{"title":"基于代理的物联网生态系统再加密设计","authors":"Kandula Srikanth, Pathuri Guna Rajesh, Nallapaneni Durga Prasad, Mohammed Asmathulla, Thallapureddy Praveen Kumar Reddy","doi":"10.1109/ACCAI58221.2023.10200337","DOIUrl":null,"url":null,"abstract":"Protect data in transit with a proxy-based re-encryption solution designed specifically for the Internet of Things ecosystem's needs. Because of identity-based encryption and proxy re-encryption can safely outsource to the cloud with proxy-based re-encryption technology. To compensate for the limitations of IoT devices, it delegated complex task processing to a proxy device located closer to the network's edge. Furthermore, distributing cached material through the proxy using information-centric networking features, improves service quality and network capacity utilization. The proposed research and security strategy review demonstrate that our method protects data in every sense, from granular control over who can access what to the elimination of key system bottlenecks.","PeriodicalId":382104,"journal":{"name":"2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Proxy-Based Re-Encryption Design for the IoT Ecosystem\",\"authors\":\"Kandula Srikanth, Pathuri Guna Rajesh, Nallapaneni Durga Prasad, Mohammed Asmathulla, Thallapureddy Praveen Kumar Reddy\",\"doi\":\"10.1109/ACCAI58221.2023.10200337\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Protect data in transit with a proxy-based re-encryption solution designed specifically for the Internet of Things ecosystem's needs. Because of identity-based encryption and proxy re-encryption can safely outsource to the cloud with proxy-based re-encryption technology. To compensate for the limitations of IoT devices, it delegated complex task processing to a proxy device located closer to the network's edge. Furthermore, distributing cached material through the proxy using information-centric networking features, improves service quality and network capacity utilization. The proposed research and security strategy review demonstrate that our method protects data in every sense, from granular control over who can access what to the elimination of key system bottlenecks.\",\"PeriodicalId\":382104,\"journal\":{\"name\":\"2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ACCAI58221.2023.10200337\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACCAI58221.2023.10200337","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Proxy-Based Re-Encryption Design for the IoT Ecosystem
Protect data in transit with a proxy-based re-encryption solution designed specifically for the Internet of Things ecosystem's needs. Because of identity-based encryption and proxy re-encryption can safely outsource to the cloud with proxy-based re-encryption technology. To compensate for the limitations of IoT devices, it delegated complex task processing to a proxy device located closer to the network's edge. Furthermore, distributing cached material through the proxy using information-centric networking features, improves service quality and network capacity utilization. The proposed research and security strategy review demonstrate that our method protects data in every sense, from granular control over who can access what to the elimination of key system bottlenecks.