Cargando…

Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation

In the fog computing architecture, a fog is a node closer to clients and responsible for responding to users’ requests as well as forwarding messages to clouds. In some medical applications such as the remote healthcare, a sensor of patients will first send encrypted data of sensed information to a...

Descripción completa

Detalles Bibliográficos
Autores principales: Lin, Han-Yu, Tsai, Tung-Tso, Ting, Pei-Yih, Fan, Yan-Rong
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10007563/
https://www.ncbi.nlm.nih.gov/pubmed/36904909
http://dx.doi.org/10.3390/s23052706
_version_ 1784905553167777792
author Lin, Han-Yu
Tsai, Tung-Tso
Ting, Pei-Yih
Fan, Yan-Rong
author_facet Lin, Han-Yu
Tsai, Tung-Tso
Ting, Pei-Yih
Fan, Yan-Rong
author_sort Lin, Han-Yu
collection PubMed
description In the fog computing architecture, a fog is a node closer to clients and responsible for responding to users’ requests as well as forwarding messages to clouds. In some medical applications such as the remote healthcare, a sensor of patients will first send encrypted data of sensed information to a nearby fog such that the fog acting as a re-encryption proxy could generate a re-encrypted ciphertext designated for requested data users in the cloud. Specifically, a data user can request access to cloud ciphertexts by sending a query to the fog node that will forward this query to the corresponding data owner who preserves the right to grant or deny the permission to access his/her data. When the access request is granted, the fog node will obtain a unique re-encryption key for carrying out the re-encryption process. Although some previous concepts have been proposed to fulfill these application requirements, they either have known security flaws or incur higher computational complexity. In this work, we present an identity-based proxy re-encryption scheme on the basis of the fog computing architecture. Our identity-based mechanism uses public channels for key distribution and avoids the troublesome problem of key escrow. We also formally prove that the proposed protocol is secure in the IND-PrID-CPA notion. Furthermore, we show that our work exhibits better performance in terms of computational complexity.
format Online
Article
Text
id pubmed-10007563
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-100075632023-03-12 Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation Lin, Han-Yu Tsai, Tung-Tso Ting, Pei-Yih Fan, Yan-Rong Sensors (Basel) Article In the fog computing architecture, a fog is a node closer to clients and responsible for responding to users’ requests as well as forwarding messages to clouds. In some medical applications such as the remote healthcare, a sensor of patients will first send encrypted data of sensed information to a nearby fog such that the fog acting as a re-encryption proxy could generate a re-encrypted ciphertext designated for requested data users in the cloud. Specifically, a data user can request access to cloud ciphertexts by sending a query to the fog node that will forward this query to the corresponding data owner who preserves the right to grant or deny the permission to access his/her data. When the access request is granted, the fog node will obtain a unique re-encryption key for carrying out the re-encryption process. Although some previous concepts have been proposed to fulfill these application requirements, they either have known security flaws or incur higher computational complexity. In this work, we present an identity-based proxy re-encryption scheme on the basis of the fog computing architecture. Our identity-based mechanism uses public channels for key distribution and avoids the troublesome problem of key escrow. We also formally prove that the proposed protocol is secure in the IND-PrID-CPA notion. Furthermore, we show that our work exhibits better performance in terms of computational complexity. MDPI 2023-03-01 /pmc/articles/PMC10007563/ /pubmed/36904909 http://dx.doi.org/10.3390/s23052706 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Lin, Han-Yu
Tsai, Tung-Tso
Ting, Pei-Yih
Fan, Yan-Rong
Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation
title Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation
title_full Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation
title_fullStr Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation
title_full_unstemmed Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation
title_short Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation
title_sort identity-based proxy re-encryption scheme using fog computing and anonymous key generation
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10007563/
https://www.ncbi.nlm.nih.gov/pubmed/36904909
http://dx.doi.org/10.3390/s23052706
work_keys_str_mv AT linhanyu identitybasedproxyreencryptionschemeusingfogcomputingandanonymouskeygeneration
AT tsaitungtso identitybasedproxyreencryptionschemeusingfogcomputingandanonymouskeygeneration
AT tingpeiyih identitybasedproxyreencryptionschemeusingfogcomputingandanonymouskeygeneration
AT fanyanrong identitybasedproxyreencryptionschemeusingfogcomputingandanonymouskeygeneration