Next Article in Journal
An Energy-Efficient Slotted Sense Multiple Access Broadcast Protocol for Reliable Command Delivery in Dynamic Wireless Sensor Networks
Next Article in Special Issue
Transparent CoAP Services to IoT Endpoints through ICN Operator Networks
Previous Article in Journal
Continuous Live-Cell Culture Imaging and Single-Cell Tracking by Computational Lensfree LED Microscopy
Previous Article in Special Issue
Process Management in IoT Operating Systems: Cross-Influence between Processing and Communication Tasks in End-Devices
Open AccessArticle

A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain

1
Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu 611731, China
2
CETC Big Data Research Institute Co., Ltd., Guiyang 550008, China
3
School of Resources and Environment, Center for Digital Health, University of Electronic Science and Technology of China, Chengdu 611731, China
4
Department of Computer and Information Sciences, Temple University, Philadelphia, PA 19122, USA
5
Department of College of Engineering, Qatar University, Doha, Qatar
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(5), 1235; https://doi.org/10.3390/s19051235
Received: 30 January 2019 / Revised: 2 March 2019 / Accepted: 6 March 2019 / Published: 11 March 2019
Access and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes numerous security and privacy issues. In the process of ensuring data confidentiality and fine-grained access control to data in the cloud, several studies have proposed Attribute-Based Encryption (ABE) schemes, with Key Policy-ABE (KP-ABE) being the prominent one. Recent works have however suggested that the confidentiality of data is violated through collusion attacks between a revoked user and the cloud server. We present a secured and efficient Proxy Re-Encryption (PRE) scheme that incorporates an Inner-Product Encryption (IPE) scheme in which decryption of data is possible if the inner product of the private key, associated with a set of attributes specified by the data owner, and the associated ciphertext is equal to zero 0 . We utilize a blockchain network whose processing node acts as the proxy server and performs re-encryption on the data. In ensuring data confidentiality and preventing collusion attacks, the data are divided into two, with one part stored on the blockchain network and the other part stored on the cloud. Our approach also achieves fine-grained access control. View Full-Text
Keywords: Attribute-Based Encryption (ABE); blockchain; cyber-security; fine-grained access control; Inner-Product Encryption (IPE); Internet of Things (IoT); proxy re-encryption Attribute-Based Encryption (ABE); blockchain; cyber-security; fine-grained access control; Inner-Product Encryption (IPE); Internet of Things (IoT); proxy re-encryption
Show Figures

Figure 1

MDPI and ACS Style

Obour Agyekum, K. .-B.; Xia, Q.; Sifah, E.B.; Gao, J.; Xia, H.; Du, X.; Guizani, M. A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain. Sensors 2019, 19, 1235.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop