http://scholars.ntou.edu.tw/handle/123456789/26300| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.author | Lin, Han-Yu | en_US |
| dc.contributor.author | Tsai, Tung-Tso | en_US |
| dc.contributor.author | Wang, Yi-Chuan | en_US |
| dc.date.accessioned | 2026-03-12T03:20:52Z | - |
| dc.date.available | 2026-03-12T03:20:52Z | - |
| dc.date.issued | 2026/1/1 | - |
| dc.identifier.issn | 1546-2218 | - |
| dc.identifier.uri | http://scholars.ntou.edu.tw/handle/123456789/26300 | - |
| dc.description.abstract | Cloud services, favored by many enterprises due to their high flexibility and easy operation, are widely used for data storage and processing. However, the high latency, together with transmission overheads of the cloud architecture, makes it difficult to quickly respond to the demands of IoT applications and local computation. To make up for these deficiencies in the cloud, fog computing has emerged as a critical role in the IoT applications. It decentralizes the computing power to various lower nodes close to data sources, so as to achieve the goal of low latency and distributed processing. With the data being frequently exchanged and shared between multiple nodes, it becomes a challenge to authorize data securely and efficiently while protecting user privacy. To address this challenge, proxy re-encryption (PRE) schemes provide a feasible way allowing an intermediary proxy node to re-encrypt ciphertext designated for different authorized data requesters without compromising any plaintext information. Since the proxy is viewed as a semi-trusted party, it should be taken to prevent malicious behaviors and reduce the risk of data leakage when implementing PRE schemes. This paper proposes a new fog-assisted identity-based PRE scheme supporting anonymous key generation, equality test, and user revocation to fulfill various IoT application requirements. Specifically, in a traditional identity-based public key architecture, the key escrow problem and the necessity of a secure channel are major security concerns. We utilize an anonymous key generation technique to solve these problems. The equality test functionality further enables a cloud server to inspect whether two candidate trapdoors contain an identical keyword. In particular, the proposed scheme realizes fine-grained user-level authorization while maintaining strong key confidentiality. To revoke an invalid user identity, we add a revocation list to the system flows to restrict access privileges without increasing additional computation cost. To ensure security, it is shown that our system meets the security notion of IND-PrID-CCA and OW-ID-CCA under the Decisional Bilinear Diffie-Hellman (DBDH) assumption. | en_US |
| dc.language.iso | English | en_US |
| dc.publisher | TECH SCIENCE PRESS | en_US |
| dc.relation.ispartof | CMC-COMPUTERS MATERIALS & CONTINUA | en_US |
| dc.subject | Equality test | en_US |
| dc.subject | proxy re-encryption | en_US |
| dc.subject | identity-based | en_US |
| dc.subject | revocable | en_US |
| dc.subject | fog computing | en_US |
| dc.title | IoT-Assisted Cloud Data Sharing with Revocation and Equality Test under Identity-Based Proxy Re-Encryption | en_US |
| dc.type | journal article | en_US |
| dc.identifier.doi | 10.32604/cmc.2025.073234 | - |
| dc.identifier.isi | WOS:001671622600001 | - |
| dc.relation.journalvolume | 86 | en_US |
| dc.relation.journalissue | 3 | en_US |
| dc.relation.pages | 17 | en_US |
| dc.identifier.eissn | 1546-2226 | - |
| item.grantfulltext | none | - |
| item.fulltext | no fulltext | - |
| item.cerifentitytype | Publications | - |
| item.languageiso639-1 | English | - |
| item.openairecristype | http://purl.org/coar/resource_type/c_6501 | - |
| item.openairetype | journal article | - |
| crisitem.author.dept | College of Electrical Engineering and Computer Science | - |
| crisitem.author.dept | Department of Computer Science and Engineering | - |
| crisitem.author.dept | National Taiwan Ocean University,NTOU | - |
| crisitem.author.dept | College of Electrical Engineering and Computer Science | - |
| crisitem.author.dept | Department of Computer Science and Engineering | - |
| crisitem.author.dept | National Taiwan Ocean University,NTOU | - |
| crisitem.author.parentorg | National Taiwan Ocean University,NTOU | - |
| crisitem.author.parentorg | College of Electrical Engineering and Computer Science | - |
| crisitem.author.parentorg | National Taiwan Ocean University,NTOU | - |
| crisitem.author.parentorg | College of Electrical Engineering and Computer Science | - |
| 顯示於: | 資訊工程學系 | |
在 IR 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。