Cargando…
Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management
Nowadays, two-factor data security protection has become a research hotspot in smart ocean management. With the increasing popularity of smart ocean management, how to achieve the two-factor protection of public data resources in smart ocean management is a serious problem to be tackled. Furthermore...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6339249/ https://www.ncbi.nlm.nih.gov/pubmed/30609740 http://dx.doi.org/10.3390/s19010129 |
_version_ | 1783388595150651392 |
---|---|
author | Shen, Jian Jiang, Xinzhao Cho, Youngju Liu, Dengzhi Zhou, Tianqi |
author_facet | Shen, Jian Jiang, Xinzhao Cho, Youngju Liu, Dengzhi Zhou, Tianqi |
author_sort | Shen, Jian |
collection | PubMed |
description | Nowadays, two-factor data security protection has become a research hotspot in smart ocean management. With the increasing popularity of smart ocean management, how to achieve the two-factor protection of public data resources in smart ocean management is a serious problem to be tackled. Furthermore, how to achieve both security and revocation is also a challenge for two-factor protection. In this paper, we propose a two-factor-based protection scheme with factor revocation in smart ocean management. The proposed scheme allows data owners (DOs) to send encrypted messages to users through a shipboard server (SS). The DOs are required to formulate access policy and perform attribute-based encryption on messages. In order to decrypt, the users need to possess two factors. The first factor is the user’s secret key. The second factor is security equipment, which is a sensor card in smart ocean system. The ciphertext can be decrypted if and only if the user gathers the key and the security equipment at the same time. What is more, once the security equipment is lost, the equipment can be revoked and a new one is redistributed to the users. The theoretical analysis and experiment results indeed indicate the security, efficiency, and practicality of our scheme. |
format | Online Article Text |
id | pubmed-6339249 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-63392492019-01-23 Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management Shen, Jian Jiang, Xinzhao Cho, Youngju Liu, Dengzhi Zhou, Tianqi Sensors (Basel) Article Nowadays, two-factor data security protection has become a research hotspot in smart ocean management. With the increasing popularity of smart ocean management, how to achieve the two-factor protection of public data resources in smart ocean management is a serious problem to be tackled. Furthermore, how to achieve both security and revocation is also a challenge for two-factor protection. In this paper, we propose a two-factor-based protection scheme with factor revocation in smart ocean management. The proposed scheme allows data owners (DOs) to send encrypted messages to users through a shipboard server (SS). The DOs are required to formulate access policy and perform attribute-based encryption on messages. In order to decrypt, the users need to possess two factors. The first factor is the user’s secret key. The second factor is security equipment, which is a sensor card in smart ocean system. The ciphertext can be decrypted if and only if the user gathers the key and the security equipment at the same time. What is more, once the security equipment is lost, the equipment can be revoked and a new one is redistributed to the users. The theoretical analysis and experiment results indeed indicate the security, efficiency, and practicality of our scheme. MDPI 2019-01-02 /pmc/articles/PMC6339249/ /pubmed/30609740 http://dx.doi.org/10.3390/s19010129 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Shen, Jian Jiang, Xinzhao Cho, Youngju Liu, Dengzhi Zhou, Tianqi Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management |
title | Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management |
title_full | Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management |
title_fullStr | Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management |
title_full_unstemmed | Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management |
title_short | Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management |
title_sort | two-factor-based public data protection scheme in smart ocean management |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6339249/ https://www.ncbi.nlm.nih.gov/pubmed/30609740 http://dx.doi.org/10.3390/s19010129 |
work_keys_str_mv | AT shenjian twofactorbasedpublicdataprotectionschemeinsmartoceanmanagement AT jiangxinzhao twofactorbasedpublicdataprotectionschemeinsmartoceanmanagement AT choyoungju twofactorbasedpublicdataprotectionschemeinsmartoceanmanagement AT liudengzhi twofactorbasedpublicdataprotectionschemeinsmartoceanmanagement AT zhoutianqi twofactorbasedpublicdataprotectionschemeinsmartoceanmanagement |