Cargando…

A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain

Access and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes numerous security and privacy issues. In the process of ensuring data confidentiali...

Descripción completa

Detalles Bibliográficos
Autores principales: Obour Agyekum, Kwame Opuni-Boachie, Xia, Qi, Sifah, Emmanuel Boateng, Gao, Jianbin, Xia, Hu, Du, Xiaojiang, Guizani, Moshen
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6427380/
https://www.ncbi.nlm.nih.gov/pubmed/30862110
http://dx.doi.org/10.3390/s19051235
_version_ 1783405197000704000
author Obour Agyekum, Kwame Opuni-Boachie
Xia, Qi
Sifah, Emmanuel Boateng
Gao, Jianbin
Xia, Hu
Du, Xiaojiang
Guizani, Moshen
author_facet Obour Agyekum, Kwame Opuni-Boachie
Xia, Qi
Sifah, Emmanuel Boateng
Gao, Jianbin
Xia, Hu
Du, Xiaojiang
Guizani, Moshen
author_sort Obour Agyekum, Kwame Opuni-Boachie
collection PubMed
description Access and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes numerous security and privacy issues. In the process of ensuring data confidentiality and fine-grained access control to data in the cloud, several studies have proposed Attribute-Based Encryption (ABE) schemes, with Key Policy-ABE (KP-ABE) being the prominent one. Recent works have however suggested that the confidentiality of data is violated through collusion attacks between a revoked user and the cloud server. We present a secured and efficient Proxy Re-Encryption (PRE) scheme that incorporates an Inner-Product Encryption (IPE) scheme in which decryption of data is possible if the inner product of the private key, associated with a set of attributes specified by the data owner, and the associated ciphertext is equal to zero [Formula: see text]. We utilize a blockchain network whose processing node acts as the proxy server and performs re-encryption on the data. In ensuring data confidentiality and preventing collusion attacks, the data are divided into two, with one part stored on the blockchain network and the other part stored on the cloud. Our approach also achieves fine-grained access control.
format Online
Article
Text
id pubmed-6427380
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-64273802019-04-15 A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain Obour Agyekum, Kwame Opuni-Boachie Xia, Qi Sifah, Emmanuel Boateng Gao, Jianbin Xia, Hu Du, Xiaojiang Guizani, Moshen Sensors (Basel) Article Access and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes numerous security and privacy issues. In the process of ensuring data confidentiality and fine-grained access control to data in the cloud, several studies have proposed Attribute-Based Encryption (ABE) schemes, with Key Policy-ABE (KP-ABE) being the prominent one. Recent works have however suggested that the confidentiality of data is violated through collusion attacks between a revoked user and the cloud server. We present a secured and efficient Proxy Re-Encryption (PRE) scheme that incorporates an Inner-Product Encryption (IPE) scheme in which decryption of data is possible if the inner product of the private key, associated with a set of attributes specified by the data owner, and the associated ciphertext is equal to zero [Formula: see text]. We utilize a blockchain network whose processing node acts as the proxy server and performs re-encryption on the data. In ensuring data confidentiality and preventing collusion attacks, the data are divided into two, with one part stored on the blockchain network and the other part stored on the cloud. Our approach also achieves fine-grained access control. MDPI 2019-03-11 /pmc/articles/PMC6427380/ /pubmed/30862110 http://dx.doi.org/10.3390/s19051235 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Obour Agyekum, Kwame Opuni-Boachie
Xia, Qi
Sifah, Emmanuel Boateng
Gao, Jianbin
Xia, Hu
Du, Xiaojiang
Guizani, Moshen
A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain
title A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain
title_full A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain
title_fullStr A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain
title_full_unstemmed A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain
title_short A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain
title_sort secured proxy-based data sharing module in iot environments using blockchain
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6427380/
https://www.ncbi.nlm.nih.gov/pubmed/30862110
http://dx.doi.org/10.3390/s19051235
work_keys_str_mv AT obouragyekumkwameopuniboachie asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT xiaqi asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT sifahemmanuelboateng asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT gaojianbin asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT xiahu asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT duxiaojiang asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT guizanimoshen asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT obouragyekumkwameopuniboachie securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT xiaqi securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT sifahemmanuelboateng securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT gaojianbin securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT xiahu securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT duxiaojiang securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT guizanimoshen securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain