Blockchain-Based Proxy Re-Encryption Method to Secure Data Sharing in IOT with Dynamic Key Generator

Main Article Content

Sharmila Devi M
Mrs. Bhavani P

Abstract

Internet of things (IOT) devices have conquered the modern world, and they are increasingly gaining ground day by day. Data sharing has become one of the most valuable uses in cloud computing as the Internet of Things has progressed. Data security is still a concern, despite how appealing this technology is one of the challenges it faces, because improper data use leads to a number of losses. In the existing system a proxy re-encryption technique is used to secure the data, a method for distributing data in cloud settings in a secure manner. Data Owners can use the cloud to offload their encrypted data by using Identity-based encryption and proxy reencryption. Access to the data will be granted to legitimate users. Due to the resource constraints of Internet of Things devices, an edge device operates as a proxy server to conduct complex calculations. In addition, we proposed multiple security keys to re-encrypt data sent to the authority via a block chain authority validated proxy. We change multiple keys to store the data on server, and before allowing the authority client to access the data, we check to see if the change key and the authority key are the same, and then allow to access the information to the authority client. To secure data exchange in cloud contexts, we offer a proxy reencryption technique. Furthermore, our system is built on blockchain, a ground-breaking technology that permits data sharing decentralized.

Article Details

Section
Articles