A Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-Healthcare

Author:

Hassan Junaid1,Shehzad Danish1ORCID,Ullah Insaf2ORCID,Algarni Fahad3ORCID,Aftab Muhammad Umar1ORCID,Asghar Khan Muhammad2ORCID,Uddin M. Irfan4ORCID

Affiliation:

1. Department of Computer Science, National University of Computer and Emerging Sciences, Islamabad Chiniot-Faisalabad Campus, Chiniot 35400, Pakistan

2. Hamdard Institute of Engineering & Technology, Hamdard University, Islamabad 44000, Pakistan

3. College of Computing and Information Technology, The University of Bisha, Bisha, Saudi Arabia

4. Institute of Computing, Kohat University of Science and Technology, Kohat 26000, Pakistan

Abstract

Cloud computing aims to provide reliable, customized, and quality of service (QoS) guaranteed dynamic computing environments for end-users. However, there are applications such as e-health and emergency response monitoring that require quick response and low latency. Delays caused by transferring data over the cloud can seriously affect the performance and reliability of real-time applications. Before outsourcing e-health care data to the cloud, the user needs to perform encryption on these sensitive data to ensure its confidentiality. Conventionally, any modification to the user data requires encrypting the entire data and calculating the hash of the data from scratch. This data modification mechanism increases communication and computation costs over the cloud. The distributed environment of fog computing is used to overcome the limitations of cloud computing. This paper proposed a certificate-based incremental proxy re-encryption scheme (CB-PReS) for e-health data sharing in fog computing. The proposed scheme improves the file modification operations, i.e., updation, deletion, and insertion. The proposed scheme is tested on the iFogSim simulator. The iFogSim simulator facilitates the development of models for fog and IoT environments, and it also measures the impact of resource management techniques regarding network congestion and latency. Experiments depict that the proposed scheme is better than the existing schemes based on expensive bilinear pairing and elliptic curve techniques. The proposed scheme shows significant improvement in key generation and file modification time.

Publisher

Hindawi Limited

Subject

Computer Networks and Communications,Information Systems

Cited by 8 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A Blockchain Patient-Centric Records Framework for Older Adult Healthcare;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2023-12-15

2. Retracted: A Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-Healthcare;Security and Communication Networks;2023-12-06

3. A certificate-based proxy re-encryption plus scheme for secure medical data sharing;Internet of Things;2023-10

4. Cryptography Algorithms for Enhancing IoT Security;Internet of Things;2023-07

5. Concept of Joint Functioning of Access Control Systems;Journal of Telecommunications and Information Technology;2023-03-31

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3