Impact Factor (2025): 6.9
DOI Prefix: 10.47001/IRJIET
Data
sharing is one of the most advantageous applications of the Internet of Things
in cloud computing. Regardless of how appealing this technology is, data
security remains one of its issues, since inappropriate data usage can lead to
a range of issues. In this paper, we present a proxy re-encryption mechanism
for protecting data transport in cloud environments. Data owners can send
encrypted data to the cloud using identity-based encryption, while authorized
users can access the data using proxy re-encryption. Because Internet of Things
devices have limited capability, an edge device acts as a proxy server to do
sophisticated calculations. Furthermore, we effectively use information-centric
networking capabilities to supply cached data in the proxy, resulting in
improved service quality and increased. Furthermore, we effectively use
information-centric networking capabilities to supply cached data in the proxy,
resulting in improved service quality and greater network bandwidth. Our system
is also built on blockchain, a groundbreaking technology that allows for
decentralized data sharing. It improves the efficiency of centralized systems
and enables fine-grained data access management. According to the security
study and evaluation, our system has the capability of providing privacy
protection, authenticity, and dependability.
Country : India
IRJIET, Volume 8, Issue 1, January 2024 pp. 178-181