Cargando…

An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in Clouds

IoT-based data outsourcing services in clouds could be regarded as a new trend in recent years, as they could reduce the hardware and software cost for enterprises and obtain higher flexibility. To securely transfer an encrypted message in the cloud, a so-called proxy re-encryption scheme is a bette...

Descripción completa

Detalles Bibliográficos
Autores principales: Lin, Han-Yu, Hung, Yao-Min
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7795422/
https://www.ncbi.nlm.nih.gov/pubmed/33374340
http://dx.doi.org/10.3390/s21010067
_version_ 1783634441380298752
author Lin, Han-Yu
Hung, Yao-Min
author_facet Lin, Han-Yu
Hung, Yao-Min
author_sort Lin, Han-Yu
collection PubMed
description IoT-based data outsourcing services in clouds could be regarded as a new trend in recent years, as they could reduce the hardware and software cost for enterprises and obtain higher flexibility. To securely transfer an encrypted message in the cloud, a so-called proxy re-encryption scheme is a better alternative. In such schemes, a ciphertext designated for a data aggregation is able to be re-encrypted as one designated for another by a semi-trusted proxy without decryption. In this paper, we introduce a secure proxy re-encryption protocol for IoT-based data outsourcing services in clouds. The proposed scheme is provably secure assuming the hardness of the bilinear inverse Diffie–Hellman problem (BIDHP). In particular, our scheme is bidirectional and supports the functionality of multi-hop, which allows an uploaded ciphertext to be transformed into a different one multiple times. The ciphertext length of our method is independent of the number of involved IoT nodes. Specifically, the re-encryption process only takes one exponentiation computation which is around 54 ms when sharing the data with 100 IoT devices. For each IoT node, the decryption process only requires two exponentiation computations. When compared with a related protocol presented by Kim and Lee, the proposed one also exhibits lower computational costs.
format Online
Article
Text
id pubmed-7795422
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-77954222021-01-10 An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in Clouds Lin, Han-Yu Hung, Yao-Min Sensors (Basel) Letter IoT-based data outsourcing services in clouds could be regarded as a new trend in recent years, as they could reduce the hardware and software cost for enterprises and obtain higher flexibility. To securely transfer an encrypted message in the cloud, a so-called proxy re-encryption scheme is a better alternative. In such schemes, a ciphertext designated for a data aggregation is able to be re-encrypted as one designated for another by a semi-trusted proxy without decryption. In this paper, we introduce a secure proxy re-encryption protocol for IoT-based data outsourcing services in clouds. The proposed scheme is provably secure assuming the hardness of the bilinear inverse Diffie–Hellman problem (BIDHP). In particular, our scheme is bidirectional and supports the functionality of multi-hop, which allows an uploaded ciphertext to be transformed into a different one multiple times. The ciphertext length of our method is independent of the number of involved IoT nodes. Specifically, the re-encryption process only takes one exponentiation computation which is around 54 ms when sharing the data with 100 IoT devices. For each IoT node, the decryption process only requires two exponentiation computations. When compared with a related protocol presented by Kim and Lee, the proposed one also exhibits lower computational costs. MDPI 2020-12-24 /pmc/articles/PMC7795422/ /pubmed/33374340 http://dx.doi.org/10.3390/s21010067 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Letter
Lin, Han-Yu
Hung, Yao-Min
An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in Clouds
title An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in Clouds
title_full An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in Clouds
title_fullStr An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in Clouds
title_full_unstemmed An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in Clouds
title_short An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in Clouds
title_sort improved proxy re-encryption scheme for iot-based data outsourcing services in clouds
topic Letter
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7795422/
https://www.ncbi.nlm.nih.gov/pubmed/33374340
http://dx.doi.org/10.3390/s21010067
work_keys_str_mv AT linhanyu animprovedproxyreencryptionschemeforiotbaseddataoutsourcingservicesinclouds
AT hungyaomin animprovedproxyreencryptionschemeforiotbaseddataoutsourcingservicesinclouds
AT linhanyu improvedproxyreencryptionschemeforiotbaseddataoutsourcingservicesinclouds
AT hungyaomin improvedproxyreencryptionschemeforiotbaseddataoutsourcingservicesinclouds