Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments
Abstract
:1. Introduction
1.1. Related Works
1.2. Motivation and Contributions
2. Preliminaries
2.1. Bilinear Pairing
- (i)
- Bilinearity:
- (ii)
- Non-degeneracy:
- (iii)
- Computability:
2.2. One-Way Hash Function
- (i)
- Irreversibility (One-way):
- (ii)
- Fixed-length output:
- (iii)
- Fast computation:
- (iv)
- Collision resistance:
- (v)
- Avalanche effect:
- -
- Decisional Bilinear Diffie–Hellman (DBDH) Problem
- -
- Decisional Bilinear Diffie–Hellman (DBDH) Assumption
3. Proposed IB-PRE-FCAK Scheme
3.1. Algorithms Definition
- -
- System Initialization (SI): Given the security parameter τ, it generates the public parameters (PP), the master secret key (Msk) and the master public key (Mpk) required for the system
- -
- Initial Private Key Generation (IPKG): Given the public parameters (PP), the master private key (Msk), and the identity of the user to be registered (IDu), it generates the initial private key (ipku) for the user.
- -
- Time-Update Key Generation (TUKG): Given the public parameters (PP), the master private key (Msk), the identity of the user to be registered (IDu), and the time period (n), it generates the time-update key (tuku, n) for the user.
- -
- Encryption: Given the parameters (PP), the time period (n), a symmetric key (Y), a plaintext (m), and the identity of data owner (IDO), it generates the encrypted ciphertext (CT).
- -
- Query: Given the identity of the data requester (IDR) and the file index (Fi) to be requested, it generates the corresponding query token (Θ).
- -
- Re-encryption Key Generation (RenKG): Given the parameters (PP), the query token (Θ), and data owner’s private key (skO, n), it generates the re-encryption key (renkO, n).
- -
- Re-encryption: Given the parameters (PP), the ID of the data requester (IDR), the re-encryption key (renkO, n) sent by the data owner, the file index (Fi), the identity of the data owner (IDO), and an original ciphertext (CT), it calculates the re-encrypted ciphertext (RCT).
- -
- Decryption: The decryption algorithm can be divided into two types: one is for the data owner to decrypt and the other is for the data requester to decrypt. Specifically, given the public parameters (PP), a user private key (skO, n or skR, n), and the ciphertext (CT) or the re-encrypted ciphertext (RCT), it calculates the symmetric key (Y) for deriving the original plaintext m.
3.2. Method Construction
- -
- System Initialization (SI(1τ))
- 1.
- G1 and G2 are two prime-order multiplicative groups of the order p, is a generator of G1 and e is a bilinear mapping function, i.e., e: G1 × G1 → G2.
- 2.
- H1, H2 and H3 are three collision-resistant hash functions, i.e., H1: {0, 1}* → G1, H2: {0, 1}* → G1 and H3: G2 → G1.
- 3.
- Msk is defined as arbitrarily selected from Zp* and the Mpk is calculated as .
- 4.
- are symmetric encryption and decryption functions, respectively.
- -
- Initial Private Key Generation (IPKG(PP, Msk, IDu))
- 1.
- PKG computes the initial private key and returns it to the user ;
- 2.
- The accuracy of the initial private key can be checked with the equation
- -
- Time-Update Key Generation (TUKG(PP, n, Msk, IDu))
- 1.
- User sends to the PKG;
- 2.
- PKG computes the time-update key and returns it to the user ;
- 3.
- The accuracy of the key can be checked with the equation
- 4.
- User can compute the complete private key by using the previously obtained as
- -
- Encryption(PP, n, Y, m, IDO)
- -
- Query(PP, Fi, IDR)
- -
- Re-encryption Key Generation (RenKG(PP, Θ, skO, n))
- -
- Re-encryption(PP, IDR, renKO, n, Fi, IDO, CT)
- -
- Decryption(CT, sku, n)
- 1.
- The data owner decrypts the ciphertext CT by calculating the symmetric key Y as:The correctness of Y is derived as follows:
- 2.
- The data requester
4. Security Proof and Comparison
4.1. Security Analysis and Proof
- Time Synchronization Issues: The scheme uses time-updated keys for user revocation. A solution to time synchronization issues is to introduce a tolerance window for time discrepancies across fog nodes and IoT devices. This allows nodes to remain synchronized within acceptable margins and can be further enhanced by employing distributed time synchronization protocols like the Network Time Protocol (NTP).
- Increased Computational Overhead: While proxy re-encryption can increase computational overhead, optimizing the encryption algorithm for lightweight IoT devices is essential. A potential approach is using hardware-accelerated cryptography or offloading heavy computations to fog nodes, reducing the burden on resource-constrained devices.
- Limited Key Lifespan: The scheme introduces time-updated keys, which must be periodically regenerated. To address the risk of frequent key renewal, extending key lifespan through efficient key management policies or using predictive analytics to minimize renewal intervals based on activity patterns can reduce the key-update overhead.
- Vulnerability to Replay Attacks: The system could mitigate replay attacks by introducing a nonce (a unique value) in each transaction, making each message or data exchange unique. This approach ensures that even if an attacker intercepts and resends a message, it will be rejected as the nonce has already been used.
- Increased Maintenance Requirements: Automating key management and revocation processes through smart contracts or decentralized identity management systems can help reduce the maintenance burden. These systems can track key usage, revocation, and renewal with minimal manual intervention.
- Risk of Key Exposure: To prevent key exposure, multi-factor authentication (MFA) and the use of hardware security modules (HSMs) to store sensitive keys can provide additional layers of protection. Additionally, key-splitting techniques, such as Shamir’s Secret Sharing, can distribute key fragments across multiple fog nodes, ensuring that exposure of one fragment does not compromise the entire key.
- -
- IPKG Query:
- -
- TUKG Query:
- -
- RenKG Query:
- 1.
- The IPKG query of the target identity cannot be made.
- 2.
- If is already a revoked user (and possesses the initial private key), then no TUKG queries for the target time period are allowed.
- 3.
- RenKG queries related to the target identity or cannot be executed.
- 4.
- The number of queries is limited by the maximum execution times of IPKG queries , TUKG queries , and RenKG queries .
- -
- H1(IDi || n) oracle:
- -
- H2(IDi) oracle:
- -
- IPKG Query:
- -
- TUKG Query:
- -
- RenKG Query:
4.2. Comparison
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Shen, J.; Zhou, T.; He, D.; Zhang, Y.; Sun, X.; Xiang, Y. Block design-based key agreement for group data sharing in cloud computing. IEEE Trans. Dependable Secur. Comput. 2019, 16, 996–1010. [Google Scholar] [CrossRef]
- Wang, S.; Hou, Y.; Gao, F.; Ji, X. A novel IoT access architecture for vehicle monitoring system. In Proceedings of the 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VI, USA, 12–14 December 2016; pp. 639–642. [Google Scholar] [CrossRef]
- Gupta, A.K.; Johari, R. IoT based electrical device surveillance and control system. In Proceedings of the 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), Ghaziabad, India, 18–19 April 2019; pp. 1–5. [Google Scholar] [CrossRef]
- Singh, S.; Singh, B.; Ramandeep; Singh, B.; Das, A. Automatic vehicle counting for IoT based smart traffic management system for Indian urban settings. In Proceedings of the 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), Ghaziabad, India, 18–19 April 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Dang, T.D.; Hoang, D. A data protection model for fog computing. In Proceedings of the 2017 2nd International Conference on Fog and Mobile Edge Computing (FMEC), Valencia, Spain, 8–11 May 2017; pp. 32–38. [Google Scholar] [CrossRef]
- De Donno, M.; Tange, K.; Dragoni, N. Foundations and evolution of modern computing paradigms: Cloud, IoT, edge, and fog, IEEE Access 2019, 7, 150936–150948. [CrossRef]
- Hameed, A.R.; Munir, K.; Islam, S.U.; Ahmad, I. Load-balancing of computing resources in vehicular fog computing. In Proceedings of the 2020 3rd International Conference on Data Intelligence and Security (ICDIS), South Padre Island, TX, USA, 10–12 November 2020; pp. 101–108. [Google Scholar] [CrossRef]
- Chu, C.K.; Tzeng, W.G. Identity-based proxy re-encryption without random oracles. In Proceedings of the International Conference on Information Security, Valparaíso, Chile, 9–12 October 2007; pp. 189–202. [Google Scholar] [CrossRef]
- S., sharma; Swarnakar, A.; Babu, C.J.; Padmavathy, R.; Kumar, R. An authenticated keyword searchable conditional proxy re-encryption scheme in cloud services. In Proceedings of the 2020 5th International Conference on Computing, Communication and Security (ICCCS), Patna, India, 14–16 October 2020; pp. 1–8. [Google Scholar] [CrossRef]
- Deng, R.H.; Weng, J.; Liu, S.; Chen, K. Chosen-ciphertext secure proxy re-encryption without pairings. In Proceedings of the International Conference on Cryptology and Network Security, Hong Kong, China, 2–4 December 2008; pp. 1–17. [Google Scholar] [CrossRef]
- Fang, L.; Susilo, W.; Ge, C.; Wang, J. Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search. Theor. Comput. Sci. 2012, 462, 39–58. [Google Scholar] [CrossRef]
- Green, M.; Ateniese, G. Identity-based proxy re-encryption. In Proceedings of the International Conference on Applied Cryptography and Network Security, Zhuhai, China, 5–8 June 2007; pp. 288–306. [Google Scholar] [CrossRef]
- Blaze, M.; Bleumer, G.; Strauss, M. Divertible protocols and atomic proxy cryptography. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Espoo, Finland, 31 May–4 June 1998; pp. 127–144. [Google Scholar] [CrossRef]
- Chen, X.; Li, J.; Weng, J.; Ma, J.; Lou, W. Verifiable computation over large database with incremental updates. IEEE Trans. Comput. 2016, 65, 3184–3195. [Google Scholar] [CrossRef]
- Bankar, J.; Raghatwan, J. Identity based proxy re-encryption using forward security in cloud framework. In Proceedings of the 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA), Pune, India, 17–18 August 2017; pp. 1–5. [Google Scholar] [CrossRef]
- Zeng, P.; Choo, K.-K.R. A new kind of conditional proxy re-encryption for secure cloud storage. IEEE Access 2018, 6, 70017–70024. [Google Scholar] [CrossRef]
- Yao, S.; Dayot, R.V.J.; Kim, H.J.; Ra, I.H. A novel revocable and identity-based conditional proxy re-encryption scheme with ciphertext evolution for secure cloud data sharing. IEEE Access 2021, 9, 42801–42816. [Google Scholar] [CrossRef]
- Yang, H.; Li, L.; Yang, C. A fine-grained certificateless conditional proxy broadcast re-encryption scheme without pairing. In Proceedings of the 2022 IEEE 10th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), Chongqing, China, 17–19 June 2022; pp. 1414–1423. [Google Scholar] [CrossRef]
- Chen, W.H.; Fan, C.I.; Tseng, Y.F. Efficient key-aggregate proxy re-encryption for secure data sharing in clouds. In Proceedings of the 2018 IEEE Conference on Dependable and Secure Computing (DSC), Kaohsiung, Taiwan, 10–13 December 2018; pp. 1–4. [Google Scholar] [CrossRef]
- Zhang, J.; Bai, W.; Wang, X. Identity-based data storage scheme with anonymous key generation in fog computing. Soft Comput. 2020, 24, 5561–5571. [Google Scholar] [CrossRef]
- Yang, C.C.; Tso, R.; Liu, Z.Y.; Hsu, J.C.; Tseng, Y.F. Improved proxy re-encryption scheme with equality test. In Proceedings of the 2021 16th Asia Joint Conference on Information Security (AsiaJCIS), Seoul, Republic of Korea, 19–20 August 2021; pp. 37–44. [Google Scholar] [CrossRef]
- Zhang, M.; Li, L. Medical data sharing scheme based on blockchain-based attribute proxy re-encryption. In Proceedings of the 2023 12th International Conference of Information and Communication Technology (ICTech), Wuhan, China, 14–16 April 2023; pp. 288–293. [Google Scholar] [CrossRef]
- Ge, C.; Susilo, W.; Baek, J.; Liu, Z.; Xia, J.; Fang, L. A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds. IEEE Trans. Dependable Secur. Comput. 2022, 19, 2907–2919. [Google Scholar] [CrossRef]
- Lin, H.Y.; Tsai, T.T.; Ting, P.Y.; Chen, C.C. An improved ID-based data storage scheme for fog-enabled IoT environments. Sensors 2022, 22, 4223. [Google Scholar] [CrossRef] [PubMed]
- Lin, H.Y.; Tsai, T.T.; Ting, P.Y.; Fan, Y.R. Identity-based proxy re-encryption scheme using fog computing and anonymous key generation. Sensors 2023, 23, 2706. [Google Scholar] [CrossRef] [PubMed]
- Han, J.; Susilo, W.; Mu, Y. Identity-based data storage in cloud computing. Future Gener. Comput. Syst. 2013, 29, 673–681. [Google Scholar] [CrossRef]
- Zhu, F.; Yi, X.; Abuadbba, A.; Khalil, I.; Nepal, S.; Huang, X. Cost-effective authenticated data redaction with privacy protection in IoT. IEEE Internet Things J. 2021, 8, 11678–11689. [Google Scholar] [CrossRef]
Scheme | HSM | ZBW | LTTC | LTTF | Proposed | |
---|---|---|---|---|---|---|
Item | ||||||
Support user revocation | No | Yes | Yes | Yes | Yes | |
Resist revoked user attack | − | − | Yes | Yes | Yes | |
Resist dishonest proxy server | Yes | No | Yes | Yes | Yes | |
Without user revocation list | − | No | No | No | Yes |
Scheme | HSM | ZBW | LTTC | LTTF | Proposed | |
---|---|---|---|---|---|---|
Phase | ||||||
System Initialization | 6C | 2C | 2C | C | C | |
Initial Private Key Generation | 5B + 5C | 5C | 5C | 3C | C | |
Time-Update Key Generation | n.a. | n.a. | n.a. | n.a. | C | |
Encryption | 3B + 3C + D | B + 2C + D | B + 2C + D | B + 2C | B + 2C | |
Query | 2C | C | C | C | C | |
Re-encryption Key Generation | 5B + 4C + D | 2C | 2B + 3C + D | 2B + 3C | 2B + 3C | |
Re-encryption | 0 | B | B | B | B | |
Decryption (by IDo) | 2B | 2B | 2B | B | B | |
Decryption (by IDu) | 2B + 2C | 2B + C | 4B + D | 3B + D | 3B + D |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lin, H.-Y.; Chen, P.-R. Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments. Sensors 2024, 24, 6290. https://doi.org/10.3390/s24196290
Lin H-Y, Chen P-R. Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments. Sensors. 2024; 24(19):6290. https://doi.org/10.3390/s24196290
Chicago/Turabian StyleLin, Han-Yu, and Pei-Ru Chen. 2024. "Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments" Sensors 24, no. 19: 6290. https://doi.org/10.3390/s24196290
APA StyleLin, H. -Y., & Chen, P. -R. (2024). Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments. Sensors, 24(19), 6290. https://doi.org/10.3390/s24196290