideas like the computational Diffie-Hellman assumptions. Based on the ID-Based GS system, this technique enhances group members' identity, legitimacy and visibility. The public key size and signature depend on the group members' autonomy. The improved method guarantees realistic confirmation of nodes and fortifies them against forgery attempts. This solution promises faster execution and increased dependability for secure nodes.
引用
收藏
页数:21
相关论文
共 50 条
  • [41] An Efficient Certificate-Based Data Integrity Auditing Protocol for Cloud-Assisted WBANs
    Li, Yumei
    Zhang, Futai
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (13): : 11513 - 11523
  • [42] A Flexible Privacy-Preserving Data Sharing Scheme in Cloud-Assisted IoT
    Deng, Hua
    Qin, Zheng
    Sha, Letian
    Yin, Hui
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (12): : 11601 - 11611
  • [43] Secure Authentication and Key Agreement Protocol for Cloud-Assisted Industrial Internet of Things
    Hu, Huanhuan
    Liao, Longxia
    Zhao, Junhui
    ELECTRONICS, 2022, 11 (10)
  • [44] Composable secure roaming authentication protocol for cloud-assisted body sensor networks
    Chang, Chin-Chen (alan3c@gmail.com), 1600, Femto Technique Co., Ltd. (18):
  • [45] An efficient public key secure scheme for cloud and IoT security
    Thirumalai, Chandrasegar
    Mohan, Senthilkumar
    Srivastava, Gautam
    COMPUTER COMMUNICATIONS, 2020, 150 (150) : 634 - 643
  • [46] A Secure and Efficient Smartphone Payment Scheme in IoT/Cloud Environments
    Huang, Jheng-Jia
    Juang, Wen-Shenq
    Fan, Chun-I
    2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 91 - 96
  • [47] Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT
    Zhang, Yinghui
    Deng, Robert H.
    Zheng, Dong
    Li, Jin
    Wu, Pengfei
    Cao, Jin
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (09) : 5099 - 5108
  • [48] Segmented Hash-Based Privacy-Preserving Image Retrieval Scheme in Cloud-Assisted IoT
    Li, Xiehua
    Lei, Wanting
    Tang, Wenjuan
    Wang, Yingzhu
    Yang, Xiaoju
    Liao, Xin
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (21): : 35250 - 35265
  • [49] A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment
    Yu, Yicheng
    Hu, Liang
    Chu, Jianfeng
    SYMMETRY-BASEL, 2020, 12 (01):
  • [50] An Energy Efficient Routing Approach for Cloud-Assisted Green Industrial IoT Networks
    Bhandari, Khadak Singh
    Cho, G. I. Hwan
    SUSTAINABILITY, 2020, 12 (18)