Reliable Blockchain-Aided Searchable Attribute-Based Encryption for Cloud-IoT

Reliable Blockchain-Aided Searchable Attribute-Based Encryption for Cloud-IoT

DOI: 10.4018/978-1-7998-8367-8.ch013
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The work utilizes an alliance blockchain, where a lot of foreordained hubs control the agreement convention. Different devices can produce information and send the information to the information pool. All agreement hubs cooperate to update the client repudiation list that improves the unwavering quality of the frame. Clients submit search demands through the blockchain. A client sends a fractional token to the blockchain, and agreement hubs produce the total with the client's trait keys. At that point, the cloud can play out a quest with the total token for the client. The cloud asks the related time-coordinated pre-unscrambling key of the client from the blockchain to pre-decode. The framework is proportionate to a release board where we record all client open personality keys, client unscrambling keys, key update messages, and pre-decoding keys. The cloud can utilize those keys to pre-decrypt for clients, and accord hubs are liable for refreshing keys for non-renounced clients. The proposal increases security by 3.82% and improves trust by 5.09%.
Chapter Preview
Top

Introduction

The Internet-of-things (Ambika, 2019) (Alaba, 2017) (Nagaraj, 2021) makes it easy for humans by decreasing their effort. These devices communicate with each other with varying capabilities using a common platform. The cloud supports enormous data storage. The transmission between the IoT devices and the cloud needs some amount of security. Some of the applications making use of these devices include smart homes (Verma & Sood, 2018), hospitals (Ambika N., 2020)(Abdelgawad, Yelamarthi, & Khattab, 2016), industry (A & K, 2016), smart building (Akkaya, Guvenc, Aygun, Pala, & Kadri, 2015) and cities(Alrashdi, Alqazzaz, Aloufi, Alharthi, Zohdy, & Ming, 2019). The devices do not have enough space to store large amounts of data. Hence cloud is used for storage. Using The devices can upload data from anywhere, anytime using Internet services.

A blockchain (Atlam & Wills, 2019) is a dispersed record that comprises a consistently developing arrangement of evidence. The appropriated idea of blockchains suggests no single substance controls the information, but it takes interest peers together to approve the credibility of records. These records are in blocks that are connected utilizing cryptographic hashes, thus the name blockchain. Blockchain-based innovations boost an organization of companions to make calculations towards an agreement in the organization. The blockchain arrangement (Chen, Xu, Lu, & Chen, 2018)(Dorri, Kanhere, Jurdak, & Gauravaram, 2017) is the Bitcoin cryptographic money. The Bitcoin blockchain keeps up all switches from the underlying square, alluded to as the beginning square. The exchange has sender, recipient, the measure of the moved Bitcoin money, and the mark (sender). For the trading to remember, the blockchain transmits to the blockchain network. The purported diggers assume the liability to check new exchanges and propose the following square that incorporates the confirmed trade. Excavators compensate with Bitcoins and exchange expenses for their computational work.

The work (Liu S., Yu, Xiao, Wan, Wang, & Yan, 2020) utilizes an alliance blockchain, where foreordained (believed) hubs control agreement convention. Different devices can produce information and send the information to the information pool. At that point, the agreement hubs run the accord convention to update the chain and keep all devices in this framework conceding to a steady state. All agreement hubs cooperate to update the client repudiation list that improves the unwavering quality of the frame. Clients submit search demands through the blockchain. A client sends a fractional token to the blockchain, and agreement hubs produce the total with the client's trait keys. It can play out a quest with the total pledge for the client. It asks related time-coordinated pre-unscrambling key of the client from the blockchain to pre-decode. The framework is proportionate to a release board where we record all client open personality keys, client unscrambling keys, key update messages, and pre-decoding keys. It can utilize those keys to pre-decrypt the clients, and accord hubs are liable for a refreshing credential for non-renounced clients. The contribution is an improvement compared to the previous work. The proposal uses the Merkle root method to generate a hash value. It increases security by 3.82%. The previously generated value prefixes to the data. The new hash value suffixes to the data before transmission. It improves reliability by 5.09% compared to (Liu S., Yu, Xiao, Wan, Wang, & Yan, 2020).

The chapter has seven subdivisions. The literature survey follows the introduction in section two. Segment three briefs background of the work. Paragraph four details the previous contribution. Subdivision five explains the proposed work. Segment six provides an analysis of the work. The chapter concludes in section seven.

Complete Chapter List

Search this Book:
Reset