Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management

Nowadays, two-factor data security protection has become a research hotspot in smart ocean management. With the increasing popularity of smart ocean management, how to achieve the two-factor protection of public data resources in smart ocean management is a serious problem to be tackled. Furthermore...

Full description

Bibliographic Details
Main Authors: Jian Shen, Xinzhao Jiang, Youngju Cho, Dengzhi Liu, Tianqi Zhou
Format: Article
Language:English
Published: MDPI AG 2019-01-01
Series:Sensors
Subjects:
Online Access:http://www.mdpi.com/1424-8220/19/1/129
_version_ 1817994248140619776
author Jian Shen
Xinzhao Jiang
Youngju Cho
Dengzhi Liu
Tianqi Zhou
author_facet Jian Shen
Xinzhao Jiang
Youngju Cho
Dengzhi Liu
Tianqi Zhou
author_sort Jian Shen
collection DOAJ
description Nowadays, two-factor data security protection has become a research hotspot in smart ocean management. With the increasing popularity of smart ocean management, how to achieve the two-factor protection of public data resources in smart ocean management is a serious problem to be tackled. Furthermore, how to achieve both security and revocation is also a challenge for two-factor protection. In this paper, we propose a two-factor-based protection scheme with factor revocation in smart ocean management. The proposed scheme allows data owners (DOs) to send encrypted messages to users through a shipboard server (SS). The DOs are required to formulate access policy and perform attribute-based encryption on messages. In order to decrypt, the users need to possess two factors. The first factor is the user’s secret key. The second factor is security equipment, which is a sensor card in smart ocean system. The ciphertext can be decrypted if and only if the user gathers the key and the security equipment at the same time. What is more, once the security equipment is lost, the equipment can be revoked and a new one is redistributed to the users. The theoretical analysis and experiment results indeed indicate the security, efficiency, and practicality of our scheme.
first_indexed 2024-04-14T01:50:27Z
format Article
id doaj.art-23b8d7c7aee144edb5b4c5abcdf01b6c
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-04-14T01:50:27Z
publishDate 2019-01-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-23b8d7c7aee144edb5b4c5abcdf01b6c2022-12-22T02:19:22ZengMDPI AGSensors1424-82202019-01-0119112910.3390/s19010129s19010129Two-Factor-Based Public Data Protection Scheme in Smart Ocean ManagementJian Shen0Xinzhao Jiang1Youngju Cho2Dengzhi Liu3Tianqi Zhou4Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing 210044, ChinaJiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing 210044, ChinaSW Convergence Education Institute, Chosun University, Gwanju 61452, KoreaJiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing 210044, ChinaJiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing 210044, ChinaNowadays, two-factor data security protection has become a research hotspot in smart ocean management. With the increasing popularity of smart ocean management, how to achieve the two-factor protection of public data resources in smart ocean management is a serious problem to be tackled. Furthermore, how to achieve both security and revocation is also a challenge for two-factor protection. In this paper, we propose a two-factor-based protection scheme with factor revocation in smart ocean management. The proposed scheme allows data owners (DOs) to send encrypted messages to users through a shipboard server (SS). The DOs are required to formulate access policy and perform attribute-based encryption on messages. In order to decrypt, the users need to possess two factors. The first factor is the user’s secret key. The second factor is security equipment, which is a sensor card in smart ocean system. The ciphertext can be decrypted if and only if the user gathers the key and the security equipment at the same time. What is more, once the security equipment is lost, the equipment can be revoked and a new one is redistributed to the users. The theoretical analysis and experiment results indeed indicate the security, efficiency, and practicality of our scheme.http://www.mdpi.com/1424-8220/19/1/129two-factorpublic data protectionredistributionattribute-based cryptographysmart ocean management
spellingShingle Jian Shen
Xinzhao Jiang
Youngju Cho
Dengzhi Liu
Tianqi Zhou
Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management
Sensors
two-factor
public data protection
redistribution
attribute-based cryptography
smart ocean management
title Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management
title_full Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management
title_fullStr Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management
title_full_unstemmed Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management
title_short Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management
title_sort two factor based public data protection scheme in smart ocean management
topic two-factor
public data protection
redistribution
attribute-based cryptography
smart ocean management
url http://www.mdpi.com/1424-8220/19/1/129
work_keys_str_mv AT jianshen twofactorbasedpublicdataprotectionschemeinsmartoceanmanagement
AT xinzhaojiang twofactorbasedpublicdataprotectionschemeinsmartoceanmanagement
AT youngjucho twofactorbasedpublicdataprotectionschemeinsmartoceanmanagement
AT dengzhiliu twofactorbasedpublicdataprotectionschemeinsmartoceanmanagement
AT tianqizhou twofactorbasedpublicdataprotectionschemeinsmartoceanmanagement