Proxy Re-Encryption-Empowering Data Privacy and Security

Abstract

Data sharing is one of the most advantageous applications of the Internet of Things in cloud computing. Regardless of how appealing this technology is, data security remains one of its issues, since inappropriate data usage can lead to a range of issues. In this paper, we present a proxy re-encryption mechanism for protecting data transport in cloud environments. Data owners can send encrypted data to the cloud using identity-based encryption, while authorized users can access the data using proxy re-encryption. Because Internet of Things devices have limited capability, an edge device acts as a proxy server to do sophisticated calculations. Furthermore, we effectively use information-centric networking capabilities to supply cached data in the proxy, resulting in improved service quality and increased. Furthermore, we effectively use information-centric networking capabilities to supply cached data in the proxy, resulting in improved service quality and greater network bandwidth. Our system is also built on blockchain, a groundbreaking technology that allows for decentralized data sharing. It improves the efficiency of centralized systems and enables fine-grained data access management. According to the security study and evaluation, our system has the capability of providing privacy protection, authenticity, and dependability.

Country : India

1 Siya Kadam2 Tanuja Gaikwad3 Neha Jaykare4 Misba Beg5 Prof. Anuradha Thorat

  1. Student, Department of Information Technology, Zeal College of Engineering and Research, Narhe, Pune, India
  2. Student, Department of Information Technology, Zeal College of Engineering and Research, Narhe, Pune, India
  3. Student, Department of Information Technology, Zeal College of Engineering and Research, Narhe, Pune, India
  4. Student, Department of Information Technology, Zeal College of Engineering and Research, Narhe, Pune, India
  5. Department of Information Technology, Zeal College of Engineering and Research, Narhe, Pune, India

IRJIET, Volume 8, Issue 1, January 2024 pp. 178-181

doi.org/10.47001/IRJIET/2024.801021

References

  1. J. Yu, K. Wang, D. Zeng, C. Zhu, and S. Guo, \Privacy-preserving data aggregation computing in cyber-physical social systems," ACM Transactions on Cyber-Physical Systems, vol. 3, no. 1, p. 8, 2019.
  2. H. Ren, H. Li, Y. Dai, K. Yang, and X. Lin, \Querying in internet of things with privacy preserving: Challenges, solutions and opportunities," IEEE Network, vol. 32, no. 6, pp. 144{151, 2019.
  3. J. Li, H. Ye,W.Wang,W. Lou, Y. T. Hou, J. Liu, and R. Lu, Efficient and secure outsourcing of differentially private data publication," in Proc. ESORICS, 2019, pp. 187 206.
  4. Gong, Xinglin, Erwu Liu, and Rui Wang. Blockchain-Based IoT Application Using Smart Contracts: Case Study of M2M Autonomous Trading. 2020 5th International Conference on Computer and Communication Systems (ICCCS). IEEE, 2020.
  5. Xu, Jinliang, et al Edgence: A blockchain-enabled edge-computing platform for intelligent IoT-based dApps. & China Communications 17.4 (2020): 78-87.
  6. Huang, Zheng, Zeyu Mi, and Zhichao Hua. & HCloud: A trusted Joint Cloud serverless platform for IoT systems with blockchain. & China Communications 17.9 (2020): 1-10.
  7. Gheitanchi, Shahin. & Gamified service exchange platform on blockchain for IoT business agility& 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 2020.
  8. G. Xu, H. Li, Y. Dai, K. Yang, and X. Lin, \Enabling efficient and geometric range query with access control over encrypted spatial data," IEEE Trans. Information Forensics and Security, vol. 14, no. 4, pp. 870-885, 2019.
  9. K. Yang, K. Zhang, X. Jia, M. A. Hasan, and X. Shen, Privacy preserving attribute- keyword based data publish-subscribe service on cloud platforms," Information Sciences, vol. 387, pp. 116{ 131, 2017.
  10. Choi, Jungyong, et al. & quot; Random Seed Generation For IoT Key Generation and Key Management System Using Blockchain. & quot; 2020 International Conference on Information Networking (ICOIN). IEEE, 2020.