A Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-Healthcare
Cloud computing aims to provide reliable, customized, and quality of service (QoS) guaranteed dynamic computing environments for end-users. However, there are applications such as e-health and emergency response monitoring that require quick response and low latency. Delays caused by transferring da...
Guardado en:
Autores principales: | , , , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Hindawi-Wiley
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/899b313caa5b4c99b376b5423f4dfaa5 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:899b313caa5b4c99b376b5423f4dfaa5 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:899b313caa5b4c99b376b5423f4dfaa52021-11-29T00:56:48ZA Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-Healthcare1939-012210.1155/2021/9363824https://doaj.org/article/899b313caa5b4c99b376b5423f4dfaa52021-01-01T00:00:00Zhttp://dx.doi.org/10.1155/2021/9363824https://doaj.org/toc/1939-0122Cloud computing aims to provide reliable, customized, and quality of service (QoS) guaranteed dynamic computing environments for end-users. However, there are applications such as e-health and emergency response monitoring that require quick response and low latency. Delays caused by transferring data over the cloud can seriously affect the performance and reliability of real-time applications. Before outsourcing e-health care data to the cloud, the user needs to perform encryption on these sensitive data to ensure its confidentiality. Conventionally, any modification to the user data requires encrypting the entire data and calculating the hash of the data from scratch. This data modification mechanism increases communication and computation costs over the cloud. The distributed environment of fog computing is used to overcome the limitations of cloud computing. This paper proposed a certificate-based incremental proxy re-encryption scheme (CB-PReS) for e-health data sharing in fog computing. The proposed scheme improves the file modification operations, i.e., updation, deletion, and insertion. The proposed scheme is tested on the iFogSim simulator. The iFogSim simulator facilitates the development of models for fog and IoT environments, and it also measures the impact of resource management techniques regarding network congestion and latency. Experiments depict that the proposed scheme is better than the existing schemes based on expensive bilinear pairing and elliptic curve techniques. The proposed scheme shows significant improvement in key generation and file modification time.Junaid HassanDanish ShehzadInsaf UllahFahad AlgarniMuhammad Umar AftabMuhammad Asghar KhanM. Irfan UddinHindawi-WileyarticleTechnology (General)T1-995Science (General)Q1-390ENSecurity and Communication Networks, Vol 2021 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Technology (General) T1-995 Science (General) Q1-390 |
spellingShingle |
Technology (General) T1-995 Science (General) Q1-390 Junaid Hassan Danish Shehzad Insaf Ullah Fahad Algarni Muhammad Umar Aftab Muhammad Asghar Khan M. Irfan Uddin A Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-Healthcare |
description |
Cloud computing aims to provide reliable, customized, and quality of service (QoS) guaranteed dynamic computing environments for end-users. However, there are applications such as e-health and emergency response monitoring that require quick response and low latency. Delays caused by transferring data over the cloud can seriously affect the performance and reliability of real-time applications. Before outsourcing e-health care data to the cloud, the user needs to perform encryption on these sensitive data to ensure its confidentiality. Conventionally, any modification to the user data requires encrypting the entire data and calculating the hash of the data from scratch. This data modification mechanism increases communication and computation costs over the cloud. The distributed environment of fog computing is used to overcome the limitations of cloud computing. This paper proposed a certificate-based incremental proxy re-encryption scheme (CB-PReS) for e-health data sharing in fog computing. The proposed scheme improves the file modification operations, i.e., updation, deletion, and insertion. The proposed scheme is tested on the iFogSim simulator. The iFogSim simulator facilitates the development of models for fog and IoT environments, and it also measures the impact of resource management techniques regarding network congestion and latency. Experiments depict that the proposed scheme is better than the existing schemes based on expensive bilinear pairing and elliptic curve techniques. The proposed scheme shows significant improvement in key generation and file modification time. |
format |
article |
author |
Junaid Hassan Danish Shehzad Insaf Ullah Fahad Algarni Muhammad Umar Aftab Muhammad Asghar Khan M. Irfan Uddin |
author_facet |
Junaid Hassan Danish Shehzad Insaf Ullah Fahad Algarni Muhammad Umar Aftab Muhammad Asghar Khan M. Irfan Uddin |
author_sort |
Junaid Hassan |
title |
A Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-Healthcare |
title_short |
A Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-Healthcare |
title_full |
A Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-Healthcare |
title_fullStr |
A Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-Healthcare |
title_full_unstemmed |
A Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-Healthcare |
title_sort |
lightweight proxy re-encryption approach with certificate-based and incremental cryptography for fog-enabled e-healthcare |
publisher |
Hindawi-Wiley |
publishDate |
2021 |
url |
https://doaj.org/article/899b313caa5b4c99b376b5423f4dfaa5 |
work_keys_str_mv |
AT junaidhassan alightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare AT danishshehzad alightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare AT insafullah alightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare AT fahadalgarni alightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare AT muhammadumaraftab alightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare AT muhammadasgharkhan alightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare AT mirfanuddin alightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare AT junaidhassan lightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare AT danishshehzad lightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare AT insafullah lightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare AT fahadalgarni lightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare AT muhammadumaraftab lightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare AT muhammadasgharkhan lightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare AT mirfanuddin lightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare |
_version_ |
1718407656982446080 |