In light of the existing security vulnerabilities within IoT publish-subscribe systems, our study introduces an improved end-to-end encryption approach using conditional proxy re-encryption. This method not only overcomes limitations associated with the reliance on a trusted authority and the challenge of reliably revoking users in previous proxy re-encryption frameworks, but also strengthens data privacy against potential collusion between the broker and subscribers. Through our innovative encryption protocol, unauthorized re-encryption by brokers is effectively prevented, enhancing secure communication between publisher and subscriber. Implemented on HiveMQ, an open-source MQTT platform, our prototype system demonstrates significant enhancements. Comparison to the state-of-the-art end-to-end encryption work, encryption overhead of our scheme is comparable to it, and the decryption cost is approximately half of it. Moreover, our solution significantly improves overall security without compromising the asynchronous communication and decentralized authorization foundational to the publish-subscribe model.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11154409PMC
http://dx.doi.org/10.3390/s24020438DOI Listing

Publication Analysis

Top Keywords

proxy re-encryption
12
conditional proxy
8
end-to-end encryption
8
end-to-end encrypted
4
encrypted message
4
message distribution
4
distribution system
4
system internet
4
internet things
4
things based
4

Similar Publications

Electronic Health Records Sharing Based on Consortium Blockchain.

J Med Syst

November 2024

Department of Electronic Engineering, City University of Hong Kong, 999077, Kowloon Tong, Hong Kong.

In recent years, Electronic health records (EHR) has gradually become the mainstream in the healthcare field. However, due to the fact that EHR systems are provided by different vendors, data is dispersed and stored, which leads to the phenomenon of data silos, making medical information too fragmented and bringing some challenges to current medical services. Therefore, in view of the difficulties in sharing EHR between medical institutions, the risk of privacy leakage, and the lack of EHR usage control by patients, an EHR sharing model based on consortium blockchain is proposed in this paper.

View Article and Find Full Text PDF

Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments.

Sensors (Basel)

September 2024

Department of Computer Science and Engineering, National Taiwan Ocean University, Keelung 202, Taiwan.

As technology advances rapidly, a diverse array of Internet of Things (IoT) devices finds widespread application across numerous fields. The intelligent nature of these devices not only gives people more convenience, but also introduces new challenges especially in security when transmitting data in fog-based cloud environments. In fog computing environments, data need to be transmitted across multiple devices, increasing the risk of data being intercepted or tampered with during transmission.

View Article and Find Full Text PDF

Blockchain-based proxy re-encryption access control method for biological risk privacy protection of agricultural products.

Sci Rep

August 2024

National Engineering Laboratory for Agri-product Quality Traceability, Beijing, 100097, China.

In today's globalized agricultural system, information leakage of agricultural biological risk factors can lead to business risks and public panic, jeopardizing corporate reputation. To solve the above problems, this study constructs a blockchain network for agricultural product biological risk traceability based on agricultural product biological risk factor data to achieve traceability of biological risk traceability data of agricultural product supply chain to meet the sustainability challenges. To guarantee the secure and flexible sharing of agricultural product biological risk privacy information and limit the scope of privacy information dissemination, the blockchain-based proxy re-encryption access control method (BBPR-AC) is designed.

View Article and Find Full Text PDF
Article Synopsis
  • * The proposed solution enhances security by creating a shared temporary key, distributing tasks among multiple proxy nodes, and utilizing a random function for fair node selection.
  • * Combining blockchain technology with the InterPlanetary File System improves storage security and capacity for electronic medical records, while also demonstrating anti-impersonation and increased efficiency in tests on the Chain33 platform.
View Article and Find Full Text PDF

Existing attribute-based proxy re-encryption schemes suffer from issues like complex access policies, large ciphertext storage space consumption, and an excessive authority of the authorization center, leading to weak security and controllability of data sharing in cloud storage. This study proposes a Weighted Attribute Authority Multi-Authority Proxy Re-Encryption (WAMA-PRE) scheme that introduces attribute weights to elevate the expression of access policies from binary to multi-valued, simplifying policies and reducing ciphertext storage space. Simultaneously, the multiple attribute authorities and the authorization center construct a joint key, reducing reliance on a single authorization center.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!