Skip navigation
  • 中文
  • English

DSpace CRIS

  • DSpace logo
  • Home
  • Research Outputs
  • Researchers
  • Organizations
  • Projects
  • Explore by
    • Research Outputs
    • Researchers
    • Organizations
    • Projects
  • Communities & Collections
  • SDGs
  • Sign in
  • 中文
  • English
  1. National Taiwan Ocean University Research Hub
  2. 電機資訊學院
  3. 資訊工程學系
Please use this identifier to cite or link to this item: http://scholars.ntou.edu.tw/handle/123456789/25540
DC FieldValueLanguage
dc.contributor.authorLin, Han-Yuen_US
dc.contributor.authorChen, Pei-Ruen_US
dc.date.accessioned2024-11-01T09:18:24Z-
dc.date.available2024-11-01T09:18:24Z-
dc.date.issued2024/10/1-
dc.identifier.urihttp://scholars.ntou.edu.tw/handle/123456789/25540-
dc.description.abstractAs technology advances rapidly, a diverse array of Internet of Things (IoT) devices finds widespread application across numerous fields. The intelligent nature of these devices not only gives people more convenience, but also introduces new challenges especially in security when transmitting data in fog-based cloud environments. In fog computing environments, data need to be transmitted across multiple devices, increasing the risk of data being intercepted or tampered with during transmission. To securely share cloud ciphertexts, an alleged proxy re-encryption approach is a commonly adopted solution. Without decrypting the original ciphertext, such a mechanism permits a ciphertext intended for user A to be easily converted into the one intended for user B. However, to revoke the decryption privilege of data users usually relies on the system authority to maintain a user revocation list which inevitably increases the storage space. In this research, the authors come up with a fog-based proxy re-encryption system with revocable identity. Without maintaining the traditional user revocation list, the proposed scheme introduces a time-updated key mechanism. The time-update key could be viewed as a partial private key and should be renewed with different time periods. A revoked user is unable to obtain the renewed time-update key and hence cannot share or decrypt cloud ciphertexts. We formally demonstrate that the introduced scheme satisfies the security of indistinguishability against adaptively chosen identity and chosen plaintext attacks (IND-PrID-CPA) assuming the hardness of the Decisional Bilinear Diffie-Hellman (DBDH) problem in the random oracle model. Furthermore, compared with similar systems, the proposed one also has lower computational complexity as a whole.en_US
dc.language.isoEnglishen_US
dc.publisherMDPIen_US
dc.relation.ispartofSENSORSen_US
dc.subjectfog computingen_US
dc.subjectproxyen_US
dc.subjectre-encryptionen_US
dc.subjectrevocationen_US
dc.subjectIoTen_US
dc.titleRevocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environmentsen_US
dc.typejournal articleen_US
dc.identifier.doi10.3390/s24196290-
dc.identifier.isiWOS:001332822300001-
dc.relation.journalvolume24en_US
dc.relation.journalissue19en_US
dc.identifier.eissn1424-8220-
item.openairetypejournal article-
item.grantfulltextnone-
item.openairecristypehttp://purl.org/coar/resource_type/c_6501-
item.cerifentitytypePublications-
item.fulltextno fulltext-
item.languageiso639-1English-
crisitem.author.deptCollege of Electrical Engineering and Computer Science-
crisitem.author.deptDepartment of Computer Science and Engineering-
crisitem.author.deptNational Taiwan Ocean University,NTOU-
crisitem.author.parentorgNational Taiwan Ocean University,NTOU-
crisitem.author.parentorgCollege of Electrical Engineering and Computer Science-
Appears in Collections:資訊工程學系
Show simple item record

Page view(s)

112
checked on Jun 30, 2025

Google ScholarTM

Check

Altmetric

Altmetric

Related Items in TAIR


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Explore by
  • Communities & Collections
  • Research Outputs
  • Researchers
  • Organizations
  • Projects
Build with DSpace-CRIS - Extension maintained and optimized by Logo 4SCIENCE Feedback