Online citations, reference lists, and bibliographies.
← Back to Search

PRTA: A Proxy Re-encryption Based Trusted Authorization Scheme For Nodes On CloudIoT

Mang Su, B. Zhou, Anmin Fu, Y. Yu, Gongxuan Zhang
Published 2020 · Computer Science, Mathematics

Cite This
Download PDF
Analyze on Scholarcy
Share
In CloudIoT platform, the data is collected and shared by different nodes of Internet of Things(IoT), and data is processed and stored based on cloud servers. It has increased the abilities of IoT on information computation. Meanwhile, it also has enriched the resource in cloud and improved integration of the Internet and human world. All of this offer advantages as well as the new challenges of information security and privacy protection. As the energy limitation of the nodes in IoT, they are particularly vulnerable. It is much easier to hijack the nodes than to attack the data center for hackers. Thus, it is a crucial and urgent issue to realize the trusted update of authorization of nodes. When some nodes are hijacked, both of the behaviors to upload data to servers and to download information from servers should be forbidden. Otherwise, it might cause the serious damage to the sensitive data and privacy of servers. In order to solve this problem, we proposed a Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT(PRTA). PRTA is based on the proxy re-encryption (PRE), and the cloud server will play the roles of data storing and re-encrypting, which would reach the full potential of cloud computing and reduce the cost of nodes. The node’s status is taken as one of the parameters for data re-encryption and it is under the authorization servers’ control, which could ensure the security and reliability of the data and be beneficial for the privacy protection in CloudIoT. Also, the authorization servers are divided into the downloading and uploading kinds, which will make the application range much wider.
This paper references
Internet of things (iot) connected devices installed base worldwide from
(2015)
10.1109/TSC.2017.2710190
Full Verifiability for Outsourced Decryption in Attribute Based Encryption
Jiguo Li (2020)
Anonymous attribute-based proxy 840 re-encryption for access control in cloud computing. Security and Communication Networks
Y Zhang (2016)
10.1109/MM.2016.101
On the Feasibility of Attribute-Based Encryption on Internet of Things Devices
Moreno Ambrosin (2016)
10.1007/978-3-319-11692-1_12
A Framework of Adaptive Interaction Support in Cloud-Based Internet of Things (IoT) Environment
Noura Alhakbani (2014)
10.1109/TII.2017.2751640
Lightweight Break-Glass Access Control System for Healthcare Internet-of-Things
Yang Yang (2018)
10.1109/COMST.2016.2610963
Networking for Big Data: A Survey
Shui Yu (2017)
10.1109/JSYST.2017.2667679
User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage
Jiguo Li (2018)
Hossain Alnuem M. and. A 725 framework of adaptive interaction support in cloud-based internet of things (iot) environment
N Alhakbani (2014)
10.1109/ACCESS.2016.2577036
Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data
Shui Yu (2016)
10.1007/978-3-540-89754-5_11
Type-Based Proxy Re-encryption and Its Construction
Qiang Tang (2008)
10.1109/MCC.2016.63
Threats to Networking Cloud and Edge Datacenters in the Internet of Things
Deepak Puthal (2016)
10.7544/ISSN1000-1239.2018.20180056
PRE-TUAN: Proxy Re-Encryption Based Trusted Update Scheme of Authorization for Nodes on IoT Cloud
Su Mang (2018)
10.1007/s12652-017-0602-5
IoT device security based on proxy re-encryption
S. Kim (2018)
A survey on trust managemen- 820 t for internet of things
Z. Yan (2014)
10.1016/j.jnca.2014.01.014
A survey on trust management for Internet of Things
Zheng Yan (2014)
10.1109/TSC.2016.2520932
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
Jiguo Li (2017)
10.1111/J.1460-2466.1986.TB01425.X
An Interactive Media Event: South Korea's Televised "Family Reunion.".
Suk-Ho Jun (1986)
10.1109/IECON.2014.7049308
An authentication and access control framework for CoAP-based Internet of Things
P. Pereira (2014)
Ironpaper Growth Agency. Internet of things market statistics-2016
(2016)
10.1002/nem.1937
A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks
Q. Jiang (2017)
Overview of the Internet of Things
Cai Ri-mei (2011)
10.1007/978-3-319-11119-3_31
Attribute-Role-Based Hybrid Access Control in the Internet of Things
K. Sun (2014)
10.1109/VLSIT.2014.6894339
Device and technology implications of the Internet of Things
R. Aitken (2014)
Identity establishment and capability based access control (IECAC) scheme for Internet of Things
Parikshit Mahalle (2012)
10.1109/MCC.2017.9
Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things
M. B. Mollah (2017)
10.1109/ICITCS.2014.7021724
A User Centric Identity Management for Internet of Things
Do van Thuan (2014)
10.1016/j.ins.2018.07.077
Key-policy attribute-based encryption against continual auxiliary input leakage
Jiguo Li (2019)
10.1109/TKDE.2014.2320725
Malware Propagation in Large-Scale Networks
Shui Yu (2015)
10.1007/978-3-319-11119-3_31
Attribute-Role-Based Hybrid Access Control in the Internet of Things
Sun Kaiwen (2014)
10.1002/SRES.2283
A Trust Evaluation Model for E-Learning Systems
W. Tan (2014)
10.1109/TII.2014.2300338
Internet of Things for Enterprise Systems of Modern Manufacturing
Zhuming Bi (2014)
10.1002/sec.1509
Anonymous attribute-based proxy re-encryption for access control in cloud computing
Y. Zhang (2016)
10.1109/TBDATA.2017.2701347
NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users
Anmin Fu (2017)
A privacyaware two-factor authentication protocol based on elliptic curve cryptogra- 745 phy for wireless sensor networks
Q. Jiang (2017)
10.1016/j.future.2015.09.021
Integration of Cloud computing and Internet of Things: A survey
A. Botta (2016)
10.1016/j.jnca.2018.08.003
Data integrity verification of the outsourced big data in the cloud environment: A survey
L. Zhou (2018)
10.1016/j.comcom.2016.03.007
Practical access control for sensor networks in the context of the Internet of Things
F. Li (2016)
10.1109/ICDCSW.2012.23
Authentication and Access Control in the Internet of Things
Jing Liu (2012)
10.1007/978-3-319-12475-9_15
Fine-Grained Conditional Proxy Re-Encryption and Application
Yanjiang Yang (2014)
10.1109/TC.2015.2417544
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
Peng Xu (2016)
Provably Secure Certificate-based Conditional Proxy Re-encryption
Jiguo Li (2016)
10.1109/TSC.2016.2542813
KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage
Jiguo Li (2017)
Multi-element based on proxy re- 800 encryption scheme for mobile cloud computing
M. Su (2015)
The Next Evolution of the Internet The Internet of Things means everything will be connnected
K. Pretz (2013)
10.1155/2018/6140978
Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT
Ming Luo (2018)
10.1109/TPDS.2013.181
Can We Beat DDoS Attacks in Clouds?
Shui Yu (2014)
10.1145/2638728.2638752
Future directions for providing better IoT infrastructure
M. Gomes (2014)



This paper is referenced by
Semantic Scholar Logo Some data provided by SemanticScholar