Abstract

Data sharing has emerged as one of the Internet of Things' most beneficial uses in cloud computing. Even though this technology has been visually appealing, one of its challenges is data security because improper usage of data can result in various harms. We suggest a safe data exchange method for cloud environments in this article: proxy re-encryption. Data owners can utilize identity-based encryption to send their encrypted data to the cloud, where it will be accessible to authorized users through proxy re- encryption construction. An edge device serves as a proxy server to manage demanding calculations since Internet of Things devices are resource- constrained. Additionally, by efficiently delivering cached content in the proxy and utilizing the capabilities of information-centric networking, we enhance service quality and optimize network bandwidth. Additionally, the foundation of our system concept is blockchain, a revolutionary technology that permits decentralization in data sharing. Fine-grained access control to data is achieved, and bottlenecks in centralized systems are lessened.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call