Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management
Nowadays, two-factor data security protection has become a research hotspot in smart ocean management. With the increasing popularity of smart ocean management, how to achieve the two-factor protection of public data resources in smart ocean management is a serious problem to be tackled. Furthermore...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-01-01
|
Series: | Sensors |
Subjects: | |
Online Access: | http://www.mdpi.com/1424-8220/19/1/129 |
_version_ | 1817994248140619776 |
---|---|
author | Jian Shen Xinzhao Jiang Youngju Cho Dengzhi Liu Tianqi Zhou |
author_facet | Jian Shen Xinzhao Jiang Youngju Cho Dengzhi Liu Tianqi Zhou |
author_sort | Jian Shen |
collection | DOAJ |
description | Nowadays, two-factor data security protection has become a research hotspot in smart ocean management. With the increasing popularity of smart ocean management, how to achieve the two-factor protection of public data resources in smart ocean management is a serious problem to be tackled. Furthermore, how to achieve both security and revocation is also a challenge for two-factor protection. In this paper, we propose a two-factor-based protection scheme with factor revocation in smart ocean management. The proposed scheme allows data owners (DOs) to send encrypted messages to users through a shipboard server (SS). The DOs are required to formulate access policy and perform attribute-based encryption on messages. In order to decrypt, the users need to possess two factors. The first factor is the user’s secret key. The second factor is security equipment, which is a sensor card in smart ocean system. The ciphertext can be decrypted if and only if the user gathers the key and the security equipment at the same time. What is more, once the security equipment is lost, the equipment can be revoked and a new one is redistributed to the users. The theoretical analysis and experiment results indeed indicate the security, efficiency, and practicality of our scheme. |
first_indexed | 2024-04-14T01:50:27Z |
format | Article |
id | doaj.art-23b8d7c7aee144edb5b4c5abcdf01b6c |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-04-14T01:50:27Z |
publishDate | 2019-01-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-23b8d7c7aee144edb5b4c5abcdf01b6c2022-12-22T02:19:22ZengMDPI AGSensors1424-82202019-01-0119112910.3390/s19010129s19010129Two-Factor-Based Public Data Protection Scheme in Smart Ocean ManagementJian Shen0Xinzhao Jiang1Youngju Cho2Dengzhi Liu3Tianqi Zhou4Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing 210044, ChinaJiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing 210044, ChinaSW Convergence Education Institute, Chosun University, Gwanju 61452, KoreaJiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing 210044, ChinaJiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing 210044, ChinaNowadays, two-factor data security protection has become a research hotspot in smart ocean management. With the increasing popularity of smart ocean management, how to achieve the two-factor protection of public data resources in smart ocean management is a serious problem to be tackled. Furthermore, how to achieve both security and revocation is also a challenge for two-factor protection. In this paper, we propose a two-factor-based protection scheme with factor revocation in smart ocean management. The proposed scheme allows data owners (DOs) to send encrypted messages to users through a shipboard server (SS). The DOs are required to formulate access policy and perform attribute-based encryption on messages. In order to decrypt, the users need to possess two factors. The first factor is the user’s secret key. The second factor is security equipment, which is a sensor card in smart ocean system. The ciphertext can be decrypted if and only if the user gathers the key and the security equipment at the same time. What is more, once the security equipment is lost, the equipment can be revoked and a new one is redistributed to the users. The theoretical analysis and experiment results indeed indicate the security, efficiency, and practicality of our scheme.http://www.mdpi.com/1424-8220/19/1/129two-factorpublic data protectionredistributionattribute-based cryptographysmart ocean management |
spellingShingle | Jian Shen Xinzhao Jiang Youngju Cho Dengzhi Liu Tianqi Zhou Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management Sensors two-factor public data protection redistribution attribute-based cryptography smart ocean management |
title | Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management |
title_full | Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management |
title_fullStr | Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management |
title_full_unstemmed | Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management |
title_short | Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management |
title_sort | two factor based public data protection scheme in smart ocean management |
topic | two-factor public data protection redistribution attribute-based cryptography smart ocean management |
url | http://www.mdpi.com/1424-8220/19/1/129 |
work_keys_str_mv | AT jianshen twofactorbasedpublicdataprotectionschemeinsmartoceanmanagement AT xinzhaojiang twofactorbasedpublicdataprotectionschemeinsmartoceanmanagement AT youngjucho twofactorbasedpublicdataprotectionschemeinsmartoceanmanagement AT dengzhiliu twofactorbasedpublicdataprotectionschemeinsmartoceanmanagement AT tianqizhou twofactorbasedpublicdataprotectionschemeinsmartoceanmanagement |