Detailed Information

Cited 0 time in webofscience Cited 6 time in scopus
Metadata Downloads

Group Delegated ID-Based Proxy Reencryption for the Enterprise IoT-Cloud Storage Environment

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Won-Bin-
dc.contributor.authorSeo, Daehee-
dc.contributor.authorKim, Donghyun-
dc.contributor.authorLee, Im-Yeong-
dc.date.accessioned2021-09-10T05:46:16Z-
dc.date.available2021-09-10T05:46:16Z-
dc.date.issued2021-06-15-
dc.identifier.issn1530-8669-
dc.identifier.issn1530-8677-
dc.identifier.urihttps://scholarworks.bwise.kr/sch/handle/2021.sw.sch/18771-
dc.description.abstractIn general, ID-based proxy reencryption (IBPRE) includes data transfer in a 1 : 1 manner between a sender and receiver. Therefore, only the data owner has the authority to decrypt or reencrypt the data that is encrypted with his/her public key. However, in an environment with data self-sovereignty, such as an enterprise IoT-cloud environment, the data are directly managed by cloud once data is uploaded from user-controlled IoT devices. In such a situation, there is no way of sharing data if the data owner has no access over the data due to being outside the workplace and other issues. In this study, to solve this problem, data can be shared even when the data cannot be accessed by delegating the authority of the data owner to generate the reencryption key to other users. In addition, by solving the security threats that may appear in this process, data sharing can be performed securely and efficiently in the corporate environment.-
dc.language영어-
dc.language.isoENG-
dc.publisherJohn Wiley & Sons Inc.-
dc.titleGroup Delegated ID-Based Proxy Reencryption for the Enterprise IoT-Cloud Storage Environment-
dc.typeArticle-
dc.publisher.location영국-
dc.identifier.doi10.1155/2021/7641389-
dc.identifier.scopusid2-s2.0-85109028570-
dc.identifier.wosid000670546700003-
dc.identifier.bibliographicCitationWireless Communications and Mobile Computing, v.2021-
dc.citation.titleWireless Communications and Mobile Computing-
dc.citation.volume2021-
dc.type.docTypeArticle-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusRE-ENCRYPTION-
dc.subject.keywordPlusSCHEME-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Im Yeong photo

Lee, Im Yeong
College of Software Convergence (Department of Computer Software Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE