Internet of Things Security Design Based on Blockchain and Identity Re-encryption

Authors

  • Lin Yang College of Artificial Intelligence and Big Data, Zibo Vocational Institute, Zibo, 255000, China

DOI:

https://doi.org/10.13052/jcsm2245-1439.1332

Keywords:

Internet of Things, blockchain, data security, algorithm re-encryption algorithm, data sharing

Abstract

With the development of IoT technology, IoT devices have penetrated various fields, such as smart homes, industrial automation, healthcare, etc. However, the security issues of IoT devices have always troubled people. Attackers can use various means to attack IoT devices, such as stealing data, tampering with programs, malware infection, etc. These attack methods will bring great losses to users. In response to the above issues, this study uses proxy re-encryption technology to transform data collected by IoT devices into ciphertext. Then, it stores the encrypted IoT data on the blockchain. The combination of blockchain and proxy re-encryption technologies offers a method for the secure sharing of IoT data. The experimental results show that whether the algorithm encrypts a small or large amount of data, the encryption time is relatively short, and the time consumption does not exceed 15 ms. When encrypting 8196 bytes of data, its encryption time is 50% lower than the Attribute-Based Encryption (ABE) algorithm. The proposed IoT data security sharing method has the advantages of high security, fast encryption speed, and good stability, which helps to improve the security performance of the IoT and provides a new approach to IoT security.

Downloads

Download data is not yet available.

Author Biography

Lin Yang, College of Artificial Intelligence and Big Data, Zibo Vocational Institute, Zibo, 255000, China

Lin Yang graduated from Shandong University of Technology with a major in Computer Science and Technology in 2005. In 2010, he obtained a master’s degree in Software Engineering from the University of Electronic Science and Technology. He is currently an associate professor at the School of Artificial Intelligence and Big Data at Zibo Vocational Institute. His technical expertises include computer communication technology, network security, Internet of Things (IoT) technology, and cryptography.

References

Mahmood T, Ali Z. Prioritized muirhead mean aggregation operators under the complex single-valued neutrosophic settings and their application in multi-attribute decision-making. Journal of Computational and Cognitive Engineering, 2022, 1(2): 56–73.

Zhang J. Analysis of Security Access Control Systems in Fog Computing Environment. Journal of Cyber Security and Mobility, 2023: 653–674.

Waziri T A, Ibrahim A. Discrete Fix Up Limit Model of a Device Unit. Journal of Computational and Cognitive Engineering, 2022, 2(2): 163–167.

Hassan K M A, Madkour M A, Nouh S A E H. A Realtime Adaptive Trust Model Based on Artificial Neural Networks for Wireless Sensor Networks. Journal of Cyber Security and Mobility, 2023: 519–546.

Al-Hamido R K. A new neutrosophic algebraic structures. Journal of Computational and Cognitive Engineering, 2023, 2(2): 150–154.

Tsang Y P, Wu C H, Ip W H, & Shiau, W. L. Exploring the intellectual cores of the blockchain–Internet of Things (BIoT). Journal of Enterprise Information Management, 2021, 34(5): 1287–1317.

Cruz A. Convergence between Blockchain and the Internet of Things. International Journal of Technology, Innovation and Management (IJTIM), 2021, 1(1): 34–53.

Sekar S, Solayappan A, Srimathi J, Raja, S., Durga, S., Manoharan, P., … and Tunze, G. B. Autonomous transaction model for e-commerce management using blockchain technology. International Journal of Information Technology and Web Engineering (IJITWE), 2022, 17(1): 1–14.

Kumar P, Kumar R, Srivastava G, Gupta, G. P., Tripathi, R., Gadekallu, T. R., and Xiong, N. N. PPSF: A privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Transactions on Network Science and Engineering, 2021, 8(3): 2326–2341.

Mothukuri V, Khare P, Parizi R M, Pouriyeh, S., Dehghantanha, A., and Srivastava, G. Federated-learning-based anomaly detection for IoT security attacks. IEEE Internet of Things Journal, 2021, 9(4): 2545–2554.

Deng H, Zhang J, Qin Z, Wu, Q., Yin, H., and Castiglione, A. Policy-based broadcast access authorization for flexible data sharing in clouds. IEEE Transactions on Dependable and Secure Computing, 2021, 19(5): 3024–3037.

He J, Zheng D, Guo R, Chen, Y., Li, K., and Tao, X. Efficient identity-based proxy re-encryption scheme in blockchain-assisted decentralized storage system. International Journal of Network Security, 2021, 23(5): 776–790.

Zhang C, Xu Y, Hu Y, Wu, J., Ren, J., and Zhang, Y. A blockchain-based multi-cloud storage data auditing scheme to locate faults. IEEE Transactions on Cloud Computing, 2021, 10(4): 2252–2263.

Karthika A, Muthukumaran N. An ADS-PAYG approach using trust factor Against economic denial of sustainability attacks in cloud storage. Wireless Personal Communications, 2022, 122(1): 69–85.

Jiang T, Meng W, Yuan X, Wang, L., Ge, J., and Ma, ReliableBox: Secure and verifiable cloud storage with location-aware backup. IEEE Transactions on Parallel and Distributed Systems, 2021, 32(12): 2996–3010.

Mohan P, Sundaram M, Satpathy S, and Das, S. An efficient technique for cloud storage using secured de-duplication algorithm. Journal of Intelligent & Fuzzy Systems, 2021, 41(2): 2969–2980.

Mohiyuddin A, Javed A R, Chakraborty C, Chakraborty, C., Rizwan, M., Shabbir, M., and Nebhen, J. Secure cloud storage for medical IoT data using adaptive neuro-fuzzy inference system. International Journal of Fuzzy Systems, 2022, 24(2): 1203–1215.

Wang F, Wang J, Shi S. Efficient data sharing with privacy preservation over lattices for secure cloud storage. IEEE Systems Journal, 2021, 16(2): 2507–2517.

Elangovan P, Sumalatha M R. Weight based deduplication for minimizing data replication in public cloud storage. Journal of Scientific & Industrial Research, 2021, 80(3): 260–269.

Lv Z, Lou R, Li J, Singh, A. K., and Song, H. Big data analytics for 6G-enabled massive internet of things. IEEE Internet of Things Journal, 2021, 8(7): 5350–5359.

Azrour M, Mabrouki J, Guezzaz A, Guezzaz, A., and Farhaoui, Y. New enhanced authentication protocol for internet of things. Big Data Mining and Analytics, 2021, 4(1): 1–9.

Lee E, Seo Y D, Oh S R, and Kim, Y. G. A Survey on Standards for Interoperability and Security in the Internet of Things. IEEE Communications Surveys & Tutorials, 2021, 23(2): 1020–1047.

Downloads

Published

2024-04-09

How to Cite

1.
Yang L. Internet of Things Security Design Based on Blockchain and Identity Re-encryption. JCSANDM [Internet]. 2024 Apr. 9 [cited 2024 Jul. 25];13(03):369-92. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/24395

Issue

Section

EIC Select