Secure query processing for smart grid data using searchable symmetric encryption

被引:0
作者
Souror, Samia [1 ]
Badawy, Mohammed [1 ,2 ]
El-Fishawy, Nawal [1 ]
机构
[1] Menoufia Univ, Fac Elect Engn, Dept Comp Sci & Engn, Menoufia 32952, Egypt
[2] AlRyada Univ Sci & Technol, Fac Comp & Artificial Intelligence, Sadat City 32897, Egypt
关键词
Searchable symmetric encryption; SCKHA algorithm; Data privacy; Database outsourcing; Trapdoor function; KEYWORD; SCHEME;
D O I
10.1007/s11227-024-06326-z
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the last decade, the smart grid has utilized many modern technologies and applications compared with the conventional grid. Cloud computing offers numerous managed services and storage solutions for smart grid data. To balance security, privacy, efficiency, and utility, more efforts should be made to keep up with the rapid evolution of technology. Searchable encryption techniques are widely considered an intelligent solution to ensure data privacy and security while maintaining the functionality to search over encrypted data. In this paper, we propose a more reliable and efficient searchable symmetric encryption scheme for smart grid data. It is a dynamic keyword searchable scheme that uses a symmetric cipher based on a key hashing algorithm (DKS-SCKHA) to generate a secure index. This scheme eliminates the false-positive issue associated with the use of bloom filters and narrows the scope of the retrieved search results. Additionally, it efficiently supports both partial and exact query processing on the encrypted database. Both theoretical and security analyses demonstrate the efficiency and security of the DKS-SCKHA scheme compared to other previous schemes. Comprehensive experiments on a smart grid dataset showed that the DKS-SCKHA scheme is 35-68% more efficient than the schemes compared in this paper. The DKS-SCKHA scheme supports three keyword search scenarios: single, conjunctive, and disjunctive. Furthermore, the DKS-SCKHA scheme is extended to support dynamic fuzzy keyword search on the encrypted database (DEFKS-SCKHA). We evaluated the security and efficiency of the DEFKS-SCKHA scheme through security analysis and experimental evaluation. Theoretical analysis shows that the proposed scheme is secure against known-ciphertext and known-background attacks.
引用
收藏
页码:24173 / 24211
页数:39
相关论文
共 53 条
  • [1] Efficient Search Over Encrypted Medical Data With Known-Plaintext/Background Models and Unlinkability
    Abdelfattah, Sherif
    Baza, Mohamed
    Badr, Mahmoud M.
    Mahmoud, Mohamed M. E. A.
    Srivastava, Gautam
    Alsolami, Fawaz
    Ali, Abdullah Marish
    [J]. IEEE ACCESS, 2021, 9 : 151129 - 151141
  • [2] Attacks on smart grid: power supply interruption and malicious power generation
    Adepu, Sridhar
    Kandasamy, Nandha Kumar
    Zhou, Jianying
    Mathur, Aditya
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (02) : 189 - 211
  • [3] A secure searchable encryption scheme for cloud using hash-based indexing
    Andola, Nitish
    Prakash, Sourabh
    Yadav, Vijay Kumar
    Raghav
    Venkatesan, S.
    Verma, Shekhar
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2022, 126 : 119 - 137
  • [4] Arnold WG, 2010, NIST Framework and roadmap for smart grid interoperability standards, DOI [10.6028/NIST.sp.1108, DOI 10.6028/NIST.SP.1108]
  • [5] Arunkumar B., 2018, Intelligent systems technologies and applications, P102
  • [6] Atta-ur-Rahman, 2022, Biologically Inspired Techniques in Many Criteria Decision Making: Proceedings of BITMDM 2021. Smart Innovation, Systems and Technologies (271), P1, DOI 10.1007/978-981-16-8739-6_1
  • [7] 5PM: Secure pattern matching
    Baron, Joshua
    El Defrawy, Karim
    Minkovich, Kirill
    Ostrovsky, Rafail
    Tressler, Eric
    [J]. JOURNAL OF COMPUTER SECURITY, 2013, 21 (05) : 601 - 625
  • [8] Cao N, 2011, IEEE INFOCOM SER, P829, DOI 10.1109/INFCOM.2011.5935306
  • [9] Chang YC, 2005, LECT NOTES COMPUT SC, V3531, P442
  • [10] clever, About us