Skip navigation
  • 中文
  • English

DSpace CRIS

  • DSpace logo
  • Home
  • Research Outputs
  • Researchers
  • Organizations
  • Projects
  • Explore by
    • Research Outputs
    • Researchers
    • Organizations
    • Projects
  • Communities & Collections
  • SDGs
  • Sign in
  • 中文
  • English
  1. National Taiwan Ocean University Research Hub
  2. 電機資訊學院
  3. 資訊工程學系
Please use this identifier to cite or link to this item: http://scholars.ntou.edu.tw/handle/123456789/17087
DC FieldValueLanguage
dc.contributor.authorLin, Han-Yuen_US
dc.contributor.authorHung, Yao-Minen_US
dc.date.accessioned2021-06-10T01:07:20Z-
dc.date.available2021-06-10T01:07:20Z-
dc.date.issued2021-01-01-
dc.identifier.urihttp://scholars.ntou.edu.tw/handle/123456789/17087-
dc.description.abstractIoT-based data outsourcing services in clouds could be regarded as a new trend in recent years, as they could reduce the hardware and software cost for enterprises and obtain higher flexibility. To securely transfer an encrypted message in the cloud, a so-called proxy re-encryption scheme is a better alternative. In such schemes, a ciphertext designated for a data aggregation is able to be re-encrypted as one designated for another by a semi-trusted proxy without decryption. In this paper, we introduce a secure proxy re-encryption protocol for IoT-based data outsourcing services in clouds. The proposed scheme is provably secure assuming the hardness of the bilinear inverse Diffie-Hellman problem (BIDHP). In particular, our scheme is bidirectional and supports the functionality of multi-hop, which allows an uploaded ciphertext to be transformed into a different one multiple times. The ciphertext length of our method is independent of the number of involved IoT nodes. Specifically, the re-encryption process only takes one exponentiation computation which is around 54 ms when sharing the data with 100 IoT devices. For each IoT node, the decryption process only requires two exponentiation computations. When compared with a related protocol presented by Kim and Lee, the proposed one also exhibits lower computational costs.en_US
dc.language.isoEnglishen_US
dc.publisherMDPIen_US
dc.relation.ispartofSENSORSen_US
dc.subjectIoTen_US
dc.subjectdata outsourcingen_US
dc.subjectproxy re-encryptionen_US
dc.subjectcloud computingen_US
dc.subjectbilinear pairingen_US
dc.titleAn Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in Cloudsen_US
dc.typejournal articleen_US
dc.identifier.doi10.3390/s21010067-
dc.identifier.isiWOS:000606094100001-
dc.relation.journalvolume21en_US
dc.relation.journalissue1en_US
item.openairecristypehttp://purl.org/coar/resource_type/c_6501-
item.cerifentitytypePublications-
item.languageiso639-1English-
item.fulltextno fulltext-
item.grantfulltextnone-
item.openairetypejournal article-
crisitem.author.deptCollege of Electrical Engineering and Computer Science-
crisitem.author.deptDepartment of Computer Science and Engineering-
crisitem.author.deptNational Taiwan Ocean University,NTOU-
crisitem.author.parentorgNational Taiwan Ocean University,NTOU-
crisitem.author.parentorgCollege of Electrical Engineering and Computer Science-
Appears in Collections:資訊工程學系
Show simple item record

WEB OF SCIENCETM
Citations

5
Last Week
0
Last month
0
checked on Jun 27, 2023

Page view(s)

128
Last Week
0
Last month
0
checked on Jun 30, 2025

Google ScholarTM

Check

Altmetric

Altmetric

Related Items in TAIR


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Explore by
  • Communities & Collections
  • Research Outputs
  • Researchers
  • Organizations
  • Projects
Build with DSpace-CRIS - Extension maintained and optimized by Logo 4SCIENCE Feedback