IoT device security based on proxy re-encryption

SH Kim, IY Lee - Journal of Ambient Intelligence and Humanized …, 2018 - Springer
It appears that interest in the Internet of things (IoT) has recently reached its peak, with a
great deal of focus from both the private and public sectors. IoT, a technology that enables …

A threshold proxy re-encryption scheme for secure IoT data sharing based on blockchain

Y Chen, B Hu, H Yu, Z Duan, J Huang - Electronics, 2021 - mdpi.com
The IoT devices deployed in various application scenarios will generate massive data with
immeasurable value every day. These data often contain the user's personal privacy …

A cloud-assisted proxy re-encryption scheme for efficient data sharing across iot systems

V Muthukumaran, D Ezhilmaran - Research Anthology on …, 2023 - igi-global.com
In recent years, the growth of IoT applications is rapid in nature and widespread across
several domains. This tremendous growth of IoT applications leads to various security and …

A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain

KOBO Agyekum, Q Xia, EB Sifah… - IEEE Systems …, 2021 - ieeexplore.ieee.org
The evolution of the Internet of Things has seen data sharing as one of its most useful
applications in cloud computing. As eye-catching as this technology has been, data security …

An improved proxy Re-encryption scheme for IoT-based data outsourcing services in clouds

HY Lin, YM Hung - Sensors, 2020 - mdpi.com
IoT-based data outsourcing services in clouds could be regarded as a new trend in recent
years, as they could reduce the hardware and software cost for enterprises and obtain …

Blockchain based proxy re-encryption scheme for secure IoT data sharing

A Manzoor, M Liyanage, A Braeke… - … on blockchain and …, 2019 - ieeexplore.ieee.org
Data is central to the Internet of Things IoT ecosystem. Most of the current IoT systems are
using centralized cloud-based data sharing systems. Involvement of such third-party service …

[HTML][HTML] Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain

A Manzoor, A Braeken, SS Kanhere, M Ylianttila… - Journal of Network and …, 2021 - Elsevier
Data is central to the Internet of Things (IoT) ecosystem. With billions of devices connected,
most of the current IoT systems are using centralized cloud-based data sharing systems …

PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT

M Su, B Zhou, A Fu, Y Yu, G Zhang - Information Sciences, 2020 - Elsevier
In CloudIoT platform, the data is collected and shared by different nodes of Internet of Things
(IoT), and data is processed and stored based on cloud servers. It has increased the abilities …

Multi-tier stack of block chain with proxy re-encryption method scheme on the internet of things platform

BS Rawal, G Manogaran, M Hamdi - ACM Transactions on Internet …, 2021 - dl.acm.org
Block chain provides an innovative solution to information storage, transaction execution,
security, and trust building in an open environment. The block chain is technological …

A secure and fine-grained scheme for data security in industrial IoT platforms for smart city

L Fang, H Zhang, M Li, C Ge, L Liu… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
With the high popularity of IoT devices, industrial IoT platforms, such as smart factories and
oilfield industrial control systems, have become a new trend in the development of smart city …