Securely sharing outsourced IoT data: A secure access and privacy preserving keyword search scheme

被引:1
作者
Sultan, Nazatul H. [1 ]
Kermanshahi, Shabnam K. [2 ]
Tran, Hong Y. [2 ]
Lai, Shangqi [3 ]
Varadharajan, Vijay [4 ]
Nepal, Surya [1 ]
Yi, Xun [5 ]
机构
[1] CSIRO, Data61, Eveleigh, Australia
[2] UNSW, Sydney, Australia
[3] Monash Univ, Monash, Australia
[4] Univ Newcastle, Newcastle, Australia
[5] RMIT Univ, Melbourne, Australia
关键词
IoT; Privacy; Keyword search; Encrypted database; Revocation; SYMMETRIC-ENCRYPTION;
D O I
10.1016/j.adhoc.2024.103478
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid progress in the field of IoT and its wide-ranging applications emphasize the criticality of robust security measures for effectively sharing, storing, and managing sensitive data generated by IoT devices. Regulations such as the Consumer Data Rights (CDR) highlight the need for the seamless sharing of sensitive data with authorized third parties while ensuring confidentiality and privacy. To enable such secure sharing, a data storage and sharing scheme should fulfill the following core requirements: (a) support multi -client data sharing settings, allowing IoT data owners to authorize multiple clients; (b) a dynamic storage environment permitting IoT owners to add or remove files with minimal privacy leak; (c) decentralized storage for distributing data across servers or Cloud Service Providers (CSPs) for greater security; and (d) efficient privilege revocation mechanism which incurs less computation and communication overhead. To address these requirements, we have proposed a novel keyword search scheme using computationally lightweight cryptographic primitives. Our scheme empowers IoT data owners to securely share, store and manage encrypted data in the CSPs, providing better security and privacy. We have provided formal security proof for our scheme as well as validated its efficiency via extensive experiments on the Docker platform. On a database of 12 million keyword/document pairs (with 10 5 documents and 10 3 keywords), our scheme took about 18 ms to return all matched documents.
引用
收藏
页数:14
相关论文
共 43 条
  • [1] A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things
    Alwarafy, Abdulmalik
    Al-Thelaya, Khaled A.
    Abdallah, Mohamed
    Schneider, Jens
    Hamdi, Mounir
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) : 4004 - 4022
  • [2] [Anonymous], 2023, Raspberry pi 4 model-b
  • [3] Bakas A, 2019, Report 2019/813
  • [4] Bosch Christoph, 2012, Information Security. Proceedings of the 15th International Conference, ISC 2012, P224, DOI 10.1007/978-3-642-33383-5_14
  • [5] A Survey of Provably Secure Searchable Encryption
    Bosch, Christoph
    Hartel, Pieter
    Jonker, Willem
    Peter, Andreas
    [J]. ACM COMPUTING SURVEYS, 2015, 47 (02)
  • [6] Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
    Bost, Raphael
    Minaud, Brice
    Ohrimenko, Olga
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1465 - 1482
  • [7] Σοφοζ - Forward Secure Searchable Encryption
    Bost, Raphael
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1143 - 1154
  • [8] Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
  • [9] Structured Encryption and Controlled Disclosure
    Chase, Melissa
    Kamara, Seny
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 577 - 594
  • [10] Chee-Yong Chan, 1998, SIGMOD Record, V27, P355, DOI 10.1145/276305.276336