An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption

The prevalence of data sharing has increased with the rise in popularity of cloud computing and the Internet of Things (IoT). However, ensuring data security is difficult because of the possible negative consequences of illegal data usage. This study presents a method for ensuring the secure transmi...

Full description

Bibliographic Details
Main Authors: Keshav Kumar, Choudhary, Shreedhara N, Hegde, C., Pui Lin
Format: Article
Language:English
English
Published: INTI International University 2024
Subjects:
Online Access:http://eprints.intimal.edu.my/1968/
http://eprints.intimal.edu.my/1968/3/511
http://eprints.intimal.edu.my/1968/4/ij2024_23r.pdf
_version_ 1848766973881614336
author Keshav Kumar, Choudhary
Shreedhara N, Hegde
C., Pui Lin
author_facet Keshav Kumar, Choudhary
Shreedhara N, Hegde
C., Pui Lin
author_sort Keshav Kumar, Choudhary
building INTI Institutional Repository
collection Online Access
description The prevalence of data sharing has increased with the rise in popularity of cloud computing and the Internet of Things (IoT). However, ensuring data security is difficult because of the possible negative consequences of illegal data usage. This study presents a method for ensuring the secure transmission of data in cloud environments: proxy re-encryption. The identity-based encryption method enables data owners to transfer encrypted data to the cloud. Subsequently, a proxy re-encryption framework enables authorized individuals to access the data. To surpass the limitations of IoT device resources, we utilize an edge device as a proxy server to transfer computationally intensive tasks to a separate device. By utilizing the advantages of information-centric networking, we can optimize network capacity and enhance service quality by efficiently distributing cached content across the proxy. This method decreases bottlenecks in centralized systems while providing precise control over data access. The proposed work demonstrates the effectiveness of the strategy in ensuring data security, confidentiality, and integrity through thorough security research and plan review.
first_indexed 2025-11-14T11:58:15Z
format Article
id intimal-1968
institution INTI International University
institution_category Local University
language English
English
last_indexed 2025-11-14T11:59:39Z
publishDate 2024
publisher INTI International University
recordtype eprints
repository_type Digital Repository
spelling intimal-19682025-07-30T07:42:25Z http://eprints.intimal.edu.my/1968/ An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption Keshav Kumar, Choudhary Shreedhara N, Hegde C., Pui Lin Q Science (General) QA75 Electronic computers. Computer science QA76 Computer software The prevalence of data sharing has increased with the rise in popularity of cloud computing and the Internet of Things (IoT). However, ensuring data security is difficult because of the possible negative consequences of illegal data usage. This study presents a method for ensuring the secure transmission of data in cloud environments: proxy re-encryption. The identity-based encryption method enables data owners to transfer encrypted data to the cloud. Subsequently, a proxy re-encryption framework enables authorized individuals to access the data. To surpass the limitations of IoT device resources, we utilize an edge device as a proxy server to transfer computationally intensive tasks to a separate device. By utilizing the advantages of information-centric networking, we can optimize network capacity and enhance service quality by efficiently distributing cached content across the proxy. This method decreases bottlenecks in centralized systems while providing precise control over data access. The proposed work demonstrates the effectiveness of the strategy in ensuring data security, confidentiality, and integrity through thorough security research and plan review. INTI International University 2024-08 Article PeerReviewed text en cc_by_4 http://eprints.intimal.edu.my/1968/3/511 text en cc_by_4 http://eprints.intimal.edu.my/1968/4/ij2024_23r.pdf Keshav Kumar, Choudhary and Shreedhara N, Hegde and C., Pui Lin (2024) An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption. INTI JOURNAL, 2024 (23). pp. 1-6. ISSN e2600-7320 https://intijournal.intimal.edu.my
spellingShingle Q Science (General)
QA75 Electronic computers. Computer science
QA76 Computer software
Keshav Kumar, Choudhary
Shreedhara N, Hegde
C., Pui Lin
An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption
title An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption
title_full An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption
title_fullStr An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption
title_full_unstemmed An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption
title_short An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption
title_sort approach to secure data sharing in the internet of things using blockchain- based proxy re-encryption
topic Q Science (General)
QA75 Electronic computers. Computer science
QA76 Computer software
url http://eprints.intimal.edu.my/1968/
http://eprints.intimal.edu.my/1968/
http://eprints.intimal.edu.my/1968/3/511
http://eprints.intimal.edu.my/1968/4/ij2024_23r.pdf