Proxy Re-encryption for Internet of Things (IoT) over Seminear-ring
Keywords:
Seminear-ring, Double Decomposition Problem, IoTAbstract
The assembly of distributed computing and Internet of Things (IoT) is halfway because of the logical requirement for conveying stretched out administrations to a more extensive client base in various circumstances. Be that as it may, distributed computing has its impediment for applications requiring low-idleness and high portability, especially in antagonistic settings. Somewhat, such constraints can be moderated in a mist registering worldview since the last overcomes any barrier between far off cloud server farm and the end gadgets. This work we suggested established key arrangement agreement reliant on seminear-ring. The confidence of our agreement reliant on Double Decomposition Problem in non-commutative seminear-ring.
References
Gerla, M., Lee, E. K., Pau, G., & Lee, U. (2014, March). Internet of vehicles: From intelligent grid to autonomous cars and vehicular clouds. In 2014 IEEE world forum on internet of things (WF-IoT) (pp. 241-246). IEEE.
Alam, K. M., Saini, M., & El Saddik, A. (2015). Toward social internet of vehicles: Concept, architecture, and applications. IEEE access, 3, 343-357.
Vimala, B. B., Srinivasan, S., Mathivanan, S. K., Muthukumaran, V., Babu, J. C., Herencsar, N., & Vilcekova, L. (2023). Image Noise Removal in Ultrasound Breast Images Based on Hybrid Deep Learning Technique. Sensors, 23(3), 1167.
Rajaram, R. N., Ohn-Bar, E., & Trivedi, M. M. (2016). Refinenet: Refining object detectors for autonomous driving. IEEE Transactions on Intelligent Vehicles, 1(4), 358-368.
Mahesh, T. R., Kaladevi, A. C., Balajee, J. M., Vivek, V., Prabu, M., & Muthukumaran, V. (2022). An Efficient Ensemble Method Using K-Fold Cross Validation for the Early Detection of Benign and Malignant Breast Cancer. International Journal of Integrated Engineering, 14(7), 204-216.
Kumari, S., Khan, M. K., & Atiquzzaman, M. (2015). User authentication schemes for wireless sensor networks: A review. Ad Hoc Networks, 27, 159-194.
Gothai, E., Muthukumaran, V., Valarmathi, K., Sathishkumar, V. E., Thillaiarasu, N., & Karthikeyan, P. (2022). Map-Reduce based Distance Weighted k-Nearest Neighbor Machine Learning Algorithm for Big Data Applications. Scalable Computing: Practice and Experience, 23(4), 129-145.
Sadeghi, A. R., Wachsmann, C., & Waidner, M. (2015, June). Security and privacy challenges in industrial internet of things. In Proceedings of the 52nd annual design automation conference (pp. 1-6).
Xiong, H., Zhang, H., & Sun, J. (2018). Attribute-based privacy-preserving data sharing for dynamic groups in cloud computing. IEEE Systems Journal, 13(3), 2739-2750.
Diffie, W., & Hellman, M. E. (2022). New directions in cryptography. In Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman (pp. 365-390).
Sangeetha, S. K. B., Muthukumaran, V., Deeba, K., Rajadurai, H., Maheshwari, V., & Dalu, G. T. (2022). Multiconvolutional Transfer Learning for 3D Brain Tumor Magnetic Resonance Images. Computational Intelligence and Neuroscience, 2022.
Xiong, H. (2014). Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Transactions on Information Forensics and Security, 9(12), 2327-2339.
Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., & Lou, W. (2010, March). Fuzzy keyword search over encrypted data in cloud computing. In 2010 Proceedings IEEE INFOCOM (pp. 1-5). IEEE.
Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23 (pp. 506-522). Springer Berlin Heidelberg.
Ahmed, S. T., Kumar, V., & Kim, J. (2023). AITel: eHealth Augmented Intelligence based Telemedicine Resource Recommendation Framework for IoT devices in Smart cities. IEEE Internet of Things Journal.
Yang, G., Tan, C. H., Huang, Q., & Wong, D. S. (2010). Probabilistic public key encryption with equality test. In Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings (pp. 119-131). Springer Berlin Heidelberg.
Ma, S. (2016). Identity-based encryption with outsourced equality test in cloud computing. Information Sciences, 328, 389-402.
Ling, Y., Ma, S., Huang, Q., Li, X., & Ling, Y. (2020). Group public key encryption with equality test against offline message recovery attack. Information Sciences, 510, 16-32.
Duong, D. H., Fukushima, K., Kiyomoto, S., Roy, P. S., & Susilo, W. (2019). A lattice-based public key encryption with equality test in standard model. In Information Security and Privacy: 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings 24 (pp. 138-155). Springer International Publishing.
Merlin Linda, G., Sree Rathna Lakshmi, N. V. S., Murugan, N. S., Mahapatra, R. P., Muthukumaran, V., & Sivaram, M. (2022). Intelligent recognition system for viewpoint variations on gait and speech using CNN-CapsNet. International Journal of Intelligent Computing and Cybernetics, 15(3), 363-382.
Ahmed, S. T., Basha, S. M., Ramachandran, M., Daneshmand, M., & Gandomi, A. H. (2023). An Edge-AI enabled Autonomous Connected Ambulance Route Resource Recommendation Protocol (ACA-R3) for eHealth in Smart Cities. IEEE Internet of Things Journal.
Wu, L., Zhang, Y., Choo, K. K. R., & He, D. (2017). Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Generation Computer Systems, 73, 22-31.
Krishnamoorthy, S., Muthukumaran, V., Yu, J., & Balamurugan, B. (2019, August). A secure privacy preserving proxy re-encryption scheme for IoT security using near-ring. In Proceedings of the 2019 the International Conference on Pattern Recognition and Artificial Intelligence (pp. 27-32).
Ramaiah, N. S., & Ahmed, S. T. (2022). An IoT-Based Treatment Optimization and Priority Assignment Using Machine Learning. ECS Transactions, 107(1), 1487.
Muthukumaran, V., Ezhilmaran, D., & Anjaneyulu, G. S. G. N. (2018). Efficient authentication scheme based on the twisted near-ring root extraction problem. In Advances in Algebra and Analysis: International Conference on Advances in Mathematical Sciences, Vellore, India, December 2017-Volume I (pp. 37-42). Springer International Publishing.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 V Muthukumaran, B Vidyashree
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.