Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs

Proxy reencryption delegates encrypted data stored in a proxy to a third party. This proxy reencryption takes the form of one sender providing data to one receiver. However, this method incurs a significant overhead for both the sender and proxy as the number of users receiving the same data increas...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless communications and mobile computing 2022-06, Vol.2022, p.1-17
Hauptverfasser: Kim, Won-Bin, Kim, Su-Hyun, Seo, Daehee, Lee, Im-Yeong
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 17
container_issue
container_start_page 1
container_title Wireless communications and mobile computing
container_volume 2022
creator Kim, Won-Bin
Kim, Su-Hyun
Seo, Daehee
Lee, Im-Yeong
description Proxy reencryption delegates encrypted data stored in a proxy to a third party. This proxy reencryption takes the form of one sender providing data to one receiver. However, this method incurs a significant overhead for both the sender and proxy as the number of users receiving the same data increases. In addition, in a large-scale environment, such as an Internet of Things or big data environment, a scenario where several workers jointly create and own an output may exist. In such an environment, ownership disputes can arise when only one operator owns a piece data used by other operators. In this study, to solve this problem, we propose a technique in which multiple users can jointly own one piece of data, and multiple recipients can receive the same data through proxy reencryption.
doi_str_mv 10.1155/2022/1903197
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2687530267</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2687530267</sourcerecordid><originalsourceid>FETCH-LOGICAL-c294t-5ac4e0b84612b433c07d1826ec90da26e921da043b6a5d1ff8f144e70bc61cb33</originalsourceid><addsrcrecordid>eNp9kD1PwzAURS0EEqWw8QMsMUKoPxInGaFAqdSKCsocvTgOdZXGwXZU8u9JlYqR6b7h3Pukg9A1JfeURtGEEcYmNCWcpvEJGtGIkyARcXz6d4v0HF04tyWEcMLoCO2mynpdagleVco5PLOmbbA3eAl1hx-tgUKC83hlzU-H35Wqpe0ar03tcGksfgIP-GMDVtdffW0PtnB42VZeN5XCK-jXlcO6xnOzdpforITKqatjjtHny_N6-hos3mbz6cMikCwNfRCBDBXJk1BQloecSxIXNGFCyZQU0GfKaAEk5LmAqKBlmZQ0DFVMcimozDkfo5tht7Hmu1XOZ1vT2rp_mTGRxL0LJuKeuhsoaY1zVpVZY_UObJdRkh2EZgeh2VFoj98O-EbXBez1__Qv_WN1xQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2687530267</pqid></control><display><type>article</type><title>Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Wiley-Blackwell Open Access Titles</source><source>Alma/SFX Local Collection</source><creator>Kim, Won-Bin ; Kim, Su-Hyun ; Seo, Daehee ; Lee, Im-Yeong</creator><contributor>Huo, Yan ; Yan Huo</contributor><creatorcontrib>Kim, Won-Bin ; Kim, Su-Hyun ; Seo, Daehee ; Lee, Im-Yeong ; Huo, Yan ; Yan Huo</creatorcontrib><description>Proxy reencryption delegates encrypted data stored in a proxy to a third party. This proxy reencryption takes the form of one sender providing data to one receiver. However, this method incurs a significant overhead for both the sender and proxy as the number of users receiving the same data increases. In addition, in a large-scale environment, such as an Internet of Things or big data environment, a scenario where several workers jointly create and own an output may exist. In such an environment, ownership disputes can arise when only one operator owns a piece data used by other operators. In this study, to solve this problem, we propose a technique in which multiple users can jointly own one piece of data, and multiple recipients can receive the same data through proxy reencryption.</description><identifier>ISSN: 1530-8669</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1155/2022/1903197</identifier><language>eng</language><publisher>Oxford: Hindawi</publisher><subject>Algorithms ; Big Data ; Cloud computing ; Data encryption ; Data retrieval ; Information sharing ; Information technology ; Internet ; Internet of Things ; Methods</subject><ispartof>Wireless communications and mobile computing, 2022-06, Vol.2022, p.1-17</ispartof><rights>Copyright © 2022 Won-Bin Kim et al.</rights><rights>Copyright © 2022 Won-Bin Kim et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c294t-5ac4e0b84612b433c07d1826ec90da26e921da043b6a5d1ff8f144e70bc61cb33</cites><orcidid>0000-0002-6224-3273 ; 0000-0002-8856-0103</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><contributor>Huo, Yan</contributor><contributor>Yan Huo</contributor><creatorcontrib>Kim, Won-Bin</creatorcontrib><creatorcontrib>Kim, Su-Hyun</creatorcontrib><creatorcontrib>Seo, Daehee</creatorcontrib><creatorcontrib>Lee, Im-Yeong</creatorcontrib><title>Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs</title><title>Wireless communications and mobile computing</title><description>Proxy reencryption delegates encrypted data stored in a proxy to a third party. This proxy reencryption takes the form of one sender providing data to one receiver. However, this method incurs a significant overhead for both the sender and proxy as the number of users receiving the same data increases. In addition, in a large-scale environment, such as an Internet of Things or big data environment, a scenario where several workers jointly create and own an output may exist. In such an environment, ownership disputes can arise when only one operator owns a piece data used by other operators. In this study, to solve this problem, we propose a technique in which multiple users can jointly own one piece of data, and multiple recipients can receive the same data through proxy reencryption.</description><subject>Algorithms</subject><subject>Big Data</subject><subject>Cloud computing</subject><subject>Data encryption</subject><subject>Data retrieval</subject><subject>Information sharing</subject><subject>Information technology</subject><subject>Internet</subject><subject>Internet of Things</subject><subject>Methods</subject><issn>1530-8669</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kD1PwzAURS0EEqWw8QMsMUKoPxInGaFAqdSKCsocvTgOdZXGwXZU8u9JlYqR6b7h3Pukg9A1JfeURtGEEcYmNCWcpvEJGtGIkyARcXz6d4v0HF04tyWEcMLoCO2mynpdagleVco5PLOmbbA3eAl1hx-tgUKC83hlzU-H35Wqpe0ar03tcGksfgIP-GMDVtdffW0PtnB42VZeN5XCK-jXlcO6xnOzdpforITKqatjjtHny_N6-hos3mbz6cMikCwNfRCBDBXJk1BQloecSxIXNGFCyZQU0GfKaAEk5LmAqKBlmZQ0DFVMcimozDkfo5tht7Hmu1XOZ1vT2rp_mTGRxL0LJuKeuhsoaY1zVpVZY_UObJdRkh2EZgeh2VFoj98O-EbXBez1__Qv_WN1xQ</recordid><startdate>20220629</startdate><enddate>20220629</enddate><creator>Kim, Won-Bin</creator><creator>Kim, Su-Hyun</creator><creator>Seo, Daehee</creator><creator>Lee, Im-Yeong</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-6224-3273</orcidid><orcidid>https://orcid.org/0000-0002-8856-0103</orcidid></search><sort><creationdate>20220629</creationdate><title>Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs</title><author>Kim, Won-Bin ; Kim, Su-Hyun ; Seo, Daehee ; Lee, Im-Yeong</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c294t-5ac4e0b84612b433c07d1826ec90da26e921da043b6a5d1ff8f144e70bc61cb33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>Big Data</topic><topic>Cloud computing</topic><topic>Data encryption</topic><topic>Data retrieval</topic><topic>Information sharing</topic><topic>Information technology</topic><topic>Internet</topic><topic>Internet of Things</topic><topic>Methods</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kim, Won-Bin</creatorcontrib><creatorcontrib>Kim, Su-Hyun</creatorcontrib><creatorcontrib>Seo, Daehee</creatorcontrib><creatorcontrib>Lee, Im-Yeong</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kim, Won-Bin</au><au>Kim, Su-Hyun</au><au>Seo, Daehee</au><au>Lee, Im-Yeong</au><au>Huo, Yan</au><au>Yan Huo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs</atitle><jtitle>Wireless communications and mobile computing</jtitle><date>2022-06-29</date><risdate>2022</risdate><volume>2022</volume><spage>1</spage><epage>17</epage><pages>1-17</pages><issn>1530-8669</issn><eissn>1530-8677</eissn><abstract>Proxy reencryption delegates encrypted data stored in a proxy to a third party. This proxy reencryption takes the form of one sender providing data to one receiver. However, this method incurs a significant overhead for both the sender and proxy as the number of users receiving the same data increases. In addition, in a large-scale environment, such as an Internet of Things or big data environment, a scenario where several workers jointly create and own an output may exist. In such an environment, ownership disputes can arise when only one operator owns a piece data used by other operators. In this study, to solve this problem, we propose a technique in which multiple users can jointly own one piece of data, and multiple recipients can receive the same data through proxy reencryption.</abstract><cop>Oxford</cop><pub>Hindawi</pub><doi>10.1155/2022/1903197</doi><tpages>17</tpages><orcidid>https://orcid.org/0000-0002-6224-3273</orcidid><orcidid>https://orcid.org/0000-0002-8856-0103</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1530-8669
ispartof Wireless communications and mobile computing, 2022-06, Vol.2022, p.1-17
issn 1530-8669
1530-8677
language eng
recordid cdi_proquest_journals_2687530267
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Wiley-Blackwell Open Access Titles; Alma/SFX Local Collection
subjects Algorithms
Big Data
Cloud computing
Data encryption
Data retrieval
Information sharing
Information technology
Internet
Internet of Things
Methods
title Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T05%3A36%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Certificateless%20Group%20to%20Many%20Broadcast%20Proxy%20Reencryptions%20for%20Data%20Sharing%20towards%20Multiple%20Parties%20in%20IoTs&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Kim,%20Won-Bin&rft.date=2022-06-29&rft.volume=2022&rft.spage=1&rft.epage=17&rft.pages=1-17&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1155/2022/1903197&rft_dat=%3Cproquest_cross%3E2687530267%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2687530267&rft_id=info:pmid/&rfr_iscdi=true