International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056
Volume: 09 Issue: 11 | Nov 2022
p-ISSN: 2395-0072
www.irjet.net
An interactive Study on secure data sharing in the IOT through Blockchain Shinde Tanmay Balkrushna1, Thorat Swastik Jaysing2, Dahatonde Mangesh Ramesh3, Prof. A. S. Dumbre4 1, 2, 3 Student,
Department of Computer Engineering, Jaihind College of Engineering, Pune, Maharashtra, India Guide, Department of Computer Engineering, Jaihind College of Engineering, Pune, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------management handled by a single authority. Both the Abstract - At the same time as the information age is 4
transmission and calculation costs associated with this method are substantial. Therefore, it is important to provide a user-friendly, secure, and effective cloud storage sharing solution. Cloud ciphertext authorization technique is presented as a solution to the issue of data privacy protection. The privacy is maintained by encrypting the information key as well as maintaining the encrypted message in the cloud. Additionally, the data owner controls the user's key and hence the access privileges.
growing exponentially, the amount of data produced by users is growing at an equally rapid pace. It is obvious that the storage space on the desktop device is insufficient. Cloud services are becoming more popular as a means for users to archive, analyze, and administer their data. Peoples' lives are improved in several ways by cloud - based solutions, yet these alternatives also pose significant threats to consumers' confidentiality. As soon as data is uploaded to a cloud server through the internet, the data's owner has no further say over the content and therefore must depend on the server to perform any required computations or processing. As a consequence, cloud data protection has taken on new challenges, such as figuring out how to effectively ensure user privacy and fine-grained access control as well as authorization control. Our approach, which will be detailed in more depth in the subsequent volume of this study, has relied heavily on the findings of these studies. The proposed approach for proxy re-encryption secures the Internet of Medical Things data on a public cloud through the use of Blockchain distributed framework. This approach will be further elaborated in the upcoming editions of this research.
Conventional research proposes a participation encryption methodology that takes the role into account as a decryption criterion. It was suggested to use attribute encryption as the basis for a composite cloud re-encryption information sharing framework. This strategy not only facilitates versatile ciphertext identity management but then also simplifies management for data owners. An adaptive and intelligent proxy re-encryption technique is devised. Using this method, the data owner may provide access to the plaintext message by authorizing the designated user to decode any re encrypted ciphertext using the user's component. Individuality, certifications, and environments were subsequently suggested as important components in a proxy re-encryption system.
Key Words: Internet of Medical Things, Public Cloud, Medical Health Records, Cryptography, Search over encrypted data.
Confidential information is adequately ensured by the aforementioned methods; yet, users are hampered in their ability to swiftly locate the data and information they want throughout the data exchange operation. A characteristic proxy re-encryption system using cryptographically searchable terms is proposed to enhance access efficiency during information sharing. However, a practical ciphertext decryption technique cannot be designed using this method. The traditional research solves this through a key-based attribute proxy re-encryption technique to facilitate keyword retrieval, and demonstrated the system's viability inside a randomly generated oracle model.
1. INTRODUCTION Users' information provided is expanding at an exponential rate along with the expansion of the age of information. It's clear that the user's computer's storage device isn't enough. Users are increasingly turning to cloud services for data storage, processing, and management. Although cloud solutions improve users' lives in many different ways, there are also serious risks to their privacy and security. Once data is sent to the cloud across a network, the data holder loses control on the information and must rely on the cloud server to do any necessary calculations or processing. As a result, new difficulties have emerged in cloud data security, such as how to guarantee the confidentiality of information and the efficacy of user fine grained access control and permission management.
Unfortunately, the scheme's computational complexity cost makes it impractical for widespread practical application, according to performance studies. The majority of the following methods also include outsourcing the administration of user data to remote cloud storage facilities. In the event of an assault on the administrators of
In contrast, the majority of the currently available cloud storage solutions are centralized, with data
© 2022, IRJET
|
Impact Factor value: 7.529
|
ISO 9001:2008 Certified Journal
|
Page 647