A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain
Access and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes numerous security and privacy issues. In the process of ensuring data confidentiali...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-03-01
|
Series: | Sensors |
Subjects: | |
Online Access: | http://www.mdpi.com/1424-8220/19/5/1235 |
_version_ | 1811299542769860608 |
---|---|
author | Kwame Opuni-Boachie Obour Agyekum Qi Xia Emmanuel Boateng Sifah Jianbin Gao Hu Xia Xiaojiang Du Moshen Guizani |
author_facet | Kwame Opuni-Boachie Obour Agyekum Qi Xia Emmanuel Boateng Sifah Jianbin Gao Hu Xia Xiaojiang Du Moshen Guizani |
author_sort | Kwame Opuni-Boachie Obour Agyekum |
collection | DOAJ |
description | Access and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes numerous security and privacy issues. In the process of ensuring data confidentiality and fine-grained access control to data in the cloud, several studies have proposed Attribute-Based Encryption (ABE) schemes, with Key Policy-ABE (KP-ABE) being the prominent one. Recent works have however suggested that the confidentiality of data is violated through collusion attacks between a revoked user and the cloud server. We present a secured and efficient Proxy Re-Encryption (PRE) scheme that incorporates an Inner-Product Encryption (IPE) scheme in which decryption of data is possible if the inner product of the private key, associated with a set of attributes specified by the data owner, and the associated ciphertext is equal to zero 0 . We utilize a blockchain network whose processing node acts as the proxy server and performs re-encryption on the data. In ensuring data confidentiality and preventing collusion attacks, the data are divided into two, with one part stored on the blockchain network and the other part stored on the cloud. Our approach also achieves fine-grained access control. |
first_indexed | 2024-04-13T06:36:25Z |
format | Article |
id | doaj.art-4bbfc72733b4473bb07576b7162be06e |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-04-13T06:36:25Z |
publishDate | 2019-03-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-4bbfc72733b4473bb07576b7162be06e2022-12-22T02:57:53ZengMDPI AGSensors1424-82202019-03-01195123510.3390/s19051235s19051235A Secured Proxy-Based Data Sharing Module in IoT Environments Using BlockchainKwame Opuni-Boachie Obour Agyekum0Qi Xia1Emmanuel Boateng Sifah2Jianbin Gao3Hu Xia4Xiaojiang Du5Moshen Guizani6Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu 611731, ChinaCenter for Cyber Security, University of Electronic Science and Technology of China, Chengdu 611731, ChinaCenter for Cyber Security, University of Electronic Science and Technology of China, Chengdu 611731, ChinaSchool of Resources and Environment, Center for Digital Health, University of Electronic Science and Technology of China, Chengdu 611731, ChinaCenter for Cyber Security, University of Electronic Science and Technology of China, Chengdu 611731, ChinaDepartment of Computer and Information Sciences, Temple University, Philadelphia, PA 19122, USADepartment of College of Engineering, Qatar University, Doha, QatarAccess and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes numerous security and privacy issues. In the process of ensuring data confidentiality and fine-grained access control to data in the cloud, several studies have proposed Attribute-Based Encryption (ABE) schemes, with Key Policy-ABE (KP-ABE) being the prominent one. Recent works have however suggested that the confidentiality of data is violated through collusion attacks between a revoked user and the cloud server. We present a secured and efficient Proxy Re-Encryption (PRE) scheme that incorporates an Inner-Product Encryption (IPE) scheme in which decryption of data is possible if the inner product of the private key, associated with a set of attributes specified by the data owner, and the associated ciphertext is equal to zero 0 . We utilize a blockchain network whose processing node acts as the proxy server and performs re-encryption on the data. In ensuring data confidentiality and preventing collusion attacks, the data are divided into two, with one part stored on the blockchain network and the other part stored on the cloud. Our approach also achieves fine-grained access control.http://www.mdpi.com/1424-8220/19/5/1235Attribute-Based Encryption (ABE)blockchaincyber-securityfine-grained access controlInner-Product Encryption (IPE)Internet of Things (IoT)proxy re-encryption |
spellingShingle | Kwame Opuni-Boachie Obour Agyekum Qi Xia Emmanuel Boateng Sifah Jianbin Gao Hu Xia Xiaojiang Du Moshen Guizani A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain Sensors Attribute-Based Encryption (ABE) blockchain cyber-security fine-grained access control Inner-Product Encryption (IPE) Internet of Things (IoT) proxy re-encryption |
title | A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain |
title_full | A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain |
title_fullStr | A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain |
title_full_unstemmed | A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain |
title_short | A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain |
title_sort | secured proxy based data sharing module in iot environments using blockchain |
topic | Attribute-Based Encryption (ABE) blockchain cyber-security fine-grained access control Inner-Product Encryption (IPE) Internet of Things (IoT) proxy re-encryption |
url | http://www.mdpi.com/1424-8220/19/5/1235 |
work_keys_str_mv | AT kwameopuniboachieobouragyekum asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT qixia asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT emmanuelboatengsifah asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT jianbingao asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT huxia asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT xiaojiangdu asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT moshenguizani asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT kwameopuniboachieobouragyekum securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT qixia securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT emmanuelboatengsifah securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT jianbingao securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT huxia securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT xiaojiangdu securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain AT moshenguizani securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain |