skip to main content
research-article

Multi-Tier Stack of Block Chain with Proxy Re-Encryption Method Scheme on the Internet of Things Platform

Authors Info & Claims
Published:29 October 2021Publication History
Skip Abstract Section

Abstract

Block chain provides an innovative solution to information storage, transaction execution, security, and trust building in an open environment. The block chain is technological progress for cyber security and cryptography, with efficiency-related cases varying in smart grids, smart contracts, over the IoT, etc. The movement to exchange data on a server has massively increased with the introduction of the Internet of Things. Hence, in this research, Splitting of proxy re-encryption method (Split-PRE) has been suggested based on the IoT to improve security and privacy in a private block chain. This study proposes a block chain-based proxy re-encryption program to resolve both the trust and scalability problems and to simplify the transactions. After encryption, the system saves the Internet of Things data in a distributed cloud. The framework offers dynamic, smart contracts between the sensor and the device user without the intervention of a trustworthy third party to exchange the captured IoT data. It uses an efficient proxy re-encryption system, which provides the owner and the person existing in the smart contract to see the data. The experimental outcomes show that the proposed approach enhances the efficiency, security, privacy, and feasibility of the system when compared to other existing methods.

REFERENCES

  1. [1] Agyekum K. O.-B. O., Xia Q., Sifah E. B., Gao J., Xia H.,… and Guizani M.. 2019. A secured proxy-based data sharing module in IoT environments using block chain. Sensors 19, 5 (2019), 1235.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] Esiner E. and Datta A.. 2019. Two-factor authentication for trusted third party free dispersed storage. Future Generation Computer Systems 90, 291--306.Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] Zhou Y., Li N., Tian Y., An D., and Wang L.. 2020. Public key encryption with keyword search in cloud: A survey. Entropy 22, 4 (2020), 421.Google ScholarGoogle ScholarCross RefCross Ref
  4. [4] Zhang Y., Deng R. H., Liu X., and Zheng D.. 2018. Block chain based efficient and robust fair payment for outsourcing services in cloud computing. Information Sciences 462, 262--277.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Cha H. J., Yang H. K., and Song Y. J.. 2018. A Study on access structure management of CP-ABTD based block chain for medical information monitoring system. Advanced Science Letters 24, 3 (2018), 2026--2030.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Cha H. J., Yang H. K., and Song Y. J.. 2018. Secure data sharing using proxy re-encryption for intelligent customized services. International Journal of Grid and Distributed Computing 11, 10 (2018), 29--39.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] Yin W., Wen Q., Li W., Zhang H., and Jin Z.. 2018. An anti-quantum transaction authentication approach in Block chain. IEEE Access 6, 5393--5401.Google ScholarGoogle Scholar
  8. [8] Patil S. M. and Purushothama B. R.. 2020. Non-transitive and collusion resistant quorum controlled proxy re-encryption scheme for resource constrained networks. Journal of Information Security and Applications 50, 102411.Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Shen J., Deng X., and Xu Z.. 2019. Multi-security-level cloud storage system based on improved proxy re-encryption. EURASIP Journal on Wireless Communications and Networking 1 (2019), 1--12.Google ScholarGoogle Scholar
  10. [10] Li B., Xu J., and Liu Y.. 2019. Lattice-based fuzzy conditional proxy re-encryption. Journal of Internet Technology 20, 5 (2019), 1379--1385.Google ScholarGoogle Scholar
  11. [11] Zhu M. and Liu X.. 2018. Study on internet finance credit information sharing based on block chain technology. Asian Social Sci. 14, 2 (2018), 81.Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Ahene E., Qin Z., Adusei A. K., and Li F.. 2019. Efficient signcryption with proxy re-encryption and its application in smart grid. IEEE Internet of Things Journal 6, 6 (2019), 9722--9737.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Ernest B. and Shiguang J.. 2020. Privacy enhancement scheme (PES) in a block chain-edge computing environment. IEEE Access 8, 25863--25876.Google ScholarGoogle Scholar
  14. [14] Zheng X., Zhou Y., Ye Y., and Li F.. 2020. A cloud data deduplication scheme based on certificateless proxy re-encryption. Journal of Systems Architecture 102, 101666.Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] Hong H., Hu B., and Sun Z.. 2019. Toward secure and accountable data transmission in Narrow Band Internet of Things based on Block chain. International Journal of Distributed Sensor Networks 15, 4 (2019), 1550147719842725.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Ferrag M. A., Derhab A., Maglaras L., Mukherjee M., and Janicke H.. 2018. Privacy-preserving schemes for fog-based IoT applications: Threat models, solutions, and challenges. In 2018 International Conference on Smart Communications in Network Technologies (SaCoNeT). IEEE, pp. 3742.Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Zhou L., Fu A., Yu S., Su M., and Kuang B.. 2018. Data integrity verification of the outsourced big data in the cloud environment: A survey. Journal of Network and Computer Applications 122, 1--15.Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Yang X., Yi X., Nepal S., Kelarev A., and Han F.. 2018. A secure verifiable ranked choice online voting system based on homomorphic encryption. IEEE Access 6, 20506--20519.Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Naz M., Al-zahrani F. A., Khalid R., Javaid N., Qamar A. M., Afzal M. K., and Shafiq M.. 2019. A secure data sharing platform using Block chain and Interplanetary File System. Sustainability 11, 24 (2019), 7054.Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Tariq N., Asim M., Al-Obeidat F., Zubair Farooqi M., Baker T., Hammoudeh M., and Ghafir I.. 2019. The security of big data in fog-enabled IoT applications including Block chain: A survey. Sensors 19, 8 (2019), 1788.Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Wu Y., Tang S., Zhao B., and Peng Z.. 2019. BPTM: Block chain-based privacy-preserving task matching in crowdsourcing. IEEE Access 7, 45605--45617.Google ScholarGoogle Scholar
  22. [22] Shao J. et al. 2016. Secure bidirectional proxy re-encryption for cryptographic cloud storage. Pervasive and Mobile Computing vol. 28 June 2016, pp. 113121. DOI: https://doi.org/10.1016/j.pmcj.2015.06.016 Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23] Manzoor Ahsan, Liyanage Madhsanka, Braeken An, Kanhere Salil S., and Ylianttila Mika. 2018. Block chain based proxy re-encryption scheme for secure IoT data sharing. arXiv preprint arXiv:1811.02276 (2018).Google ScholarGoogle Scholar
  24. [24] Luo Wei, and Ma Wenping. Secure and efficient proxy re-encryption scheme based on key-homomorphic constrained PRFs in cloud computing. Cluster Computing pp. 111. DOI: https://doi.org/10.1007/s10586-018-2862-z Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Xu Lei. 2019. CL-PRE: A certificateless proxy re-encryption scheme for secure data sharing with public cloud. https://profsandhu.com/zhang/pub/asiaccs12-clpre.pdf. Profsandhu.com. Accessed 2019Google ScholarGoogle Scholar
  26. [26] Agyekum K. O.-B. O., Xia Q., Sifah E. B., Gao J., Xia H., Du X., and Guizani M.. 2019. A secured proxy-based data sharing module in IoT environments using block chain.Google ScholarGoogle Scholar

Index Terms

  1. Multi-Tier Stack of Block Chain with Proxy Re-Encryption Method Scheme on the Internet of Things Platform

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Internet Technology
      ACM Transactions on Internet Technology  Volume 22, Issue 2
      May 2022
      582 pages
      ISSN:1533-5399
      EISSN:1557-6051
      DOI:10.1145/3490674
      • Editor:
      • Ling Liu
      Issue’s Table of Contents

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 29 October 2021
      • Accepted: 1 October 2021
      • Revised: 1 September 2020
      • Received: 1 July 2020
      Published in toit Volume 22, Issue 2

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    View Full Text

    HTML Format

    View this article in HTML Format .

    View HTML Format
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!