Next Article in Journal
Comparative Approach to De-Noising TEMPEST Video Frames
Previous Article in Journal
Enhancing Coffee Agroforestry Systems Suitability Using Geospatial Analysis and Sentinel Satellite Data in Gedeo Zone, Ethiopia
Previous Article in Special Issue
Reconstruction of Radio Environment Map Based on Multi-Source Domain Adaptive of Graph Neural Network for Regression
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments

Department of Computer Science and Engineering, National Taiwan Ocean University, Keelung 202, Taiwan
*
Author to whom correspondence should be addressed.
Sensors 2024, 24(19), 6290; https://doi.org/10.3390/s24196290 (registering DOI)
Submission received: 22 August 2024 / Revised: 21 September 2024 / Accepted: 26 September 2024 / Published: 28 September 2024

Abstract

As technology advances rapidly, a diverse array of Internet of Things (IoT) devices finds widespread application across numerous fields. The intelligent nature of these devices not only gives people more convenience, but also introduces new challenges especially in security when transmitting data in fog-based cloud environments. In fog computing environments, data need to be transmitted across multiple devices, increasing the risk of data being intercepted or tampered with during transmission. To securely share cloud ciphertexts, an alleged proxy re-encryption approach is a commonly adopted solution. Without decrypting the original ciphertext, such a mechanism permits a ciphertext intended for user A to be easily converted into the one intended for user B. However, to revoke the decryption privilege of data users usually relies on the system authority to maintain a user revocation list which inevitably increases the storage space. In this research, the authors come up with a fog-based proxy re-encryption system with revocable identity. Without maintaining the traditional user revocation list, the proposed scheme introduces a time-updated key mechanism. The time-update key could be viewed as a partial private key and should be renewed with different time periods. A revoked user is unable to obtain the renewed time-update key and hence cannot share or decrypt cloud ciphertexts. We formally demonstrate that the introduced scheme satisfies the security of indistinguishability against adaptively chosen identity and chosen plaintext attacks (IND-PrID-CPA) assuming the hardness of the Decisional Bilinear Diffie–Hellman (DBDH) problem in the random oracle model. Furthermore, compared with similar systems, the proposed one also has lower computational complexity as a whole.
Keywords: fog computing; proxy; re-encryption; revocation; IoT fog computing; proxy; re-encryption; revocation; IoT

Share and Cite

MDPI and ACS Style

Lin, H.-Y.; Chen, P.-R. Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments. Sensors 2024, 24, 6290. https://doi.org/10.3390/s24196290

AMA Style

Lin H-Y, Chen P-R. Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments. Sensors. 2024; 24(19):6290. https://doi.org/10.3390/s24196290

Chicago/Turabian Style

Lin, Han-Yu, and Pei-Ru Chen. 2024. "Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments" Sensors 24, no. 19: 6290. https://doi.org/10.3390/s24196290

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop