Cargando…

An environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing

Environmental monitoring plays a vital role in environmental protection, especially for the management and conservation of natural resources. However, environmental monitoring data is usually difficult to resist malicious attacks because it is transmitted in an open and insecure channel. In our pape...

Descripción completa

Detalles Bibliográficos
Autores principales: Yang, Xiaodong, Xi, Wanting, Chen, Aijia, Wang, Caifen
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8483347/
https://www.ncbi.nlm.nih.gov/pubmed/34591938
http://dx.doi.org/10.1371/journal.pone.0258062
_version_ 1784577103228829696
author Yang, Xiaodong
Xi, Wanting
Chen, Aijia
Wang, Caifen
author_facet Yang, Xiaodong
Xi, Wanting
Chen, Aijia
Wang, Caifen
author_sort Yang, Xiaodong
collection PubMed
description Environmental monitoring plays a vital role in environmental protection, especially for the management and conservation of natural resources. However, environmental monitoring data is usually difficult to resist malicious attacks because it is transmitted in an open and insecure channel. In our paper, a new data sharing scheme is proposed by using attribute-based encryption, identity-based signature and cloud computing technology to meet the requirements of confidentiality, integrity, verifiability, and unforgerability of environmental monitoring data. The monitoring equipment encrypts the monitored environmental data and uploads it to the environmental cloud server. Then, monitoring users can request access to the environmental cloud server. If the monitoring user meets the access policy, the plaintext is finally obtained through the fog node decryption. Our proposal mainly uses attribute-based encryption technology to realize the privacy protection and fine-grained access control of monitoring data. The integrity and unforgeability of the monitoring data are ensured by the digital signature. In addition, outsourcing computing technology saves the computing overhead of monitoring equipment and monitoring users. The security analysis illustrates that our proposal can achieve security purposes. Finally, the performance of our proposal and related schemes is evaluated from the aspects of communication overhead and computing overhead. The results indicate that our proposal is secure and efficient in environmental monitoring.
format Online
Article
Text
id pubmed-8483347
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-84833472021-10-01 An environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing Yang, Xiaodong Xi, Wanting Chen, Aijia Wang, Caifen PLoS One Research Article Environmental monitoring plays a vital role in environmental protection, especially for the management and conservation of natural resources. However, environmental monitoring data is usually difficult to resist malicious attacks because it is transmitted in an open and insecure channel. In our paper, a new data sharing scheme is proposed by using attribute-based encryption, identity-based signature and cloud computing technology to meet the requirements of confidentiality, integrity, verifiability, and unforgerability of environmental monitoring data. The monitoring equipment encrypts the monitored environmental data and uploads it to the environmental cloud server. Then, monitoring users can request access to the environmental cloud server. If the monitoring user meets the access policy, the plaintext is finally obtained through the fog node decryption. Our proposal mainly uses attribute-based encryption technology to realize the privacy protection and fine-grained access control of monitoring data. The integrity and unforgeability of the monitoring data are ensured by the digital signature. In addition, outsourcing computing technology saves the computing overhead of monitoring equipment and monitoring users. The security analysis illustrates that our proposal can achieve security purposes. Finally, the performance of our proposal and related schemes is evaluated from the aspects of communication overhead and computing overhead. The results indicate that our proposal is secure and efficient in environmental monitoring. Public Library of Science 2021-09-30 /pmc/articles/PMC8483347/ /pubmed/34591938 http://dx.doi.org/10.1371/journal.pone.0258062 Text en © 2021 Yang et al https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Yang, Xiaodong
Xi, Wanting
Chen, Aijia
Wang, Caifen
An environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing
title An environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing
title_full An environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing
title_fullStr An environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing
title_full_unstemmed An environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing
title_short An environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing
title_sort environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8483347/
https://www.ncbi.nlm.nih.gov/pubmed/34591938
http://dx.doi.org/10.1371/journal.pone.0258062
work_keys_str_mv AT yangxiaodong anenvironmentalmonitoringdatasharingschemebasedonattributeencryptionincloudfogcomputing
AT xiwanting anenvironmentalmonitoringdatasharingschemebasedonattributeencryptionincloudfogcomputing
AT chenaijia anenvironmentalmonitoringdatasharingschemebasedonattributeencryptionincloudfogcomputing
AT wangcaifen anenvironmentalmonitoringdatasharingschemebasedonattributeencryptionincloudfogcomputing
AT yangxiaodong environmentalmonitoringdatasharingschemebasedonattributeencryptionincloudfogcomputing
AT xiwanting environmentalmonitoringdatasharingschemebasedonattributeencryptionincloudfogcomputing
AT chenaijia environmentalmonitoringdatasharingschemebasedonattributeencryptionincloudfogcomputing
AT wangcaifen environmentalmonitoringdatasharingschemebasedonattributeencryptionincloudfogcomputing