Cargando…
Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation
In the fog computing architecture, a fog is a node closer to clients and responsible for responding to users’ requests as well as forwarding messages to clouds. In some medical applications such as the remote healthcare, a sensor of patients will first send encrypted data of sensed information to a...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10007563/ https://www.ncbi.nlm.nih.gov/pubmed/36904909 http://dx.doi.org/10.3390/s23052706 |
_version_ | 1784905553167777792 |
---|---|
author | Lin, Han-Yu Tsai, Tung-Tso Ting, Pei-Yih Fan, Yan-Rong |
author_facet | Lin, Han-Yu Tsai, Tung-Tso Ting, Pei-Yih Fan, Yan-Rong |
author_sort | Lin, Han-Yu |
collection | PubMed |
description | In the fog computing architecture, a fog is a node closer to clients and responsible for responding to users’ requests as well as forwarding messages to clouds. In some medical applications such as the remote healthcare, a sensor of patients will first send encrypted data of sensed information to a nearby fog such that the fog acting as a re-encryption proxy could generate a re-encrypted ciphertext designated for requested data users in the cloud. Specifically, a data user can request access to cloud ciphertexts by sending a query to the fog node that will forward this query to the corresponding data owner who preserves the right to grant or deny the permission to access his/her data. When the access request is granted, the fog node will obtain a unique re-encryption key for carrying out the re-encryption process. Although some previous concepts have been proposed to fulfill these application requirements, they either have known security flaws or incur higher computational complexity. In this work, we present an identity-based proxy re-encryption scheme on the basis of the fog computing architecture. Our identity-based mechanism uses public channels for key distribution and avoids the troublesome problem of key escrow. We also formally prove that the proposed protocol is secure in the IND-PrID-CPA notion. Furthermore, we show that our work exhibits better performance in terms of computational complexity. |
format | Online Article Text |
id | pubmed-10007563 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-100075632023-03-12 Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation Lin, Han-Yu Tsai, Tung-Tso Ting, Pei-Yih Fan, Yan-Rong Sensors (Basel) Article In the fog computing architecture, a fog is a node closer to clients and responsible for responding to users’ requests as well as forwarding messages to clouds. In some medical applications such as the remote healthcare, a sensor of patients will first send encrypted data of sensed information to a nearby fog such that the fog acting as a re-encryption proxy could generate a re-encrypted ciphertext designated for requested data users in the cloud. Specifically, a data user can request access to cloud ciphertexts by sending a query to the fog node that will forward this query to the corresponding data owner who preserves the right to grant or deny the permission to access his/her data. When the access request is granted, the fog node will obtain a unique re-encryption key for carrying out the re-encryption process. Although some previous concepts have been proposed to fulfill these application requirements, they either have known security flaws or incur higher computational complexity. In this work, we present an identity-based proxy re-encryption scheme on the basis of the fog computing architecture. Our identity-based mechanism uses public channels for key distribution and avoids the troublesome problem of key escrow. We also formally prove that the proposed protocol is secure in the IND-PrID-CPA notion. Furthermore, we show that our work exhibits better performance in terms of computational complexity. MDPI 2023-03-01 /pmc/articles/PMC10007563/ /pubmed/36904909 http://dx.doi.org/10.3390/s23052706 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Lin, Han-Yu Tsai, Tung-Tso Ting, Pei-Yih Fan, Yan-Rong Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation |
title | Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation |
title_full | Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation |
title_fullStr | Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation |
title_full_unstemmed | Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation |
title_short | Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation |
title_sort | identity-based proxy re-encryption scheme using fog computing and anonymous key generation |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10007563/ https://www.ncbi.nlm.nih.gov/pubmed/36904909 http://dx.doi.org/10.3390/s23052706 |
work_keys_str_mv | AT linhanyu identitybasedproxyreencryptionschemeusingfogcomputingandanonymouskeygeneration AT tsaitungtso identitybasedproxyreencryptionschemeusingfogcomputingandanonymouskeygeneration AT tingpeiyih identitybasedproxyreencryptionschemeusingfogcomputingandanonymouskeygeneration AT fanyanrong identitybasedproxyreencryptionschemeusingfogcomputingandanonymouskeygeneration |