A Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-Healthcare

Cloud computing aims to provide reliable, customized, and quality of service (QoS) guaranteed dynamic computing environments for end-users. However, there are applications such as e-health and emergency response monitoring that require quick response and low latency. Delays caused by transferring da...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Junaid Hassan, Danish Shehzad, Insaf Ullah, Fahad Algarni, Muhammad Umar Aftab, Muhammad Asghar Khan, M. Irfan Uddin
Formato: article
Lenguaje:EN
Publicado: Hindawi-Wiley 2021
Materias:
Acceso en línea:https://doaj.org/article/899b313caa5b4c99b376b5423f4dfaa5
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:899b313caa5b4c99b376b5423f4dfaa5
record_format dspace
spelling oai:doaj.org-article:899b313caa5b4c99b376b5423f4dfaa52021-11-29T00:56:48ZA Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-Healthcare1939-012210.1155/2021/9363824https://doaj.org/article/899b313caa5b4c99b376b5423f4dfaa52021-01-01T00:00:00Zhttp://dx.doi.org/10.1155/2021/9363824https://doaj.org/toc/1939-0122Cloud computing aims to provide reliable, customized, and quality of service (QoS) guaranteed dynamic computing environments for end-users. However, there are applications such as e-health and emergency response monitoring that require quick response and low latency. Delays caused by transferring data over the cloud can seriously affect the performance and reliability of real-time applications. Before outsourcing e-health care data to the cloud, the user needs to perform encryption on these sensitive data to ensure its confidentiality. Conventionally, any modification to the user data requires encrypting the entire data and calculating the hash of the data from scratch. This data modification mechanism increases communication and computation costs over the cloud. The distributed environment of fog computing is used to overcome the limitations of cloud computing. This paper proposed a certificate-based incremental proxy re-encryption scheme (CB-PReS) for e-health data sharing in fog computing. The proposed scheme improves the file modification operations, i.e., updation, deletion, and insertion. The proposed scheme is tested on the iFogSim simulator. The iFogSim simulator facilitates the development of models for fog and IoT environments, and it also measures the impact of resource management techniques regarding network congestion and latency. Experiments depict that the proposed scheme is better than the existing schemes based on expensive bilinear pairing and elliptic curve techniques. The proposed scheme shows significant improvement in key generation and file modification time.Junaid HassanDanish ShehzadInsaf UllahFahad AlgarniMuhammad Umar AftabMuhammad Asghar KhanM. Irfan UddinHindawi-WileyarticleTechnology (General)T1-995Science (General)Q1-390ENSecurity and Communication Networks, Vol 2021 (2021)
institution DOAJ
collection DOAJ
language EN
topic Technology (General)
T1-995
Science (General)
Q1-390
spellingShingle Technology (General)
T1-995
Science (General)
Q1-390
Junaid Hassan
Danish Shehzad
Insaf Ullah
Fahad Algarni
Muhammad Umar Aftab
Muhammad Asghar Khan
M. Irfan Uddin
A Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-Healthcare
description Cloud computing aims to provide reliable, customized, and quality of service (QoS) guaranteed dynamic computing environments for end-users. However, there are applications such as e-health and emergency response monitoring that require quick response and low latency. Delays caused by transferring data over the cloud can seriously affect the performance and reliability of real-time applications. Before outsourcing e-health care data to the cloud, the user needs to perform encryption on these sensitive data to ensure its confidentiality. Conventionally, any modification to the user data requires encrypting the entire data and calculating the hash of the data from scratch. This data modification mechanism increases communication and computation costs over the cloud. The distributed environment of fog computing is used to overcome the limitations of cloud computing. This paper proposed a certificate-based incremental proxy re-encryption scheme (CB-PReS) for e-health data sharing in fog computing. The proposed scheme improves the file modification operations, i.e., updation, deletion, and insertion. The proposed scheme is tested on the iFogSim simulator. The iFogSim simulator facilitates the development of models for fog and IoT environments, and it also measures the impact of resource management techniques regarding network congestion and latency. Experiments depict that the proposed scheme is better than the existing schemes based on expensive bilinear pairing and elliptic curve techniques. The proposed scheme shows significant improvement in key generation and file modification time.
format article
author Junaid Hassan
Danish Shehzad
Insaf Ullah
Fahad Algarni
Muhammad Umar Aftab
Muhammad Asghar Khan
M. Irfan Uddin
author_facet Junaid Hassan
Danish Shehzad
Insaf Ullah
Fahad Algarni
Muhammad Umar Aftab
Muhammad Asghar Khan
M. Irfan Uddin
author_sort Junaid Hassan
title A Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-Healthcare
title_short A Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-Healthcare
title_full A Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-Healthcare
title_fullStr A Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-Healthcare
title_full_unstemmed A Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-Healthcare
title_sort lightweight proxy re-encryption approach with certificate-based and incremental cryptography for fog-enabled e-healthcare
publisher Hindawi-Wiley
publishDate 2021
url https://doaj.org/article/899b313caa5b4c99b376b5423f4dfaa5
work_keys_str_mv AT junaidhassan alightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare
AT danishshehzad alightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare
AT insafullah alightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare
AT fahadalgarni alightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare
AT muhammadumaraftab alightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare
AT muhammadasgharkhan alightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare
AT mirfanuddin alightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare
AT junaidhassan lightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare
AT danishshehzad lightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare
AT insafullah lightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare
AT fahadalgarni lightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare
AT muhammadumaraftab lightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare
AT muhammadasgharkhan lightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare
AT mirfanuddin lightweightproxyreencryptionapproachwithcertificatebasedandincrementalcryptographyforfogenabledehealthcare
_version_ 1718407656982446080