Abstract
One of the most beneficial uses of the Internet of Things in cloud is data sharing. As tempting since this technology is, data security is still one of the issues it faces, as inappropriate data usage may lead to a range of issues. We offer a proxy re-encryption strategy to securely exchange data in cloud contexts in this paper. Data owners can utilize identity-based encryption to send encrypted data to the cloud, and legitimate users can access the data via proxy re-encryption. Because IoT devices have limited resources, an edge device functions as a proxy server to do complex calculations. We also make effective use of information-centric networking capabilities to supply cached data in the proxy, resulting in better service quality and more network capacity. Our system also uses block chain, a revolutionary technology that allows for decentralized data sharing. It improves centralized system efficiency and enables fine-grained data access control. The security analysis and assessment of our system show that it has the potential to offer privacy protection, authenticity, and dependability.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.