使用代理重新加密实现智能定制服务的安全数据共享

Hyun-Jong Cha, Ho-Kyung Yang, You-Jin Song
{"title":"使用代理重新加密实现智能定制服务的安全数据共享","authors":"Hyun-Jong Cha, Ho-Kyung Yang, You-Jin Song","doi":"10.14257/ijgdc.2018.11.10.03","DOIUrl":null,"url":null,"abstract":"Intelligent customized services are required to meet the needs of users. Data concerning the user’s environment is needed more so the situation of the user can be determined for providing a highly reliable service. In order to collect a large amount of data, the Internet of Things (IoT), which connects numerous devices through the Internet, has been developed. Cloud computing is widely used for managing data efficiently, but can delay data transmission. Therefore, fog computing has been proposed. However, the method used to manage data securely in the cloud computing environment is not efficient in the fog computing environment. Moreover, data may contain personally sensitive information. Additionally, various stakeholders may exist in relation to the access authority of the information. In this respect, there can be many vulnerabilities and threats. In response, this study proposed a re-encryption technique for managing data securely in the fog computing environment. This technique allows a user to delegate the decryption authority to decrypt encrypted data using the re-encryption method in the proxy server for efficient communication.","PeriodicalId":46000,"journal":{"name":"International Journal of Grid and Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2018-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Secure Data Sharing using Proxy Re-Encryption for Intelligent Customized Services\",\"authors\":\"Hyun-Jong Cha, Ho-Kyung Yang, You-Jin Song\",\"doi\":\"10.14257/ijgdc.2018.11.10.03\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Intelligent customized services are required to meet the needs of users. Data concerning the user’s environment is needed more so the situation of the user can be determined for providing a highly reliable service. In order to collect a large amount of data, the Internet of Things (IoT), which connects numerous devices through the Internet, has been developed. Cloud computing is widely used for managing data efficiently, but can delay data transmission. Therefore, fog computing has been proposed. However, the method used to manage data securely in the cloud computing environment is not efficient in the fog computing environment. Moreover, data may contain personally sensitive information. Additionally, various stakeholders may exist in relation to the access authority of the information. In this respect, there can be many vulnerabilities and threats. In response, this study proposed a re-encryption technique for managing data securely in the fog computing environment. This technique allows a user to delegate the decryption authority to decrypt encrypted data using the re-encryption method in the proxy server for efficient communication.\",\"PeriodicalId\":46000,\"journal\":{\"name\":\"International Journal of Grid and Distributed Computing\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Grid and Distributed Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14257/ijgdc.2018.11.10.03\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Grid and Distributed Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/ijgdc.2018.11.10.03","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

需要智能定制服务,满足用户需求。更需要有关用户环境的数据,以便确定用户的情况,以便提供高度可靠的服务。为了收集大量的数据,通过互联网连接众多设备的物联网(Internet of Things, IoT)应运而生。云计算被广泛用于有效地管理数据,但会延迟数据的传输。因此,人们提出了雾计算。然而,云计算环境下安全管理数据的方法在雾计算环境下效率不高。此外,数据可能包含个人敏感信息。此外,可能存在与信息访问权限相关的各种涉众。在这方面,可能存在许多漏洞和威胁。为此,本研究提出了一种在雾计算环境下安全管理数据的再加密技术。该技术允许用户委托解密权限,使用代理服务器中的重新加密方法解密加密的数据,从而实现高效通信。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Secure Data Sharing using Proxy Re-Encryption for Intelligent Customized Services
Intelligent customized services are required to meet the needs of users. Data concerning the user’s environment is needed more so the situation of the user can be determined for providing a highly reliable service. In order to collect a large amount of data, the Internet of Things (IoT), which connects numerous devices through the Internet, has been developed. Cloud computing is widely used for managing data efficiently, but can delay data transmission. Therefore, fog computing has been proposed. However, the method used to manage data securely in the cloud computing environment is not efficient in the fog computing environment. Moreover, data may contain personally sensitive information. Additionally, various stakeholders may exist in relation to the access authority of the information. In this respect, there can be many vulnerabilities and threats. In response, this study proposed a re-encryption technique for managing data securely in the fog computing environment. This technique allows a user to delegate the decryption authority to decrypt encrypted data using the re-encryption method in the proxy server for efficient communication.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Grid and Distributed Computing
International Journal of Grid and Distributed Computing COMPUTER SCIENCE, SOFTWARE ENGINEERING-
自引率
0.00%
发文量
0
期刊介绍: IJGDC aims to facilitate and support research related to control and automation technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of control and automation. To bridge the gap of users who do not have access to major databases where one should pay for every downloaded article; this online publication platform is open to all readers as part of our commitment to global scientific society. Journal Topics: -Architectures and Fabrics -Autonomic and Adaptive Systems -Cluster and Grid Integration -Creation and Management of Virtual Enterprises and Organizations -Dependable and Survivable Distributed Systems -Distributed and Large-Scale Data Access and Management -Distributed Multimedia Systems -Distributed Trust Management -eScience and eBusiness Applications -Fuzzy Algorithm -Grid Economy and Business Models -Histogram Methodology -Image or Speech Filtering -Image or Speech Recognition -Information Services -Large-Scale Group Communication -Metadata, Ontologies, and Provenance -Middleware and Toolkits -Monitoring, Management and Organization Tools -Networking and Security -Novel Distributed Applications -Performance Measurement and Modeling -Pervasive Computing -Problem Solving Environments -Programming Models, Tools and Environments -QoS and resource management -Real-time and Embedded Systems -Security and Trust in Grid and Distributed Systems -Sensor Networks -Utility Computing on Global Grids -Web Services and Service-Oriented Architecture -Wireless and Mobile Ad Hoc Networks -Workflow and Multi-agent Systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信