{"title":"使用代理重新加密实现智能定制服务的安全数据共享","authors":"Hyun-Jong Cha, Ho-Kyung Yang, You-Jin Song","doi":"10.14257/ijgdc.2018.11.10.03","DOIUrl":null,"url":null,"abstract":"Intelligent customized services are required to meet the needs of users. Data concerning the user’s environment is needed more so the situation of the user can be determined for providing a highly reliable service. In order to collect a large amount of data, the Internet of Things (IoT), which connects numerous devices through the Internet, has been developed. Cloud computing is widely used for managing data efficiently, but can delay data transmission. Therefore, fog computing has been proposed. However, the method used to manage data securely in the cloud computing environment is not efficient in the fog computing environment. Moreover, data may contain personally sensitive information. Additionally, various stakeholders may exist in relation to the access authority of the information. In this respect, there can be many vulnerabilities and threats. In response, this study proposed a re-encryption technique for managing data securely in the fog computing environment. This technique allows a user to delegate the decryption authority to decrypt encrypted data using the re-encryption method in the proxy server for efficient communication.","PeriodicalId":46000,"journal":{"name":"International Journal of Grid and Distributed Computing","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2018-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Secure Data Sharing using Proxy Re-Encryption for Intelligent Customized Services\",\"authors\":\"Hyun-Jong Cha, Ho-Kyung Yang, You-Jin Song\",\"doi\":\"10.14257/ijgdc.2018.11.10.03\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Intelligent customized services are required to meet the needs of users. Data concerning the user’s environment is needed more so the situation of the user can be determined for providing a highly reliable service. In order to collect a large amount of data, the Internet of Things (IoT), which connects numerous devices through the Internet, has been developed. Cloud computing is widely used for managing data efficiently, but can delay data transmission. Therefore, fog computing has been proposed. However, the method used to manage data securely in the cloud computing environment is not efficient in the fog computing environment. Moreover, data may contain personally sensitive information. Additionally, various stakeholders may exist in relation to the access authority of the information. In this respect, there can be many vulnerabilities and threats. In response, this study proposed a re-encryption technique for managing data securely in the fog computing environment. This technique allows a user to delegate the decryption authority to decrypt encrypted data using the re-encryption method in the proxy server for efficient communication.\",\"PeriodicalId\":46000,\"journal\":{\"name\":\"International Journal of Grid and Distributed Computing\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Grid and Distributed Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14257/ijgdc.2018.11.10.03\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Grid and Distributed Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/ijgdc.2018.11.10.03","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
摘要
需要智能定制服务,满足用户需求。更需要有关用户环境的数据,以便确定用户的情况,以便提供高度可靠的服务。为了收集大量的数据,通过互联网连接众多设备的物联网(Internet of Things, IoT)应运而生。云计算被广泛用于有效地管理数据,但会延迟数据的传输。因此,人们提出了雾计算。然而,云计算环境下安全管理数据的方法在雾计算环境下效率不高。此外,数据可能包含个人敏感信息。此外,可能存在与信息访问权限相关的各种涉众。在这方面,可能存在许多漏洞和威胁。为此,本研究提出了一种在雾计算环境下安全管理数据的再加密技术。该技术允许用户委托解密权限,使用代理服务器中的重新加密方法解密加密的数据,从而实现高效通信。
Secure Data Sharing using Proxy Re-Encryption for Intelligent Customized Services
Intelligent customized services are required to meet the needs of users. Data concerning the user’s environment is needed more so the situation of the user can be determined for providing a highly reliable service. In order to collect a large amount of data, the Internet of Things (IoT), which connects numerous devices through the Internet, has been developed. Cloud computing is widely used for managing data efficiently, but can delay data transmission. Therefore, fog computing has been proposed. However, the method used to manage data securely in the cloud computing environment is not efficient in the fog computing environment. Moreover, data may contain personally sensitive information. Additionally, various stakeholders may exist in relation to the access authority of the information. In this respect, there can be many vulnerabilities and threats. In response, this study proposed a re-encryption technique for managing data securely in the fog computing environment. This technique allows a user to delegate the decryption authority to decrypt encrypted data using the re-encryption method in the proxy server for efficient communication.
期刊介绍:
IJGDC aims to facilitate and support research related to control and automation technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of control and automation. To bridge the gap of users who do not have access to major databases where one should pay for every downloaded article; this online publication platform is open to all readers as part of our commitment to global scientific society. Journal Topics: -Architectures and Fabrics -Autonomic and Adaptive Systems -Cluster and Grid Integration -Creation and Management of Virtual Enterprises and Organizations -Dependable and Survivable Distributed Systems -Distributed and Large-Scale Data Access and Management -Distributed Multimedia Systems -Distributed Trust Management -eScience and eBusiness Applications -Fuzzy Algorithm -Grid Economy and Business Models -Histogram Methodology -Image or Speech Filtering -Image or Speech Recognition -Information Services -Large-Scale Group Communication -Metadata, Ontologies, and Provenance -Middleware and Toolkits -Monitoring, Management and Organization Tools -Networking and Security -Novel Distributed Applications -Performance Measurement and Modeling -Pervasive Computing -Problem Solving Environments -Programming Models, Tools and Environments -QoS and resource management -Real-time and Embedded Systems -Security and Trust in Grid and Distributed Systems -Sensor Networks -Utility Computing on Global Grids -Web Services and Service-Oriented Architecture -Wireless and Mobile Ad Hoc Networks -Workflow and Multi-agent Systems