مقاله انگلیسی رایگان در مورد یک طرح رمزگذاری پروکسی آستانی برای اشتراک گذاری امن داده های اینترنت اشیا – mdpi سال ۲۰۲۱

Mdpi Logo

 

مشخصات مقاله
ترجمه عنوان مقاله یک طرح رمزگذاری پروکسی آستانی برای اشتراک گذاری امن داده های اینترنت اشیا براساس بلاک چین
عنوان انگلیسی مقاله A Threshold Proxy Re-Encryption Scheme for Secure IoT Data Sharing Based on Blockchain
انتشار  مقاله سال ۲۰۲۱
تعداد صفحات مقاله انگلیسی  ۱۸ صفحه
هزینه  دانلود مقاله انگلیسی رایگان میباشد.
پایگاه داده  نشریه mdpi
نوع نگارش مقاله مقاله پژوهشی (Research article)
مقاله بیس این مقاله بیس نمیباشد
نمایه (index) JCR – Master Journal List – Scopus – DOAJ
نوع مقاله
ISI
فرمت مقاله انگلیسی  PDF
ایمپکت فاکتور(IF)
۳٫۰۲۲ در سال ۲۰۲۰
شاخص H_index ۳۶ در سال ۲۰۲۰
شاخص SJR ۰٫۳۶۰ در سال ۲۰۲۰
شناسه ISSN ۲۰۷۹-۹۲۹۲
شاخص Quartile (چارک) Q2 در سال ۲۰۲۰
فرضیه ندارد
مدل مفهومی ندارد
پرسشنامه ندارد
متغیر ندارد
رفرنس دارد
رشته های مرتبط مهندسی کامپیوتر، مهندسی فناوری اطلاعات
گرایش های مرتبط امنیت اطلاعات، اینترنت و شبکه های گسترده
نوع ارائه مقاله
ژورنال
مجله / کنفرانس الکترونیک- Electronics
دانشگاه National University of Defense Technology, China
کلمات کلیدی اینترنت اشیا، بلاک چین، رمزگذاری پروکسی، اشتراک گذاری داده ها
کلمات کلیدی انگلیسی  IoT; blockchain; proxy re-encryption; data sharing
شناسه دیجیتال – doi https://doi.org/10.3390/electronics10192359
کد محصول E15782
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

فهرست مطالب مقاله:

Abstract

Open Access and Permissions

Share and Cite

Article Metrics

Order Article Reprints

 

بخشی از متن مقاله:

Abstract

The IoT devices deployed in various application scenarios will generate massive data with immeasurable value every day. These data often contain the user’s personal privacy information, so there is an imperative need to guarantee the reliability and security of IoT data sharing. We proposed a new encrypted data storing and sharing architecture by combining proxy re-encryption with blockchain technology. The consensus mechanism based on threshold proxy re-encryption eliminates dependence on the third-party central service providers. Multiple consensus nodes in the blockchain network act as proxy service nodes to re-encrypt data and combine converted ciphertext, and personal information will not be disclosed in the whole procedure. That eliminates the restrictions of using decentralized network to store and distribute private encrypted data safely. We implemented a lot of simulated experiments to evaluate the performance of the proposed framework. The results show that the proposed architecture can meet the extensive data access demands and increase a tolerable time latency. Our scheme is one of the essays to utilize the threshold proxy re-encryption and blockchain consensus algorithm to support IoT data sharing.

۱٫ Introduction

With the rapid advancement of Internet of Things (IoT) technology, massive IoT devices have been deployed to different application scenarios. A fantastic amount of data is generated every day all over the world by these devices [1]. Data are the core concept of IoT technology, and these data are of inestimable value in different applications. Although IoT seems to be very attractive, its advances have brought new challenges to security and privacy. Consequently, there is an imperative need to guarantee the reliability and security of IoT data sharing [2].

IoT data sharing has played a vital role in smart cities, healthcare, vehicular networks and other application fields [3]. Figure 1 depicts a popular data sharing architecture. The data producer domain contains a series of sensors and other devices that can collect data directly. The data owners generate and manage a large amount of IoT data. Due to the limited storage capacity of IoT devices, these massive data need to be encrypted and uploaded to a third party for storage, which is convenient for data management, distribution and sharing. They can encrypt the data and upload them to the storage service providers, such as cloud servers and distributed file systems for storage. The ownership of the data belongs to the data owner domain. In order to facilitate the sharing of data with other users, access rights are usually bound to the encrypted data itself and outsourced to storage service providers for management. Therefore, it is necessary to establish an effective access control mechanism to ensure the privacy and security of data owners, but this task is usually quite challenging. Data sharing depends on semi-trusted storage service providers, and they may have incentives for trying to read the data. At the same time, the process of authentication and revocation of data access rights is also opaque to the data owners.

ارسال دیدگاه

نشانی ایمیل شما منتشر نخواهد شد.