Cargando…

An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments

In a fog-enabled IoT environment, a fog node is regarded as the proxy between end users and cloud servers to reduce the latency of data transmission, so as to fulfill the requirement of more real-time applications. A data storage scheme utilizing fog computing architecture allows a user to share clo...

Descripción completa

Detalles Bibliográficos
Autores principales: Lin, Han-Yu, Tsai, Tung-Tso, Ting, Pei-Yih, Chen, Ching-Chung
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9185317/
https://www.ncbi.nlm.nih.gov/pubmed/35684844
http://dx.doi.org/10.3390/s22114223
_version_ 1784724694676537344
author Lin, Han-Yu
Tsai, Tung-Tso
Ting, Pei-Yih
Chen, Ching-Chung
author_facet Lin, Han-Yu
Tsai, Tung-Tso
Ting, Pei-Yih
Chen, Ching-Chung
author_sort Lin, Han-Yu
collection PubMed
description In a fog-enabled IoT environment, a fog node is regarded as the proxy between end users and cloud servers to reduce the latency of data transmission, so as to fulfill the requirement of more real-time applications. A data storage scheme utilizing fog computing architecture allows a user to share cloud data with other users via the assistance of fog nodes. In particular, a fog node obtaining a re-encryption key of the data owner is able to convert a cloud ciphertext into the one which is decryptable by another designated user. In such a scheme, a proxy should not learn any information about the plaintext during the transmission and re-encryption processes. In 2020, an ID-based data storage scheme utilizing anonymous key generation in fog computing was proposed by some researchers. Although their protocol is provably secure in a proof model of random oracles, we will point out that there are some security flaws inherited in their protocol. On the basis of their work, we further present an improved variant, which not only eliminates their security weaknesses, but also preserves the functionalities of anonymous key generation and user revocation mechanism. Additionally, under the Decisional Bilinear Diffie–Hellman (DBDH) assumption, we demonstrate that our enhanced construction is also provably secure in the security notion of IND-PrID-CPA.
format Online
Article
Text
id pubmed-9185317
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-91853172022-06-11 An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments Lin, Han-Yu Tsai, Tung-Tso Ting, Pei-Yih Chen, Ching-Chung Sensors (Basel) Article In a fog-enabled IoT environment, a fog node is regarded as the proxy between end users and cloud servers to reduce the latency of data transmission, so as to fulfill the requirement of more real-time applications. A data storage scheme utilizing fog computing architecture allows a user to share cloud data with other users via the assistance of fog nodes. In particular, a fog node obtaining a re-encryption key of the data owner is able to convert a cloud ciphertext into the one which is decryptable by another designated user. In such a scheme, a proxy should not learn any information about the plaintext during the transmission and re-encryption processes. In 2020, an ID-based data storage scheme utilizing anonymous key generation in fog computing was proposed by some researchers. Although their protocol is provably secure in a proof model of random oracles, we will point out that there are some security flaws inherited in their protocol. On the basis of their work, we further present an improved variant, which not only eliminates their security weaknesses, but also preserves the functionalities of anonymous key generation and user revocation mechanism. Additionally, under the Decisional Bilinear Diffie–Hellman (DBDH) assumption, we demonstrate that our enhanced construction is also provably secure in the security notion of IND-PrID-CPA. MDPI 2022-06-01 /pmc/articles/PMC9185317/ /pubmed/35684844 http://dx.doi.org/10.3390/s22114223 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Lin, Han-Yu
Tsai, Tung-Tso
Ting, Pei-Yih
Chen, Ching-Chung
An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments
title An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments
title_full An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments
title_fullStr An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments
title_full_unstemmed An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments
title_short An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments
title_sort improved id-based data storage scheme for fog-enabled iot environments
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9185317/
https://www.ncbi.nlm.nih.gov/pubmed/35684844
http://dx.doi.org/10.3390/s22114223
work_keys_str_mv AT linhanyu animprovedidbaseddatastorageschemeforfogenablediotenvironments
AT tsaitungtso animprovedidbaseddatastorageschemeforfogenablediotenvironments
AT tingpeiyih animprovedidbaseddatastorageschemeforfogenablediotenvironments
AT chenchingchung animprovedidbaseddatastorageschemeforfogenablediotenvironments
AT linhanyu improvedidbaseddatastorageschemeforfogenablediotenvironments
AT tsaitungtso improvedidbaseddatastorageschemeforfogenablediotenvironments
AT tingpeiyih improvedidbaseddatastorageschemeforfogenablediotenvironments
AT chenchingchung improvedidbaseddatastorageschemeforfogenablediotenvironments