A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain

Access and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes numerous security and privacy issues. In the process of ensuring data confidentiali...

Full description

Bibliographic Details
Main Authors: Kwame Opuni-Boachie Obour Agyekum, Qi Xia, Emmanuel Boateng Sifah, Jianbin Gao, Hu Xia, Xiaojiang Du, Moshen Guizani
Format: Article
Language:English
Published: MDPI AG 2019-03-01
Series:Sensors
Subjects:
Online Access:http://www.mdpi.com/1424-8220/19/5/1235
_version_ 1811299542769860608
author Kwame Opuni-Boachie Obour Agyekum
Qi Xia
Emmanuel Boateng Sifah
Jianbin Gao
Hu Xia
Xiaojiang Du
Moshen Guizani
author_facet Kwame Opuni-Boachie Obour Agyekum
Qi Xia
Emmanuel Boateng Sifah
Jianbin Gao
Hu Xia
Xiaojiang Du
Moshen Guizani
author_sort Kwame Opuni-Boachie Obour Agyekum
collection DOAJ
description Access and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes numerous security and privacy issues. In the process of ensuring data confidentiality and fine-grained access control to data in the cloud, several studies have proposed Attribute-Based Encryption (ABE) schemes, with Key Policy-ABE (KP-ABE) being the prominent one. Recent works have however suggested that the confidentiality of data is violated through collusion attacks between a revoked user and the cloud server. We present a secured and efficient Proxy Re-Encryption (PRE) scheme that incorporates an Inner-Product Encryption (IPE) scheme in which decryption of data is possible if the inner product of the private key, associated with a set of attributes specified by the data owner, and the associated ciphertext is equal to zero 0 . We utilize a blockchain network whose processing node acts as the proxy server and performs re-encryption on the data. In ensuring data confidentiality and preventing collusion attacks, the data are divided into two, with one part stored on the blockchain network and the other part stored on the cloud. Our approach also achieves fine-grained access control.
first_indexed 2024-04-13T06:36:25Z
format Article
id doaj.art-4bbfc72733b4473bb07576b7162be06e
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-04-13T06:36:25Z
publishDate 2019-03-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-4bbfc72733b4473bb07576b7162be06e2022-12-22T02:57:53ZengMDPI AGSensors1424-82202019-03-01195123510.3390/s19051235s19051235A Secured Proxy-Based Data Sharing Module in IoT Environments Using BlockchainKwame Opuni-Boachie Obour Agyekum0Qi Xia1Emmanuel Boateng Sifah2Jianbin Gao3Hu Xia4Xiaojiang Du5Moshen Guizani6Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu 611731, ChinaCenter for Cyber Security, University of Electronic Science and Technology of China, Chengdu 611731, ChinaCenter for Cyber Security, University of Electronic Science and Technology of China, Chengdu 611731, ChinaSchool of Resources and Environment, Center for Digital Health, University of Electronic Science and Technology of China, Chengdu 611731, ChinaCenter for Cyber Security, University of Electronic Science and Technology of China, Chengdu 611731, ChinaDepartment of Computer and Information Sciences, Temple University, Philadelphia, PA 19122, USADepartment of College of Engineering, Qatar University, Doha, QatarAccess and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes numerous security and privacy issues. In the process of ensuring data confidentiality and fine-grained access control to data in the cloud, several studies have proposed Attribute-Based Encryption (ABE) schemes, with Key Policy-ABE (KP-ABE) being the prominent one. Recent works have however suggested that the confidentiality of data is violated through collusion attacks between a revoked user and the cloud server. We present a secured and efficient Proxy Re-Encryption (PRE) scheme that incorporates an Inner-Product Encryption (IPE) scheme in which decryption of data is possible if the inner product of the private key, associated with a set of attributes specified by the data owner, and the associated ciphertext is equal to zero 0 . We utilize a blockchain network whose processing node acts as the proxy server and performs re-encryption on the data. In ensuring data confidentiality and preventing collusion attacks, the data are divided into two, with one part stored on the blockchain network and the other part stored on the cloud. Our approach also achieves fine-grained access control.http://www.mdpi.com/1424-8220/19/5/1235Attribute-Based Encryption (ABE)blockchaincyber-securityfine-grained access controlInner-Product Encryption (IPE)Internet of Things (IoT)proxy re-encryption
spellingShingle Kwame Opuni-Boachie Obour Agyekum
Qi Xia
Emmanuel Boateng Sifah
Jianbin Gao
Hu Xia
Xiaojiang Du
Moshen Guizani
A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain
Sensors
Attribute-Based Encryption (ABE)
blockchain
cyber-security
fine-grained access control
Inner-Product Encryption (IPE)
Internet of Things (IoT)
proxy re-encryption
title A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain
title_full A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain
title_fullStr A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain
title_full_unstemmed A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain
title_short A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain
title_sort secured proxy based data sharing module in iot environments using blockchain
topic Attribute-Based Encryption (ABE)
blockchain
cyber-security
fine-grained access control
Inner-Product Encryption (IPE)
Internet of Things (IoT)
proxy re-encryption
url http://www.mdpi.com/1424-8220/19/5/1235
work_keys_str_mv AT kwameopuniboachieobouragyekum asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT qixia asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT emmanuelboatengsifah asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT jianbingao asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT huxia asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT xiaojiangdu asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT moshenguizani asecuredproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT kwameopuniboachieobouragyekum securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT qixia securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT emmanuelboatengsifah securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT jianbingao securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT huxia securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT xiaojiangdu securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain
AT moshenguizani securedproxybaseddatasharingmoduleiniotenvironmentsusingblockchain