Cargando…
A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain
Access and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes numerous security and privacy issues. In the process of ensuring data confidentiali...
Autores principales: | , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6427380/ https://www.ncbi.nlm.nih.gov/pubmed/30862110 http://dx.doi.org/10.3390/s19051235 |
_version_ | 1783405197000704000 |
---|---|
author | Obour Agyekum, Kwame Opuni-Boachie Xia, Qi Sifah, Emmanuel Boateng Gao, Jianbin Xia, Hu Du, Xiaojiang Guizani, Moshen |
author_facet | Obour Agyekum, Kwame Opuni-Boachie Xia, Qi Sifah, Emmanuel Boateng Gao, Jianbin Xia, Hu Du, Xiaojiang Guizani, Moshen |
author_sort | Obour Agyekum, Kwame Opuni-Boachie |
collection | PubMed |
description | Access and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes numerous security and privacy issues. In the process of ensuring data confidentiality and fine-grained access control to data in the cloud, several studies have proposed Attribute-Based Encryption (ABE) schemes, with Key Policy-ABE (KP-ABE) being the prominent one. Recent works have however suggested that the confidentiality of data is violated through collusion attacks between a revoked user and the cloud server. We present a secured and efficient Proxy Re-Encryption (PRE) scheme that incorporates an Inner-Product Encryption (IPE) scheme in which decryption of data is possible if the inner product of the private key, associated with a set of attributes specified by the data owner, and the associated ciphertext is equal to zero [Formula: see text]. We utilize a blockchain network whose processing node acts as the proxy server and performs re-encryption on the data. In ensuring data confidentiality and preventing collusion attacks, the data are divided into two, with one part stored on the blockchain network and the other part stored on the cloud. Our approach also achieves fine-grained access control. |
format | Online Article Text |
id | pubmed-6427380 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-64273802019-04-15 A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain Obour Agyekum, Kwame Opuni-Boachie Xia, Qi Sifah, Emmanuel Boateng Gao, Jianbin Xia, Hu Du, Xiaojiang Guizani, Moshen Sensors (Basel) Article Access and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes numerous security and privacy issues. In the process of ensuring data confidentiality and fine-grained access control to data in the cloud, several studies have proposed Attribute-Based Encryption (ABE) schemes, with Key Policy-ABE (KP-ABE) being the prominent one. Recent works have however suggested that the confidentiality of data is violated through collusion attacks between a revoked user and the cloud server. We present a secured and efficient Proxy Re-Encryption (PRE) scheme that incorporates an Inner-Product Encryption (IPE) scheme in which decryption of data is possible if the inner product of the private key, associated with a set of attributes specified by the data owner, and the associated ciphertext is equal to zero [Formula: see text]. We utilize a blockchain network whose processing node acts as the proxy server and performs re-encryption on the data. In ensuring data confidentiality and preventing collusion attacks, the data are divided into two, with one part stored on the blockchain network and the other part stored on the cloud. Our approach also achieves fine-grained access control. MDPI 2019-03-11 /pmc/articles/PMC6427380/ /pubmed/30862110 http://dx.doi.org/10.3390/s19051235 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Obour Agyekum, Kwame Opuni-Boachie Xia, Qi Sifah, Emmanuel Boateng Gao, Jianbin Xia, Hu Du, Xiaojiang Guizani, Moshen A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain |
title | A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain |
title_full | A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain |
title_fullStr | A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain |
title_full_unstemmed | A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain |
title_short | A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain |
title_sort | secured proxy-based data sharing module in iot environments using blockchain |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6427380/ https://www.ncbi.nlm.nih.gov/pubmed/30862110 http://dx.doi.org/10.3390/s19051235 |
work_keys_str_mv | AT obouragyekumkwameopuniboachie asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT xiaqi asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT sifahemmanuelboateng asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT gaojianbin asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT xiahu asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT duxiaojiang asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT guizanimoshen asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT obouragyekumkwameopuniboachie securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT xiaqi securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT sifahemmanuelboateng securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT gaojianbin securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT xiahu securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT duxiaojiang securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT guizanimoshen securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain |