An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption
The prevalence of data sharing has increased with the rise in popularity of cloud computing and the Internet of Things (IoT). However, ensuring data security is difficult because of the possible negative consequences of illegal data usage. This study presents a method for ensuring the secure transmi...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | en en |
| Published: |
INTI International University
2024
|
| Subjects: | |
| Online Access: | http://eprints.intimal.edu.my/1968/3/511 http://eprints.intimal.edu.my/1968/4/ij2024_23r.pdf http://eprints.intimal.edu.my/1968/ https://intijournal.intimal.edu.my |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | The prevalence of data sharing has increased with the rise in popularity of cloud computing and the Internet of Things (IoT). However, ensuring data security is difficult because of the possible negative consequences of illegal data usage. This study presents a method for ensuring the secure transmission of data in cloud environments: proxy re-encryption. The identity-based encryption method enables data owners to transfer encrypted data to the cloud. Subsequently, a proxy re-encryption framework enables authorized individuals to access the data. To surpass the limitations of IoT device resources, we utilize an edge device as a proxy server to transfer computationally intensive tasks to a separate device. By utilizing the advantages of information-centric networking, we can optimize network capacity and enhance service quality by efficiently distributing cached content across the proxy. This method decreases bottlenecks in centralized systems while providing precise control over data access. The proposed work demonstrates the effectiveness of the strategy in ensuring data security, confidentiality, and integrity through thorough security research and plan review. |
|---|
