A proxy Re-Encryption Technique to fortify Data Collection in IOT based on Blockchain

  • Unique Paper ID: 156303
  • Volume: 9
  • Issue: 3
  • PageNo: 332-335
  • Abstract:
  • The evolution of the Internet of Things has seen data sharing as one of its most useful applications in cloud computing. As eye-catching as this technology has been, data security remains one of the obstacles it faces since the wrongful use of data leads to several damages. In this article, we propose a proxy re-encryption approach to secure data sharing in cloud environments. Data owners can outsource their encrypted data to the cloud using identity-based encryption, while proxy re-encryption construction will grant legitimate users access to the data. With the Internet of Things devices being resource-constrained, an edge device acts as a proxy server to handle intensive computations. Also, we make use of the features of information-centric networking to deliver cached content in the proxy effectively, thus improving the quality of service and making good use of the network bandwidth. Further, our system model is based on blockchain, a disruptive technology that enables decentralization in data sharing. It mitigates the bottlenecks in centralized systems and achieves fifine-grained access control to data. The security analysis and evaluation of our scheme show the promise of our approach in ensuring data confifidentiality, integrity, and security.

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{156303,
        author = {Seemitha Prasasd S and Kumar M and Yuvraj M and Anupama PV and Dr. Aruna MG and Dr. Malatesh SH},
        title = {A proxy Re-Encryption Technique to fortify Data Collection in IOT based on Blockchain },
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {9},
        number = {3},
        pages = {332-335},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=156303},
        abstract = {The evolution of the Internet of Things has seen data sharing as one of its most useful applications in cloud computing. As eye-catching as this technology has been, data security remains one of the obstacles it faces since the wrongful use of data leads to several damages. In this article, we propose a proxy re-encryption approach to secure data sharing in cloud environments. Data owners can outsource their encrypted data to the cloud using identity-based encryption, while proxy re-encryption construction will grant legitimate users access to the data. With the Internet of Things devices being resource-constrained, an edge device acts as a proxy server to handle intensive computations. Also, we make use of the features of information-centric networking to deliver cached content in the proxy effectively, thus improving the quality of service and making good use of the network bandwidth. Further, our system model is based on blockchain, a disruptive technology that enables decentralization in data sharing. It mitigates the bottlenecks in centralized systems and achieves fifine-grained access control to data. The security analysis and evaluation of our scheme show the promise of our approach in ensuring data confifidentiality, integrity, and security.},
        keywords = {},
        month = {},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 9
  • Issue: 3
  • PageNo: 332-335

A proxy Re-Encryption Technique to fortify Data Collection in IOT based on Blockchain

Related Articles