A Threshold Proxy Re-Encryption Scheme for Secure IoT Data Sharing Based on Blockchain
Open Access
- 27 September 2021
- journal article
- research article
- Published by MDPI AG in Electronics
- Vol. 10 (19), 2359
- https://doi.org/10.3390/electronics10192359
Abstract
The IoT devices deployed in various application scenarios will generate massive data with immeasurable value every day. These data often contain the user’s personal privacy information, so there is an imperative need to guarantee the reliability and security of IoT data sharing. We proposed a new encrypted data storing and sharing architecture by combining proxy re-encryption with blockchain technology. The consensus mechanism based on threshold proxy re-encryption eliminates dependence on the third-party central service providers. Multiple consensus nodes in the blockchain network act as proxy service nodes to re-encrypt data and combine converted ciphertext, and personal information will not be disclosed in the whole procedure. That eliminates the restrictions of using decentralized network to store and distribute private encrypted data safely. We implemented a lot of simulated experiments to evaluate the performance of the proposed framework. The results show that the proposed architecture can meet the extensive data access demands and increase a tolerable time latency. Our scheme is one of the essays to utilize the threshold proxy re-encryption and blockchain consensus algorithm to support IoT data sharing.Keywords
Funding Information
- National Key Research and Development Program of China (2018YFB0204301)
This publication has 20 references indexed in Scilit:
- Achieving Scalable Access Control Over Encrypted Data for Edge Computing NetworksIEEE Access, 2018
- Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud ComputingIEEE Transactions on Industrial Informatics, 2018
- Secure Data Collection, Storage and Access in Cloud-Assisted IoTIEEE Cloud Computing, 2018
- MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via BlockchainIEEE Access, 2017
- Identity-based conditional proxy re-encryption with fine grain policyComputer Standards & Interfaces, 2017
- Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of ThingsIEEE Cloud Computing, 2017
- Cost-effective secure E-health cloud system using identity based cryptographic techniquesFuture Generation Computer Systems, 2017
- Identity-based proxy re-encryption version 2: Making mobile access easy in cloudFuture Generation Computer Systems, 2016
- Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud StorageIEEE Transactions on Information Forensics and Security, 2015
- Improved proxy re-encryption schemes with applications to secure distributed storageACM Transactions on Information and System Security, 2006