Online citations, reference lists, and bibliographies.
← Back to Search

PRTA: A Proxy Re-encryption Based Trusted Authorization Scheme For Nodes On CloudIoT

Mang Su, B. Zhou, Anmin Fu, Y. Yu, Gongxuan Zhang
Published 2020 · Computer Science, Mathematics

Cite This
Download PDF
Analyze on Scholarcy
In CloudIoT platform, the data is collected and shared by different nodes of Internet of Things(IoT), and data is processed and stored based on cloud servers. It has increased the abilities of IoT on information computation. Meanwhile, it also has enriched the resource in cloud and improved integration of the Internet and human world. All of this offer advantages as well as the new challenges of information security and privacy protection. As the energy limitation of the nodes in IoT, they are particularly vulnerable. It is much easier to hijack the nodes than to attack the data center for hackers. Thus, it is a crucial and urgent issue to realize the trusted update of authorization of nodes. When some nodes are hijacked, both of the behaviors to upload data to servers and to download information from servers should be forbidden. Otherwise, it might cause the serious damage to the sensitive data and privacy of servers. In order to solve this problem, we proposed a Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT(PRTA). PRTA is based on the proxy re-encryption (PRE), and the cloud server will play the roles of data storing and re-encrypting, which would reach the full potential of cloud computing and reduce the cost of nodes. The node’s status is taken as one of the parameters for data re-encryption and it is under the authorization servers’ control, which could ensure the security and reliability of the data and be beneficial for the privacy protection in CloudIoT. Also, the authorization servers are divided into the downloading and uploading kinds, which will make the application range much wider.
This paper references
Internet of things (iot) connected devices installed base worldwide from
Full Verifiability for Outsourced Decryption in Attribute Based Encryption
Jiguo Li (2020)
Anonymous attribute-based proxy 840 re-encryption for access control in cloud computing. Security and Communication Networks
Y Zhang (2016)
On the Feasibility of Attribute-Based Encryption on Internet of Things Devices
Moreno Ambrosin (2016)
A Framework of Adaptive Interaction Support in Cloud-Based Internet of Things (IoT) Environment
Noura Alhakbani (2014)
Lightweight Break-Glass Access Control System for Healthcare Internet-of-Things
Yang Yang (2018)
Networking for Big Data: A Survey
Shui Yu (2017)
User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage
Jiguo Li (2018)
Hossain Alnuem M. and. A 725 framework of adaptive interaction support in cloud-based internet of things (iot) environment
N Alhakbani (2014)
Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data
Shui Yu (2016)
Type-Based Proxy Re-encryption and Its Construction
Qiang Tang (2008)
Threats to Networking Cloud and Edge Datacenters in the Internet of Things
Deepak Puthal (2016)
PRE-TUAN: Proxy Re-Encryption Based Trusted Update Scheme of Authorization for Nodes on IoT Cloud
Su Mang (2018)
IoT device security based on proxy re-encryption
S. Kim (2018)
A survey on trust managemen- 820 t for internet of things
Z. Yan (2014)
A survey on trust management for Internet of Things
Zheng Yan (2014)
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
Jiguo Li (2017)
An Interactive Media Event: South Korea's Televised "Family Reunion.".
Suk-Ho Jun (1986)
An authentication and access control framework for CoAP-based Internet of Things
P. Pereira (2014)
Ironpaper Growth Agency. Internet of things market statistics-2016
A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks
Q. Jiang (2017)
Overview of the Internet of Things
Cai Ri-mei (2011)
Attribute-Role-Based Hybrid Access Control in the Internet of Things
K. Sun (2014)
Device and technology implications of the Internet of Things
R. Aitken (2014)
Identity establishment and capability based access control (IECAC) scheme for Internet of Things
Parikshit Mahalle (2012)
Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things
M. B. Mollah (2017)
A User Centric Identity Management for Internet of Things
Do van Thuan (2014)
Key-policy attribute-based encryption against continual auxiliary input leakage
Jiguo Li (2019)
Malware Propagation in Large-Scale Networks
Shui Yu (2015)
Attribute-Role-Based Hybrid Access Control in the Internet of Things
Sun Kaiwen (2014)
A Trust Evaluation Model for E-Learning Systems
W. Tan (2014)
Internet of Things for Enterprise Systems of Modern Manufacturing
Zhuming Bi (2014)
Anonymous attribute-based proxy re-encryption for access control in cloud computing
Y. Zhang (2016)
NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users
Anmin Fu (2017)
A privacyaware two-factor authentication protocol based on elliptic curve cryptogra- 745 phy for wireless sensor networks
Q. Jiang (2017)
Integration of Cloud computing and Internet of Things: A survey
A. Botta (2016)
Data integrity verification of the outsourced big data in the cloud environment: A survey
L. Zhou (2018)
Practical access control for sensor networks in the context of the Internet of Things
F. Li (2016)
Authentication and Access Control in the Internet of Things
Jing Liu (2012)
Fine-Grained Conditional Proxy Re-Encryption and Application
Yanjiang Yang (2014)
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
Peng Xu (2016)
Provably Secure Certificate-based Conditional Proxy Re-encryption
Jiguo Li (2016)
KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage
Jiguo Li (2017)
Multi-element based on proxy re- 800 encryption scheme for mobile cloud computing
M. Su (2015)
The Next Evolution of the Internet The Internet of Things means everything will be connnected
K. Pretz (2013)
Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT
Ming Luo (2018)
Can We Beat DDoS Attacks in Clouds?
Shui Yu (2014)
Future directions for providing better IoT infrastructure
M. Gomes (2014)

This paper is referenced by
Semantic Scholar Logo Some data provided by SemanticScholar