An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption
The prevalence of data sharing has increased with the rise in popularity of cloud computing and the Internet of Things (IoT). However, ensuring data security is difficult because of the possible negative consequences of illegal data usage. This study presents a method for ensuring the secure transmi...
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
INTI International University
2024
|
| Subjects: | |
| Online Access: | http://eprints.intimal.edu.my/1968/ http://eprints.intimal.edu.my/1968/3/511 http://eprints.intimal.edu.my/1968/4/ij2024_23r.pdf |
| _version_ | 1848766973881614336 |
|---|---|
| author | Keshav Kumar, Choudhary Shreedhara N, Hegde C., Pui Lin |
| author_facet | Keshav Kumar, Choudhary Shreedhara N, Hegde C., Pui Lin |
| author_sort | Keshav Kumar, Choudhary |
| building | INTI Institutional Repository |
| collection | Online Access |
| description | The prevalence of data sharing has increased with the rise in popularity of cloud computing and the Internet of Things (IoT). However, ensuring data security is difficult because of the possible negative consequences of illegal data usage. This study presents a method for ensuring the secure transmission of data in cloud environments: proxy re-encryption. The identity-based encryption method enables data owners to transfer encrypted data to the cloud. Subsequently, a proxy re-encryption framework enables authorized individuals to access the data. To surpass the limitations of IoT device resources, we utilize an edge device as a proxy server to transfer computationally intensive tasks to a separate device. By utilizing the advantages of information-centric networking, we can optimize network capacity and enhance service quality by efficiently distributing cached content across the proxy. This method decreases bottlenecks in centralized systems while providing precise control over data access. The proposed work demonstrates the effectiveness of the strategy in ensuring data security, confidentiality, and integrity through thorough security research and plan review. |
| first_indexed | 2025-11-14T11:58:15Z |
| format | Article |
| id | intimal-1968 |
| institution | INTI International University |
| institution_category | Local University |
| language | English English |
| last_indexed | 2025-11-14T11:59:39Z |
| publishDate | 2024 |
| publisher | INTI International University |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | intimal-19682025-07-30T07:42:25Z http://eprints.intimal.edu.my/1968/ An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption Keshav Kumar, Choudhary Shreedhara N, Hegde C., Pui Lin Q Science (General) QA75 Electronic computers. Computer science QA76 Computer software The prevalence of data sharing has increased with the rise in popularity of cloud computing and the Internet of Things (IoT). However, ensuring data security is difficult because of the possible negative consequences of illegal data usage. This study presents a method for ensuring the secure transmission of data in cloud environments: proxy re-encryption. The identity-based encryption method enables data owners to transfer encrypted data to the cloud. Subsequently, a proxy re-encryption framework enables authorized individuals to access the data. To surpass the limitations of IoT device resources, we utilize an edge device as a proxy server to transfer computationally intensive tasks to a separate device. By utilizing the advantages of information-centric networking, we can optimize network capacity and enhance service quality by efficiently distributing cached content across the proxy. This method decreases bottlenecks in centralized systems while providing precise control over data access. The proposed work demonstrates the effectiveness of the strategy in ensuring data security, confidentiality, and integrity through thorough security research and plan review. INTI International University 2024-08 Article PeerReviewed text en cc_by_4 http://eprints.intimal.edu.my/1968/3/511 text en cc_by_4 http://eprints.intimal.edu.my/1968/4/ij2024_23r.pdf Keshav Kumar, Choudhary and Shreedhara N, Hegde and C., Pui Lin (2024) An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption. INTI JOURNAL, 2024 (23). pp. 1-6. ISSN e2600-7320 https://intijournal.intimal.edu.my |
| spellingShingle | Q Science (General) QA75 Electronic computers. Computer science QA76 Computer software Keshav Kumar, Choudhary Shreedhara N, Hegde C., Pui Lin An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption |
| title | An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption |
| title_full | An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption |
| title_fullStr | An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption |
| title_full_unstemmed | An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption |
| title_short | An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption |
| title_sort | approach to secure data sharing in the internet of things using blockchain- based proxy re-encryption |
| topic | Q Science (General) QA75 Electronic computers. Computer science QA76 Computer software |
| url | http://eprints.intimal.edu.my/1968/ http://eprints.intimal.edu.my/1968/ http://eprints.intimal.edu.my/1968/3/511 http://eprints.intimal.edu.my/1968/4/ij2024_23r.pdf |