• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种适用于支持雾计算的物联网环境的改进型基于身份的数据存储方案。

An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments.

作者信息

Lin Han-Yu, Tsai Tung-Tso, Ting Pei-Yih, Chen Ching-Chung

机构信息

Department of Computer Science and Engineering, National Taiwan Ocean University, Keelung 202, Taiwan.

出版信息

Sensors (Basel). 2022 Jun 1;22(11):4223. doi: 10.3390/s22114223.

DOI:10.3390/s22114223
PMID:35684844
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9185317/
Abstract

In a fog-enabled IoT environment, a fog node is regarded as the proxy between end users and cloud servers to reduce the latency of data transmission, so as to fulfill the requirement of more real-time applications. A data storage scheme utilizing fog computing architecture allows a user to share cloud data with other users via the assistance of fog nodes. In particular, a fog node obtaining a re-encryption key of the data owner is able to convert a cloud ciphertext into the one which is decryptable by another designated user. In such a scheme, a proxy should not learn any information about the plaintext during the transmission and re-encryption processes. In 2020, an ID-based data storage scheme utilizing anonymous key generation in fog computing was proposed by some researchers. Although their protocol is provably secure in a proof model of random oracles, we will point out that there are some security flaws inherited in their protocol. On the basis of their work, we further present an improved variant, which not only eliminates their security weaknesses, but also preserves the functionalities of anonymous key generation and user revocation mechanism. Additionally, under the Decisional Bilinear Diffie-Hellman (DBDH) assumption, we demonstrate that our enhanced construction is also provably secure in the security notion of IND-PrID-CPA.

摘要

在支持雾计算的物联网环境中,雾节点被视为终端用户与云服务器之间的代理,以减少数据传输延迟,从而满足更多实时应用的需求。一种利用雾计算架构的数据存储方案允许用户在雾节点的协助下与其他用户共享云数据。具体而言,获得数据所有者重新加密密钥的雾节点能够将云密文转换为可被另一个指定用户解密的密文。在这样的方案中,代理在传输和重新加密过程中不应了解有关明文的任何信息。2020年,一些研究人员提出了一种在雾计算中利用匿名密钥生成的基于身份的数据存储方案。尽管他们的协议在随机预言机的证明模型中被证明是安全的,但我们将指出他们的协议中存在一些继承的安全缺陷。在他们工作的基础上,我们进一步提出了一个改进的变体,它不仅消除了他们的安全弱点,还保留了匿名密钥生成和用户撤销机制的功能。此外,在判定性双线性迪菲 - 赫尔曼(DBDH)假设下,我们证明了我们增强后的构造在IND-PrID-CPA安全概念下也是可证明安全的。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/246d/9185317/bbdba2b11e49/sensors-22-04223-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/246d/9185317/e180d97086d9/sensors-22-04223-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/246d/9185317/b03f4d16eb3c/sensors-22-04223-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/246d/9185317/2d73678db12b/sensors-22-04223-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/246d/9185317/8b12fbd4c011/sensors-22-04223-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/246d/9185317/0a605a09e5d8/sensors-22-04223-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/246d/9185317/bbdba2b11e49/sensors-22-04223-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/246d/9185317/e180d97086d9/sensors-22-04223-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/246d/9185317/b03f4d16eb3c/sensors-22-04223-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/246d/9185317/2d73678db12b/sensors-22-04223-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/246d/9185317/8b12fbd4c011/sensors-22-04223-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/246d/9185317/0a605a09e5d8/sensors-22-04223-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/246d/9185317/bbdba2b11e49/sensors-22-04223-g006.jpg

相似文献

1
An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments.一种适用于支持雾计算的物联网环境的改进型基于身份的数据存储方案。
Sensors (Basel). 2022 Jun 1;22(11):4223. doi: 10.3390/s22114223.
2
Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments.适用于物联网环境的可撤销且支持雾计算的代理重加密方案。
Sensors (Basel). 2024 Sep 28;24(19):6290. doi: 10.3390/s24196290.
3
Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation.基于身份的代理重加密方案,利用雾计算和匿名密钥生成。
Sensors (Basel). 2023 Mar 1;23(5):2706. doi: 10.3390/s23052706.
4
An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in Clouds.一种针对基于物联网的云端数据外包服务的改进代理重加密方案。
Sensors (Basel). 2020 Dec 24;21(1):67. doi: 10.3390/s21010067.
5
Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.具有属性撤销和授予功能的高效多用户云存储可搜索加密方案
PLoS One. 2016 Nov 29;11(11):e0167157. doi: 10.1371/journal.pone.0167157. eCollection 2016.
6
A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.一种用于雾计算环境中细粒度搜索和访问授权的混合方案。
Sensors (Basel). 2017 Jun 17;17(6):1423. doi: 10.3390/s17061423.
7
A searchable personal health records framework with fine-grained access control in cloud-fog computing.云雾计算中具有细粒度访问控制的可搜索个人健康记录框架。
PLoS One. 2018 Nov 29;13(11):e0207543. doi: 10.1371/journal.pone.0207543. eCollection 2018.
8
A Ring Learning with Errors-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Secure Big Data Sharing in Cloud Environment.基于错误的环学习密文策略属性基代理重加密方案,用于云环境中的安全大数据共享。
Big Data. 2024 Oct;12(5):357-366. doi: 10.1089/big.2021.0301. Epub 2022 Apr 11.
9
A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.一种雾计算-云计算环境下的安全可验证外包访问控制方案
Sensors (Basel). 2017 Jul 24;17(7):1695. doi: 10.3390/s17071695.
10
A revocable storage CP-ABE scheme with constant ciphertext length in cloud storage.云存储中具有固定密文长度的可撤销存储 CP-ABE 方案。
Math Biosci Eng. 2019 May 15;16(5):4229-4249. doi: 10.3934/mbe.2019211.

引用本文的文献

1
Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments.适用于物联网环境的可撤销且支持雾计算的代理重加密方案。
Sensors (Basel). 2024 Sep 28;24(19):6290. doi: 10.3390/s24196290.
2
Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation.基于身份的代理重加密方案,利用雾计算和匿名密钥生成。
Sensors (Basel). 2023 Mar 1;23(5):2706. doi: 10.3390/s23052706.