Cargando…

Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management

Nowadays, two-factor data security protection has become a research hotspot in smart ocean management. With the increasing popularity of smart ocean management, how to achieve the two-factor protection of public data resources in smart ocean management is a serious problem to be tackled. Furthermore...

Descripción completa

Detalles Bibliográficos
Autores principales: Shen, Jian, Jiang, Xinzhao, Cho, Youngju, Liu, Dengzhi, Zhou, Tianqi
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6339249/
https://www.ncbi.nlm.nih.gov/pubmed/30609740
http://dx.doi.org/10.3390/s19010129
_version_ 1783388595150651392
author Shen, Jian
Jiang, Xinzhao
Cho, Youngju
Liu, Dengzhi
Zhou, Tianqi
author_facet Shen, Jian
Jiang, Xinzhao
Cho, Youngju
Liu, Dengzhi
Zhou, Tianqi
author_sort Shen, Jian
collection PubMed
description Nowadays, two-factor data security protection has become a research hotspot in smart ocean management. With the increasing popularity of smart ocean management, how to achieve the two-factor protection of public data resources in smart ocean management is a serious problem to be tackled. Furthermore, how to achieve both security and revocation is also a challenge for two-factor protection. In this paper, we propose a two-factor-based protection scheme with factor revocation in smart ocean management. The proposed scheme allows data owners (DOs) to send encrypted messages to users through a shipboard server (SS). The DOs are required to formulate access policy and perform attribute-based encryption on messages. In order to decrypt, the users need to possess two factors. The first factor is the user’s secret key. The second factor is security equipment, which is a sensor card in smart ocean system. The ciphertext can be decrypted if and only if the user gathers the key and the security equipment at the same time. What is more, once the security equipment is lost, the equipment can be revoked and a new one is redistributed to the users. The theoretical analysis and experiment results indeed indicate the security, efficiency, and practicality of our scheme.
format Online
Article
Text
id pubmed-6339249
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-63392492019-01-23 Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management Shen, Jian Jiang, Xinzhao Cho, Youngju Liu, Dengzhi Zhou, Tianqi Sensors (Basel) Article Nowadays, two-factor data security protection has become a research hotspot in smart ocean management. With the increasing popularity of smart ocean management, how to achieve the two-factor protection of public data resources in smart ocean management is a serious problem to be tackled. Furthermore, how to achieve both security and revocation is also a challenge for two-factor protection. In this paper, we propose a two-factor-based protection scheme with factor revocation in smart ocean management. The proposed scheme allows data owners (DOs) to send encrypted messages to users through a shipboard server (SS). The DOs are required to formulate access policy and perform attribute-based encryption on messages. In order to decrypt, the users need to possess two factors. The first factor is the user’s secret key. The second factor is security equipment, which is a sensor card in smart ocean system. The ciphertext can be decrypted if and only if the user gathers the key and the security equipment at the same time. What is more, once the security equipment is lost, the equipment can be revoked and a new one is redistributed to the users. The theoretical analysis and experiment results indeed indicate the security, efficiency, and practicality of our scheme. MDPI 2019-01-02 /pmc/articles/PMC6339249/ /pubmed/30609740 http://dx.doi.org/10.3390/s19010129 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Shen, Jian
Jiang, Xinzhao
Cho, Youngju
Liu, Dengzhi
Zhou, Tianqi
Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management
title Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management
title_full Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management
title_fullStr Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management
title_full_unstemmed Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management
title_short Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management
title_sort two-factor-based public data protection scheme in smart ocean management
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6339249/
https://www.ncbi.nlm.nih.gov/pubmed/30609740
http://dx.doi.org/10.3390/s19010129
work_keys_str_mv AT shenjian twofactorbasedpublicdataprotectionschemeinsmartoceanmanagement
AT jiangxinzhao twofactorbasedpublicdataprotectionschemeinsmartoceanmanagement
AT choyoungju twofactorbasedpublicdataprotectionschemeinsmartoceanmanagement
AT liudengzhi twofactorbasedpublicdataprotectionschemeinsmartoceanmanagement
AT zhoutianqi twofactorbasedpublicdataprotectionschemeinsmartoceanmanagement