2020
DOI: 10.1109/access.2020.2984317
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Lightweight Proxy Re-Encryption Scheme for Secure Fog-to-Things Environment

Abstract: Fog computing is a promising paradigm that can mitigate the heavy burden on cloud-central processing of the vast amount of IoT data. Although fog computing has the advantages of low latency, storage, and computing resources that serve IoT applications and things, it hardly suffers from security and privacy challenges. Proxy re-encryption (PRE) is an effective cryptographic solution to ensure the security of fog-to-things communication. However, in PRE schemes, the problem of a processing delay caused by offloa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 45 publications
(25 citation statements)
references
References 47 publications
0
25
0
Order By: Relevance
“…In [21], another system combines generalized Feistel structure (GFS) with "AND", "Rotation", and "XOR" (ARX) operations. In [22], a hybrid encryption scheme with a 128-bit key is proposed, which encrypts and decrypts the data collected by the fog node. In [23], another system is proposed, which uses a method based on dynamic key alteration to report the results of encrypted text files.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In [21], another system combines generalized Feistel structure (GFS) with "AND", "Rotation", and "XOR" (ARX) operations. In [22], a hybrid encryption scheme with a 128-bit key is proposed, which encrypts and decrypts the data collected by the fog node. In [23], another system is proposed, which uses a method based on dynamic key alteration to report the results of encrypted text files.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Traditional symmetric encryption and public key encryption are generally extended to support a lightweight cryptographic protocol in many applications. For example, Khashan et al [1] recently proposed a hybrid proxy reencryption (PRE) scheme that combines lightweight symmetric encryption and asymmetric encryption algorithms to render cryptographic functions for resource-limited end user nodes. The proposed PRE scheme is communicated with fog node in a secure manner.…”
Section: Traditional Symmetric and Public Key Encryptionmentioning
confidence: 99%
“…give it to a third party or even publish it). As soon as the key is released the security is potentially compromised [20]. On the other hand, the asymmetric encryption is not the best candidate for practical implementation due to the high computational and communication overheads [21].…”
Section: Introductionmentioning
confidence: 99%
“…They can greatly reduce the key management complexity for data owners and users and enforce secure access control by allowing them to obtain their secret keys from a private key generator (PKG) using a secure key generation protocol. However, these encryption techniques use asymmetric encryption to encrypt and decrypt the communication between users and the cloud server, which leads to significant computational complexity [20,26].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation