{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T19:39:04Z","timestamp":1772825944792,"version":"3.50.1"},"reference-count":26,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2021,10,29]],"date-time":"2021-10-29T00:00:00Z","timestamp":1635465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2022,5,31]]},"abstract":"<jats:p>Block chain provides an innovative solution to information storage, transaction execution, security, and trust building in an open environment. The block chain is technological progress for cyber security and cryptography, with efficiency-related cases varying in smart grids, smart contracts, over the IoT, etc. The movement to exchange data on a server has massively increased with the introduction of the Internet of Things. Hence, in this research, Splitting of proxy re-encryption method (Split-PRE) has been suggested based on the IoT to improve security and privacy in a private block chain. This study proposes a block chain-based proxy re-encryption program to resolve both the trust and scalability problems and to simplify the transactions. After encryption, the system saves the Internet of Things data in a distributed cloud. The framework offers dynamic, smart\u00a0contracts between the sensor and the device user without the intervention of a trustworthy third party to exchange the captured IoT data. It uses an efficient proxy re-encryption system, which provides the owner and the person existing in the smart contract to see the data. The experimental outcomes show that the proposed approach enhances the efficiency, security, privacy, and feasibility of the system when compared to other existing methods.<\/jats:p>","DOI":"10.1145\/3421508","type":"journal-article","created":{"date-parts":[[2021,10,29]],"date-time":"2021-10-29T15:04:03Z","timestamp":1635519843000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["Multi-Tier Stack of Block Chain with Proxy Re-Encryption Method Scheme on the Internet of Things Platform"],"prefix":"10.1145","volume":"22","author":[{"given":"Bharat S.","family":"Rawal","sequence":"first","affiliation":[{"name":"Cyber Department, Gannon University, Erie, PA, USA"}]},{"given":"Poongodi","family":"M.","sequence":"additional","affiliation":[{"name":"Hamad Bin Khalifa University, College of Science and Engineering, Doha, Qatar"}]},{"given":"Gunasekaran","family":"Manogaran","sequence":"additional","affiliation":[{"name":"Computer and Information Science Department, Gannon University, Erie, PA, USA and College of Information and Electrical Engineering, Asia University, Taiwan"}]},{"given":"Mounir","family":"Hamdi","sequence":"additional","affiliation":[{"name":"Hamad Bin Khalifa University, College of Science and Engineering, Doha, Qatar"}]}],"member":"320","published-online":{"date-parts":[[2021,10,29]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.3390\/s19051235"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.08.001"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.3390\/e22040421"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.06.018"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1166\/asl.2018.11838"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.14257\/ijgdc.2018.11.10.03"},{"key":"e_1_3_1_8_2","first-page":"5393","volume-title":"IEEE Access","volume":"6","author":"Yin W.","year":"2018","unstructured":"W. Yin, Q. Wen, W. Li, H. Zhang, and Z. Jin. 2018. An anti-quantum transaction authentication approach in Block chain. IEEE Access 6, 5393--5401."},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102411"},{"key":"e_1_3_1_10_2","first-page":"1","article-title":"Multi-security-level cloud storage system based on improved proxy re-encryption","volume":"1","author":"Shen J.","year":"2019","unstructured":"J. Shen, X. Deng, and Z. Xu. 2019. Multi-security-level cloud storage system based on improved proxy re-encryption. EURASIP Journal on Wireless Communications and Networking 1 (2019), 1--12.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"issue":"5","key":"e_1_3_1_11_2","first-page":"1379","article-title":"Lattice-based fuzzy conditional proxy re-encryption","volume":"20","author":"Li B.","year":"2019","unstructured":"B. Li, J. Xu, and Y. Liu. 2019. Lattice-based fuzzy conditional proxy re-encryption. Journal of Internet Technology 20, 5 (2019), 1379--1385.","journal-title":"Journal of Internet Technology"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.5539\/ass.v14n2p81"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2930742"},{"key":"e_1_3_1_14_2","first-page":"25863","volume-title":"IEEE Access","volume":"8","author":"Ernest B.","year":"2020","unstructured":"B. Ernest and J. Shiguang. 2020. Privacy enhancement scheme (PES) in a block chain-edge computing environment. IEEE Access 8, 25863--25876."},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.101666"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1177\/1550147719842725"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/SaCoNeT.2018.8585538"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.08.003"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2817518"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.3390\/su11247054"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.3390\/s19081788"},{"key":"e_1_3_1_22_2","first-page":"45605","volume-title":"IEEE Access","volume":"7","author":"Wu Y.","year":"2019","unstructured":"Y. Wu, S. Tang, B. Zhao, and Z. Peng. 2019. BPTM: Block chain-based privacy-preserving task matching in crowdsourcing. IEEE Access 7, 45605--45617."},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2015.06.016"},{"key":"e_1_3_1_24_2","article-title":"Block chain based proxy re-encryption scheme for secure IoT data sharing","author":"Manzoor Ahsan","year":"2018","unstructured":"Ahsan Manzoor, Madhsanka Liyanage, An Braeken, Salil S. Kanhere, and Mika Ylianttila. 2018. Block chain based proxy re-encryption scheme for secure IoT data sharing. arXiv preprint arXiv:1811.02276 (2018).","journal-title":"arXiv preprint"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-2862-z"},{"key":"e_1_3_1_26_2","unstructured":"Lei Xu. 2019. CL-PRE: A certificateless proxy re-encryption scheme for secure data sharing with public cloud. https:\/\/profsandhu.com\/zhang\/pub\/asiaccs12-clpre.pdf. Profsandhu.com. Accessed 2019"},{"key":"e_1_3_1_27_2","doi-asserted-by":"crossref","unstructured":"K. O.-B. O. Agyekum Q. Xia E. B. Sifah J. Gao H. Xia X. Du and M. Guizani. 2019. A secured proxy-based data sharing module in IoT environments using block chain.","DOI":"10.3390\/s19051235"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3421508","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3421508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:21Z","timestamp":1750268961000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3421508"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,29]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,5,31]]}},"alternative-id":["10.1145\/3421508"],"URL":"https:\/\/doi.org\/10.1145\/3421508","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,29]]},"assertion":[{"value":"2020-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}