[PDF][PDF] Research on node authorization trusted update mechanism based on agent re-encryption in IoT cloud

S Li, Q Sun, H Wu - … Journal of Innovative Computing, Information and …, 2020 - ijicic.org
This paper describes a trusted update mechanism of node authorization based on proxy re-
encrypted in IoT cloud. It defines that the system consists of IoT data server, node …

PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT

M Su, B Zhou, A Fu, Y Yu, G Zhang - Information Sciences, 2020 - Elsevier
In CloudIoT platform, the data is collected and shared by different nodes of Internet of Things
(IoT), and data is processed and stored based on cloud servers. It has increased the abilities …

A threshold proxy re-encryption scheme for secure IoT data sharing based on blockchain

Y Chen, B Hu, H Yu, Z Duan, J Huang - Electronics, 2021 - mdpi.com
The IoT devices deployed in various application scenarios will generate massive data with
immeasurable value every day. These data often contain the user's personal privacy …

Secure multicast using proxy re-encryption in IoT environment

SH Kim, IY Lee - Advances in Computer Science and Ubiquitous …, 2018 - Springer
It appears that interest in the Internet of things (IoT) has recently reached its peak, with a
great deal of focus from both the private and public sectors. IoT, a technology that enables …

[HTML][HTML] Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain

A Manzoor, A Braeken, SS Kanhere, M Ylianttila… - Journal of Network and …, 2021 - Elsevier
Data is central to the Internet of Things (IoT) ecosystem. With billions of devices connected,
most of the current IoT systems are using centralized cloud-based data sharing systems …

Management of IoT devices data security using blockchain and proxy re-encryption algorithm

N Mahamuni, H Nikam, G Pattewar, O Loka… - … Conference on Emerging …, 2022 - Springer
One of the most beneficial uses of the Internet of Things in cloud is data sharing. As tempting
since this technology is, data security is still one of the issues it faces, as inappropriate data …

The new method of sensor data privacy protection for IoT

Y Wu, L Song, L Liu - Shock and Vibration, 2021 - Wiley Online Library
This article introduces the new method of sensor data privacy protection method for IoT.
Asymmetric encryption is used to verify the identity of the gateway by the sensor. The IoT …

A Proxy Re-encryption Scheme of Medical Data Sharing Based on Consortium Blockchain

J Li, X Zhang, Z Chu - CCF China Blockchain Conference, 2022 - Springer
In order to solve the problem of sharing medical data among different hospitals, this paper
proposes a multi-party secure sharing scheme of medical information based on a …

An improved proxy Re-encryption scheme for IoT-based data outsourcing services in clouds

HY Lin, YM Hung - Sensors, 2020 - mdpi.com
IoT-based data outsourcing services in clouds could be regarded as a new trend in recent
years, as they could reduce the hardware and software cost for enterprises and obtain …

[PDF][PDF] IMPLEMENTATION OF A PROXY REENCRYPTION METHOD FOR SECURE DATA SHARING USING BLOCKCHAIN

JJ KURIL, HR VYAWAHARE - academia.edu
Data sharing is important IoT application in cloud computing. Unauthorized data use is a
major issue with this technology, and the consequences can be disastrous. This article …