Posted Date : 07th Mar, 2025
Peer-Reviewed Journals List: A Guide to Quality Research Publications ...
Posted Date : 07th Mar, 2025
Choosing the right journal is crucial for successful publication. Cons...
Posted Date : 27th Feb, 2025
Why Peer-Reviewed Journals Matter Quality Control: The peer revie...
Posted Date : 27th Feb, 2025
The Peer Review Process The peer review process typically follows sev...
Posted Date : 27th Feb, 2025
What Are Peer-Reviewed Journals? A peer-reviewed journal is a publica...
A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain
Author Name : Bharat Dhak, Apurva Basule, Arya Goswami , Mujahid Khan , Sahil Armarkar
ABSTRACT The Internet of Things (IoT) has witnessed an explosive growth, generating vast amounts of data with numerous applications. However, safeguarding this data's security and privacy is of paramount concern. In response, this paper introduces an innovative approach that combines proxy re-encryption techniques with blockchain technology to enhance the security of data sharing within IoT networks. In our proposed framework, data owners delegate access privileges to authorized entities, known as proxies, via a secure re-encryption process. This proxy reencryption mechanism ensures that only authorized entities can decrypt and access the shared data, thus preserving data confidentiality and integrity. The blockchain serves as a decentralized, immutable ledger to record and manage access control policies and cryptographic keys.