Research Article
BibTex RIS Cite
Year 2024, Volume: 13 Issue: 1, 23 - 39, 29.03.2024
https://doi.org/10.55859/ijiss.1410041

Abstract

References

  • D. Fogli, R. Lanzilotti, and A. Piccinno, “End-user development tools for the smart home: A systematic literature review,” in Distributed, Ambient and Pervasive Interactions, N. Streitz and P. Markopoulos, Eds. Cham: Springer International Publishing, 2016, pp. 69–79.
  • D. Zheng, K. Deng, Y. Zhang, J. Zhao, X. Zheng, and X. Ma,“Smart grid power trading based on consortium blockchain in internet of things,” in Algorithms and Architectures for Parallel Processing, J. Vaidya and J. Li, Eds. Cham: Springer International Publishing, 2018, pp. 453–459.
  • B. V. Philip, T. Alpcan, J. Jin, and M. Palaniswami, “Distributed real-time iot for autonomous vehicles,” IEEE Transactions on Industrial Informatics, vol. 15, no. 2, pp. 1131–1140, 2019.
  • S. B. Baker, W. Xiang, and I. Atkinson, “Internet of things for smart healthcare: Technologies, challenges, and opportunities,” IEEE Access, vol. 5, pp. 26 521–26 544, 2017.
  • GSMA, “The Internet of Things by 2025,” Accessed Mar. 28, 2024. [Online]. Available: https://www.gsma.com/iot/wp-content/uploads/2018/08/GSMA-IoT-Infographic-2019.pdf
  • G. Leeming, J. Cunningham, and J. Ainsworth, “A ledger of me: personalizing healthcare using blockchain technology,” Frontiers in medicine, vol. 6, p. 171, 2019.
  • T. Feng, P. Yang, C. Liu, F. Junli, and R. Ma, “Blockchain data privacy protection and sharing scheme based on zero-knowledge proof,” Wireless Communications and Mobile Computing, vol. 2022, pp. 1–11, 2022.
  • J. Song, Y. Yang, J. Mei, G. Zhou, W. Qiu, Y. Wang, L. Xu, Y. Liu, J. Jiang, Z. Chu, W. Tan, and Z. Lin, “Proxy reencryption- based traceability and sharing mechanism of the power material data in blockchain environment,” Energies, vol. 15, no. 7, p. 2570, 2022.
  • X. Yang, X. Li, A. Chen, and W. Xi, “Blockchain-based searchable proxy re-encryption scheme for ehr security storage and sharing,” Journal of Physics: Conference Series, vol. 1828, p. 012120, 2021.
  • A. Manzoor, A. Braeken, S. S. Kanhere, M. Ylianttila, and M. Liyanage, “Proxy re-encryption enabled secure and anonymous iot data sharing platform based on blockchain,” Journal of Network and Computer Applications, vol. 176, p. 102917, 2021.
  • D. Zonda and M. Meddeb, “Proxy re-encryption for privacy enhancement in blockchain: Carpooling use case,” in 2020 IEEE International Conference on Blockchain (Blockchain), 2020, pp.482–489.
  • J. Xu, K. Xue, S. Li, H. Tian, H. Jianan, P. Hong, and N. Yu, “Healthchain: A blockchain-based privacy preserving scheme for large-scale health data,” IEEE Internet of Things Journal, vol. 6, pp. 8770–8781, 2019.
  • P. Zhang, J. White, D. C. Schmidt, G. Lenz, and S. T. Rosenbloom, “Fhirchain: applying blockchain to securely and scalably share clinical data,” Computational and structural biotechnology journal, vol. 16, pp. 267–278, 2018.
  • J. Zhang, S. Su, H. Zhong, J. Cui, and D. He, “Identitybased broadcast proxy re-encryption for flexible data sharing in vanets,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 4830–4842, 2023.
  • C. Ge, W. Susilo, Z. Liu, J. Baek, X. Luo, and L. Fang, “Attribute-based proxy re-encryption with direct revocation mechanism for data sharing in clouds,” IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 2, pp. 949–960, 2024.
  • I. Keshta, Y. Aoudni, M. Sandhu, A. Singh, P. A. Xalikovich, A. Rizwan, M. Soni, and S. Lalar, “Blockchain aware proxy re-encryption algorithm-based data sharing scheme,” Physical Communication, vol. 58, p. 102048, 2023.
  • E. B. Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, and M. Virza, “Zerocash: Decentralized anonymous payments from bitcoin,” in 2014 IEEE symposium on security and privacy. IEEE, 2014, pp. 459–474.
  • M. Blaze, G. Bleumer, and M. Strauss, “Divertible protocols and atomic proxy cryptography,” in Advances in Cryptology —EUROCRYPT’98. Lecture Notes in Computer Science, K. Nyberg,Ed., vol. 1403. Springer Berlin Heidelberg, 1998, pp.127–144.
  • E. Kirshanova, “Proxy re-encryption from lattices,” in Public-Key Cryptography – PKC 2014, H. Krawczyk, Ed. Springer Berlin Heidelberg, 2014, pp. 77–94.
  • G. Pareek and B. Purushothama, “Proxy re-encryption for finegrained access control: Its applicability, security under stronger notions and performance,” Journal of Information Security and Applications, vol. 54, p. 102543, 2020.
  • L. Ibraimi, Q. Tang, P. Hartel, and W. Jonker, “A type-andidentity- based proxy re-encryption scheme and its application in healthcare,” vol. 5159, 2008, pp. 185–198.
  • D. Nu˜nez, I. Agudo, and J. Lopez, “Proxy re-encryption: Analysis of constructions and its application to secure access delegation,” Journal of Network and Computer Applications, vol. 87, pp. 193–209, 2017.
  • H. Deng, Z. Qin, Q. Wu, Z. Guan, and Y. Zhou, “Flexible attribute-based proxy re-encryption for efficient data sharing,” Information Sciences, vol. 511, pp. 94–113, 2020.
  • K. Liang, M. H. Au, J. K. Liu, W. Susilo, D. S. Wong, G. Yang, Y. Yu, and A. Yang, “A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing,” Future Generation Computer Systems, vol. 52, pp. 95–108, 2015.
  • C. Ge, W. Susilo, J. Baek, Z. Liu, J. Xia, and L. Fang, “A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds,” IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 5, pp. 2907–2919, 2022.
  • X. A. Wang, F. Xhafa, Z. Zheng, and J. Nie, “Identity based proxy re-encryption scheme (ibpre+) for secure cloud data sharing,” in 2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS), 2016, pp. 44–48.
  • P. Dutta, W. Susilo, D. H. Duong, and P. S. Roy, “Collusionresistant identity-based proxy re-encryption: lattice-based constructions in standard model,” Theoretical Computer Science, vol. 871, pp. 16–29, 2021.
  • Q. Zhang, J. Cui, H. Zhong, and L. Liu, “Toward data transmission security based on proxy broadcast re-encryption in edge collaboration,” ACM Transactions on Sensor Networks (TOSN), vol. 18, no. 3, pp. 1–27, 2022.
  • Y. Liu, Y. Ren, C. Ge, J. Xia, and Q. Wang, “A cca-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system,” Journal of Information Security and Applications, vol. 47, pp. 125–131, 2019.
  • J. Shao, Z. Cao, X. Liang, and H. Lin, “Proxy re-encryption with keyword search,” Information Sciences, vol. 180, no. 13, pp. 2576–2587, 2010.
  • G. Ateniese, K. Benson, and S. Hohenberger, “Key-private proxy re-encryption,” in Topics in Cryptology – CT-RSA 2009, M. Fischlin, Ed. Springer Berlin Heidelberg, 2009, pp. 279–294.
  • G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” ACM Transactions on Privacy and Security, vol. 9, no. 1, pp. 1–30, 2006.
  • Z. Song, Z. Li, and W. Dou, “Different approaches for the formal definition of authentication property,” in 9th Asia-Pacific Conference on Communications (IEEE Cat. No. 03EX732), vol. 2. IEEE, 2003, pp. 854–858.
  • D. Yaga, P. Mell, N. Roby, and K. Scarfone, “Blockchain technology overview,” ArXiv, vol. abs/1906.11078, 2018. [Online]. Available: https://api.semanticscholar.org/CorpusID:69842399
  • K. O.-B. O. Agyekum, Q. Xia, E. B. Sifah, C. N. A. Cobblah, H. Xia, and J. Gao, “A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain,” IEEE Systems Journal, vol. 16, no. 1, pp. 1685–1696, 2021.

Decentralized Anonymous IoT Data Sharing with Key-Private Proxy Re-Encryption

Year 2024, Volume: 13 Issue: 1, 23 - 39, 29.03.2024
https://doi.org/10.55859/ijiss.1410041

Abstract

Secure and scalable data sharing is one of the main concerns of the Internet of Things (IoT) ecosystem. In this paper, we introduce a novel blockchain-based data-sharing construction designed to ensure full anonymity for both the users and the data. To share the encrypted IoT data stored on the cloud, users generate tokens, prove their ownership using zk-SNARKs, and target the destination address anonymously. To tackle the privacy concerns arising from uploading the data to the cloud, we use key-private re-encryption and share only the necessary information with the proxy. As the first time in the literature, we have integrated a token-based blockchain and a key private proxy re-encryption to achieve a fully anonymous data sharing scheme. Furthermore, we provide security proof of our proposed scheme is secure against existential forgery under chosen-plaintext attacks, under eDBDH assumption in the random oracle model.

References

  • D. Fogli, R. Lanzilotti, and A. Piccinno, “End-user development tools for the smart home: A systematic literature review,” in Distributed, Ambient and Pervasive Interactions, N. Streitz and P. Markopoulos, Eds. Cham: Springer International Publishing, 2016, pp. 69–79.
  • D. Zheng, K. Deng, Y. Zhang, J. Zhao, X. Zheng, and X. Ma,“Smart grid power trading based on consortium blockchain in internet of things,” in Algorithms and Architectures for Parallel Processing, J. Vaidya and J. Li, Eds. Cham: Springer International Publishing, 2018, pp. 453–459.
  • B. V. Philip, T. Alpcan, J. Jin, and M. Palaniswami, “Distributed real-time iot for autonomous vehicles,” IEEE Transactions on Industrial Informatics, vol. 15, no. 2, pp. 1131–1140, 2019.
  • S. B. Baker, W. Xiang, and I. Atkinson, “Internet of things for smart healthcare: Technologies, challenges, and opportunities,” IEEE Access, vol. 5, pp. 26 521–26 544, 2017.
  • GSMA, “The Internet of Things by 2025,” Accessed Mar. 28, 2024. [Online]. Available: https://www.gsma.com/iot/wp-content/uploads/2018/08/GSMA-IoT-Infographic-2019.pdf
  • G. Leeming, J. Cunningham, and J. Ainsworth, “A ledger of me: personalizing healthcare using blockchain technology,” Frontiers in medicine, vol. 6, p. 171, 2019.
  • T. Feng, P. Yang, C. Liu, F. Junli, and R. Ma, “Blockchain data privacy protection and sharing scheme based on zero-knowledge proof,” Wireless Communications and Mobile Computing, vol. 2022, pp. 1–11, 2022.
  • J. Song, Y. Yang, J. Mei, G. Zhou, W. Qiu, Y. Wang, L. Xu, Y. Liu, J. Jiang, Z. Chu, W. Tan, and Z. Lin, “Proxy reencryption- based traceability and sharing mechanism of the power material data in blockchain environment,” Energies, vol. 15, no. 7, p. 2570, 2022.
  • X. Yang, X. Li, A. Chen, and W. Xi, “Blockchain-based searchable proxy re-encryption scheme for ehr security storage and sharing,” Journal of Physics: Conference Series, vol. 1828, p. 012120, 2021.
  • A. Manzoor, A. Braeken, S. S. Kanhere, M. Ylianttila, and M. Liyanage, “Proxy re-encryption enabled secure and anonymous iot data sharing platform based on blockchain,” Journal of Network and Computer Applications, vol. 176, p. 102917, 2021.
  • D. Zonda and M. Meddeb, “Proxy re-encryption for privacy enhancement in blockchain: Carpooling use case,” in 2020 IEEE International Conference on Blockchain (Blockchain), 2020, pp.482–489.
  • J. Xu, K. Xue, S. Li, H. Tian, H. Jianan, P. Hong, and N. Yu, “Healthchain: A blockchain-based privacy preserving scheme for large-scale health data,” IEEE Internet of Things Journal, vol. 6, pp. 8770–8781, 2019.
  • P. Zhang, J. White, D. C. Schmidt, G. Lenz, and S. T. Rosenbloom, “Fhirchain: applying blockchain to securely and scalably share clinical data,” Computational and structural biotechnology journal, vol. 16, pp. 267–278, 2018.
  • J. Zhang, S. Su, H. Zhong, J. Cui, and D. He, “Identitybased broadcast proxy re-encryption for flexible data sharing in vanets,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 4830–4842, 2023.
  • C. Ge, W. Susilo, Z. Liu, J. Baek, X. Luo, and L. Fang, “Attribute-based proxy re-encryption with direct revocation mechanism for data sharing in clouds,” IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 2, pp. 949–960, 2024.
  • I. Keshta, Y. Aoudni, M. Sandhu, A. Singh, P. A. Xalikovich, A. Rizwan, M. Soni, and S. Lalar, “Blockchain aware proxy re-encryption algorithm-based data sharing scheme,” Physical Communication, vol. 58, p. 102048, 2023.
  • E. B. Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, and M. Virza, “Zerocash: Decentralized anonymous payments from bitcoin,” in 2014 IEEE symposium on security and privacy. IEEE, 2014, pp. 459–474.
  • M. Blaze, G. Bleumer, and M. Strauss, “Divertible protocols and atomic proxy cryptography,” in Advances in Cryptology —EUROCRYPT’98. Lecture Notes in Computer Science, K. Nyberg,Ed., vol. 1403. Springer Berlin Heidelberg, 1998, pp.127–144.
  • E. Kirshanova, “Proxy re-encryption from lattices,” in Public-Key Cryptography – PKC 2014, H. Krawczyk, Ed. Springer Berlin Heidelberg, 2014, pp. 77–94.
  • G. Pareek and B. Purushothama, “Proxy re-encryption for finegrained access control: Its applicability, security under stronger notions and performance,” Journal of Information Security and Applications, vol. 54, p. 102543, 2020.
  • L. Ibraimi, Q. Tang, P. Hartel, and W. Jonker, “A type-andidentity- based proxy re-encryption scheme and its application in healthcare,” vol. 5159, 2008, pp. 185–198.
  • D. Nu˜nez, I. Agudo, and J. Lopez, “Proxy re-encryption: Analysis of constructions and its application to secure access delegation,” Journal of Network and Computer Applications, vol. 87, pp. 193–209, 2017.
  • H. Deng, Z. Qin, Q. Wu, Z. Guan, and Y. Zhou, “Flexible attribute-based proxy re-encryption for efficient data sharing,” Information Sciences, vol. 511, pp. 94–113, 2020.
  • K. Liang, M. H. Au, J. K. Liu, W. Susilo, D. S. Wong, G. Yang, Y. Yu, and A. Yang, “A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing,” Future Generation Computer Systems, vol. 52, pp. 95–108, 2015.
  • C. Ge, W. Susilo, J. Baek, Z. Liu, J. Xia, and L. Fang, “A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds,” IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 5, pp. 2907–2919, 2022.
  • X. A. Wang, F. Xhafa, Z. Zheng, and J. Nie, “Identity based proxy re-encryption scheme (ibpre+) for secure cloud data sharing,” in 2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS), 2016, pp. 44–48.
  • P. Dutta, W. Susilo, D. H. Duong, and P. S. Roy, “Collusionresistant identity-based proxy re-encryption: lattice-based constructions in standard model,” Theoretical Computer Science, vol. 871, pp. 16–29, 2021.
  • Q. Zhang, J. Cui, H. Zhong, and L. Liu, “Toward data transmission security based on proxy broadcast re-encryption in edge collaboration,” ACM Transactions on Sensor Networks (TOSN), vol. 18, no. 3, pp. 1–27, 2022.
  • Y. Liu, Y. Ren, C. Ge, J. Xia, and Q. Wang, “A cca-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system,” Journal of Information Security and Applications, vol. 47, pp. 125–131, 2019.
  • J. Shao, Z. Cao, X. Liang, and H. Lin, “Proxy re-encryption with keyword search,” Information Sciences, vol. 180, no. 13, pp. 2576–2587, 2010.
  • G. Ateniese, K. Benson, and S. Hohenberger, “Key-private proxy re-encryption,” in Topics in Cryptology – CT-RSA 2009, M. Fischlin, Ed. Springer Berlin Heidelberg, 2009, pp. 279–294.
  • G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” ACM Transactions on Privacy and Security, vol. 9, no. 1, pp. 1–30, 2006.
  • Z. Song, Z. Li, and W. Dou, “Different approaches for the formal definition of authentication property,” in 9th Asia-Pacific Conference on Communications (IEEE Cat. No. 03EX732), vol. 2. IEEE, 2003, pp. 854–858.
  • D. Yaga, P. Mell, N. Roby, and K. Scarfone, “Blockchain technology overview,” ArXiv, vol. abs/1906.11078, 2018. [Online]. Available: https://api.semanticscholar.org/CorpusID:69842399
  • K. O.-B. O. Agyekum, Q. Xia, E. B. Sifah, C. N. A. Cobblah, H. Xia, and J. Gao, “A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain,” IEEE Systems Journal, vol. 16, no. 1, pp. 1685–1696, 2021.
There are 35 citations in total.

Details

Primary Language English
Subjects Cryptography
Journal Section Research Article
Authors

Esra Günsay 0000-0001-6672-4253

Oğuz Yayla 0000-0001-8945-2780

Publication Date March 29, 2024
Submission Date December 26, 2023
Acceptance Date March 1, 2024
Published in Issue Year 2024 Volume: 13 Issue: 1

Cite

IEEE E. Günsay and O. Yayla, “Decentralized Anonymous IoT Data Sharing with Key-Private Proxy Re-Encryption”, IJISS, vol. 13, no. 1, pp. 23–39, 2024, doi: 10.55859/ijiss.1410041.