Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs
Proxy reencryption delegates encrypted data stored in a proxy to a third party. This proxy reencryption takes the form of one sender providing data to one receiver. However, this method incurs a significant overhead for both the sender and proxy as the number of users receiving the same data increas...
Gespeichert in:
Veröffentlicht in: | Wireless communications and mobile computing 2022-06, Vol.2022, p.1-17 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 17 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | Wireless communications and mobile computing |
container_volume | 2022 |
creator | Kim, Won-Bin Kim, Su-Hyun Seo, Daehee Lee, Im-Yeong |
description | Proxy reencryption delegates encrypted data stored in a proxy to a third party. This proxy reencryption takes the form of one sender providing data to one receiver. However, this method incurs a significant overhead for both the sender and proxy as the number of users receiving the same data increases. In addition, in a large-scale environment, such as an Internet of Things or big data environment, a scenario where several workers jointly create and own an output may exist. In such an environment, ownership disputes can arise when only one operator owns a piece data used by other operators. In this study, to solve this problem, we propose a technique in which multiple users can jointly own one piece of data, and multiple recipients can receive the same data through proxy reencryption. |
doi_str_mv | 10.1155/2022/1903197 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2687530267</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2687530267</sourcerecordid><originalsourceid>FETCH-LOGICAL-c294t-5ac4e0b84612b433c07d1826ec90da26e921da043b6a5d1ff8f144e70bc61cb33</originalsourceid><addsrcrecordid>eNp9kD1PwzAURS0EEqWw8QMsMUKoPxInGaFAqdSKCsocvTgOdZXGwXZU8u9JlYqR6b7h3Pukg9A1JfeURtGEEcYmNCWcpvEJGtGIkyARcXz6d4v0HF04tyWEcMLoCO2mynpdagleVco5PLOmbbA3eAl1hx-tgUKC83hlzU-H35Wqpe0ar03tcGksfgIP-GMDVtdffW0PtnB42VZeN5XCK-jXlcO6xnOzdpforITKqatjjtHny_N6-hos3mbz6cMikCwNfRCBDBXJk1BQloecSxIXNGFCyZQU0GfKaAEk5LmAqKBlmZQ0DFVMcimozDkfo5tht7Hmu1XOZ1vT2rp_mTGRxL0LJuKeuhsoaY1zVpVZY_UObJdRkh2EZgeh2VFoj98O-EbXBez1__Qv_WN1xQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2687530267</pqid></control><display><type>article</type><title>Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Wiley-Blackwell Open Access Titles</source><source>Alma/SFX Local Collection</source><creator>Kim, Won-Bin ; Kim, Su-Hyun ; Seo, Daehee ; Lee, Im-Yeong</creator><contributor>Huo, Yan ; Yan Huo</contributor><creatorcontrib>Kim, Won-Bin ; Kim, Su-Hyun ; Seo, Daehee ; Lee, Im-Yeong ; Huo, Yan ; Yan Huo</creatorcontrib><description>Proxy reencryption delegates encrypted data stored in a proxy to a third party. This proxy reencryption takes the form of one sender providing data to one receiver. However, this method incurs a significant overhead for both the sender and proxy as the number of users receiving the same data increases. In addition, in a large-scale environment, such as an Internet of Things or big data environment, a scenario where several workers jointly create and own an output may exist. In such an environment, ownership disputes can arise when only one operator owns a piece data used by other operators. In this study, to solve this problem, we propose a technique in which multiple users can jointly own one piece of data, and multiple recipients can receive the same data through proxy reencryption.</description><identifier>ISSN: 1530-8669</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1155/2022/1903197</identifier><language>eng</language><publisher>Oxford: Hindawi</publisher><subject>Algorithms ; Big Data ; Cloud computing ; Data encryption ; Data retrieval ; Information sharing ; Information technology ; Internet ; Internet of Things ; Methods</subject><ispartof>Wireless communications and mobile computing, 2022-06, Vol.2022, p.1-17</ispartof><rights>Copyright © 2022 Won-Bin Kim et al.</rights><rights>Copyright © 2022 Won-Bin Kim et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c294t-5ac4e0b84612b433c07d1826ec90da26e921da043b6a5d1ff8f144e70bc61cb33</cites><orcidid>0000-0002-6224-3273 ; 0000-0002-8856-0103</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><contributor>Huo, Yan</contributor><contributor>Yan Huo</contributor><creatorcontrib>Kim, Won-Bin</creatorcontrib><creatorcontrib>Kim, Su-Hyun</creatorcontrib><creatorcontrib>Seo, Daehee</creatorcontrib><creatorcontrib>Lee, Im-Yeong</creatorcontrib><title>Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs</title><title>Wireless communications and mobile computing</title><description>Proxy reencryption delegates encrypted data stored in a proxy to a third party. This proxy reencryption takes the form of one sender providing data to one receiver. However, this method incurs a significant overhead for both the sender and proxy as the number of users receiving the same data increases. In addition, in a large-scale environment, such as an Internet of Things or big data environment, a scenario where several workers jointly create and own an output may exist. In such an environment, ownership disputes can arise when only one operator owns a piece data used by other operators. In this study, to solve this problem, we propose a technique in which multiple users can jointly own one piece of data, and multiple recipients can receive the same data through proxy reencryption.</description><subject>Algorithms</subject><subject>Big Data</subject><subject>Cloud computing</subject><subject>Data encryption</subject><subject>Data retrieval</subject><subject>Information sharing</subject><subject>Information technology</subject><subject>Internet</subject><subject>Internet of Things</subject><subject>Methods</subject><issn>1530-8669</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kD1PwzAURS0EEqWw8QMsMUKoPxInGaFAqdSKCsocvTgOdZXGwXZU8u9JlYqR6b7h3Pukg9A1JfeURtGEEcYmNCWcpvEJGtGIkyARcXz6d4v0HF04tyWEcMLoCO2mynpdagleVco5PLOmbbA3eAl1hx-tgUKC83hlzU-H35Wqpe0ar03tcGksfgIP-GMDVtdffW0PtnB42VZeN5XCK-jXlcO6xnOzdpforITKqatjjtHny_N6-hos3mbz6cMikCwNfRCBDBXJk1BQloecSxIXNGFCyZQU0GfKaAEk5LmAqKBlmZQ0DFVMcimozDkfo5tht7Hmu1XOZ1vT2rp_mTGRxL0LJuKeuhsoaY1zVpVZY_UObJdRkh2EZgeh2VFoj98O-EbXBez1__Qv_WN1xQ</recordid><startdate>20220629</startdate><enddate>20220629</enddate><creator>Kim, Won-Bin</creator><creator>Kim, Su-Hyun</creator><creator>Seo, Daehee</creator><creator>Lee, Im-Yeong</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-6224-3273</orcidid><orcidid>https://orcid.org/0000-0002-8856-0103</orcidid></search><sort><creationdate>20220629</creationdate><title>Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs</title><author>Kim, Won-Bin ; Kim, Su-Hyun ; Seo, Daehee ; Lee, Im-Yeong</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c294t-5ac4e0b84612b433c07d1826ec90da26e921da043b6a5d1ff8f144e70bc61cb33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>Big Data</topic><topic>Cloud computing</topic><topic>Data encryption</topic><topic>Data retrieval</topic><topic>Information sharing</topic><topic>Information technology</topic><topic>Internet</topic><topic>Internet of Things</topic><topic>Methods</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kim, Won-Bin</creatorcontrib><creatorcontrib>Kim, Su-Hyun</creatorcontrib><creatorcontrib>Seo, Daehee</creatorcontrib><creatorcontrib>Lee, Im-Yeong</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kim, Won-Bin</au><au>Kim, Su-Hyun</au><au>Seo, Daehee</au><au>Lee, Im-Yeong</au><au>Huo, Yan</au><au>Yan Huo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs</atitle><jtitle>Wireless communications and mobile computing</jtitle><date>2022-06-29</date><risdate>2022</risdate><volume>2022</volume><spage>1</spage><epage>17</epage><pages>1-17</pages><issn>1530-8669</issn><eissn>1530-8677</eissn><abstract>Proxy reencryption delegates encrypted data stored in a proxy to a third party. This proxy reencryption takes the form of one sender providing data to one receiver. However, this method incurs a significant overhead for both the sender and proxy as the number of users receiving the same data increases. In addition, in a large-scale environment, such as an Internet of Things or big data environment, a scenario where several workers jointly create and own an output may exist. In such an environment, ownership disputes can arise when only one operator owns a piece data used by other operators. In this study, to solve this problem, we propose a technique in which multiple users can jointly own one piece of data, and multiple recipients can receive the same data through proxy reencryption.</abstract><cop>Oxford</cop><pub>Hindawi</pub><doi>10.1155/2022/1903197</doi><tpages>17</tpages><orcidid>https://orcid.org/0000-0002-6224-3273</orcidid><orcidid>https://orcid.org/0000-0002-8856-0103</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1530-8669 |
ispartof | Wireless communications and mobile computing, 2022-06, Vol.2022, p.1-17 |
issn | 1530-8669 1530-8677 |
language | eng |
recordid | cdi_proquest_journals_2687530267 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Wiley-Blackwell Open Access Titles; Alma/SFX Local Collection |
subjects | Algorithms Big Data Cloud computing Data encryption Data retrieval Information sharing Information technology Internet Internet of Things Methods |
title | Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T05%3A36%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Certificateless%20Group%20to%20Many%20Broadcast%20Proxy%20Reencryptions%20for%20Data%20Sharing%20towards%20Multiple%20Parties%20in%20IoTs&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Kim,%20Won-Bin&rft.date=2022-06-29&rft.volume=2022&rft.spage=1&rft.epage=17&rft.pages=1-17&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1155/2022/1903197&rft_dat=%3Cproquest_cross%3E2687530267%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2687530267&rft_id=info:pmid/&rfr_iscdi=true |