Abstract
Block chain provides an innovative solution to information storage, transaction execution, security, and trust building in an open environment. The block chain is technological progress for cyber security and cryptography, with efficiency-related cases varying in smart grids, smart contracts, over the IoT, etc. The movement to exchange data on a server has massively increased with the introduction of the Internet of Things. Hence, in this research, Splitting of proxy re-encryption method (Split-PRE) has been suggested based on the IoT to improve security and privacy in a private block chain. This study proposes a block chain-based proxy re-encryption program to resolve both the trust and scalability problems and to simplify the transactions. After encryption, the system saves the Internet of Things data in a distributed cloud. The framework offers dynamic, smart contracts between the sensor and the device user without the intervention of a trustworthy third party to exchange the captured IoT data. It uses an efficient proxy re-encryption system, which provides the owner and the person existing in the smart contract to see the data. The experimental outcomes show that the proposed approach enhances the efficiency, security, privacy, and feasibility of the system when compared to other existing methods.
- [1] . 2019. A secured proxy-based data sharing module in IoT environments using block chain. Sensors 19, 5 (2019), 1235.Google Scholar
Cross Ref
- [2] . 2019. Two-factor authentication for trusted third party free dispersed storage. Future Generation Computer Systems 90, 291--306.Google Scholar
Cross Ref
- [3] . 2020. Public key encryption with keyword search in cloud: A survey. Entropy 22, 4 (2020), 421.Google Scholar
Cross Ref
- [4] . 2018. Block chain based efficient and robust fair payment for outsourcing services in cloud computing. Information Sciences 462, 262--277.Google Scholar
Cross Ref
- [5] . 2018. A Study on access structure management of CP-ABTD based block chain for medical information monitoring system. Advanced Science Letters 24, 3 (2018), 2026--2030.Google Scholar
Cross Ref
- [6] . 2018. Secure data sharing using proxy re-encryption for intelligent customized services. International Journal of Grid and Distributed Computing 11, 10 (2018), 29--39.Google Scholar
Cross Ref
- [7] . 2018. An anti-quantum transaction authentication approach in Block chain. IEEE Access 6, 5393--5401.Google Scholar
- [8] . 2020. Non-transitive and collusion resistant quorum controlled proxy re-encryption scheme for resource constrained networks. Journal of Information Security and Applications 50, 102411.Google Scholar
Cross Ref
- [9] . 2019. Multi-security-level cloud storage system based on improved proxy re-encryption. EURASIP Journal on Wireless Communications and Networking 1 (2019), 1--12.Google Scholar
- [10] . 2019. Lattice-based fuzzy conditional proxy re-encryption. Journal of Internet Technology 20, 5 (2019), 1379--1385.Google Scholar
- [11] . 2018. Study on internet finance credit information sharing based on block chain technology. Asian Social Sci. 14, 2 (2018), 81.Google Scholar
Cross Ref
- [12] . 2019. Efficient signcryption with proxy re-encryption and its application in smart grid. IEEE Internet of Things Journal 6, 6 (2019), 9722--9737.Google Scholar
Cross Ref
- [13] . 2020. Privacy enhancement scheme (PES) in a block chain-edge computing environment. IEEE Access 8, 25863--25876.Google Scholar
- [14] . 2020. A cloud data deduplication scheme based on certificateless proxy re-encryption. Journal of Systems Architecture 102, 101666.Google Scholar
Cross Ref
- [15] . 2019. Toward secure and accountable data transmission in Narrow Band Internet of Things based on Block chain. International Journal of Distributed Sensor Networks 15, 4 (2019), 1550147719842725.Google Scholar
Cross Ref
- [16] . 2018. Privacy-preserving schemes for fog-based IoT applications: Threat models, solutions, and challenges. In 2018 International Conference on Smart Communications in Network Technologies (SaCoNeT). IEEE, pp. 37–42.Google Scholar
Cross Ref
- [17] . 2018. Data integrity verification of the outsourced big data in the cloud environment: A survey. Journal of Network and Computer Applications 122, 1--15.Google Scholar
Cross Ref
- [18] . 2018. A secure verifiable ranked choice online voting system based on homomorphic encryption. IEEE Access 6, 20506--20519.Google Scholar
Cross Ref
- [19] . 2019. A secure data sharing platform using Block chain and Interplanetary File System. Sustainability 11, 24 (2019), 7054.Google Scholar
Cross Ref
- [20] . 2019. The security of big data in fog-enabled IoT applications including Block chain: A survey. Sensors 19, 8 (2019), 1788.Google Scholar
Cross Ref
- [21] . 2019. BPTM: Block chain-based privacy-preserving task matching in crowdsourcing. IEEE Access 7, 45605--45617.Google Scholar
- [22] 2016. Secure bidirectional proxy re-encryption for cryptographic cloud storage. Pervasive and Mobile Computing vol. 28 June 2016, pp. 113–121.
DOI: https://doi.org/10.1016/j.pmcj.2015.06.016 Google ScholarDigital Library
- [23] . 2018. Block chain based proxy re-encryption scheme for secure IoT data sharing. arXiv preprint arXiv:1811.02276 (2018).Google Scholar
- [24] . Secure and efficient proxy re-encryption scheme based on key-homomorphic constrained PRFs in cloud computing. Cluster Computing pp. 1–11.
DOI: https://doi.org/10.1007/s10586-018-2862-z Google ScholarDigital Library
- [25] . 2019. CL-PRE: A certificateless proxy re-encryption scheme for secure data sharing with public cloud. https://profsandhu.com/zhang/pub/asiaccs12-clpre.pdf. Profsandhu.com. Accessed 2019Google Scholar
- [26] . 2019. A secured proxy-based data sharing module in IoT environments using block chain.Google Scholar
Index Terms
Multi-Tier Stack of Block Chain with Proxy Re-Encryption Method Scheme on the Internet of Things Platform
Recommendations
Internet of Things security
The Internet of things (IoT) has recently become an important research topic because it integrates various sensors and objects to communicate directly with one another without human intervention. The requirements for the large-scale deployment of the ...
Cyberentity Security in the Internet of Things
A proposed Internet of Things system architecture offers a solution to the broad array of challenges researchers face in terms of general system security, network security, and application security.
A Privacy-Enhancing Framework for Internet of Things Services
Network and System SecurityAbstractThe world has seen an influx of connected devices through both smart devices and smart cities, paving the path forward for the Internet of Things (IoT). These emerging intelligent infrastructures and applications based on IoT can be beneficial to ...






Comments