TL-ABKS: Traceable and lightweight attribute-based keyword search in edge-cloud assisted IoT environment

被引:0
|
作者
Varri, Uma Sankararao [1 ]
Mallick, Debjani [2 ]
Das, Ashok Kumar [2 ,3 ]
Hossain, M. Shamim [4 ]
Park, Youngho [5 ]
Rodrigues, Joel J. P. C. [6 ]
机构
[1] SRM Univ AP, Dept Comp Sci & Engn, Amaravathi, Andhra Pradesh, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] Korea Univ, Coll Informat, Dept Comp Sci & Engn, Seoul 02841, South Korea
[4] King Saud Univ, Coll Comp & Informat Sci, Dept Software Engn, Riyadh 12372, Saudi Arabia
[5] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
[6] Amazonas State Univ, Manaus, AM, Brazil
关键词
Internet of Things (IoT); Attribute-based keyword search; Multi-keyword search; Traceability; Edge computing; Cloud computing; Security; ENCRYPTION SCHEME; INTERNET;
D O I
10.1016/j.aej.2024.09.030
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Edge-cloud coordination offers the chance to mitigate the enormous storage and processing load brought on by a massive increase in traffic at the network's edge. Though this paradigm has benefits on a large scale, outsourcing the sensitive data from the smart devices deployed in an Internet of Things (IoT) application may lead to privacy leakage. With an attribute-based keyword search (ABKS), the search over ciphertext can be achieved; this reduces the risk of sensitive data explosion. However, ABKS has several issues, like huge computational overhead to perform multi-keyword searches and tracing malicious users. To address these issues and enhance the performance of ABKS, we propose a novel traceable and lightweight attribute-based keyword search technique in an Edge-cloud-assisted IoT, named TL-ABKS, using edge-cloud coordination. With TL-ABKS, it is possible to do effective multi-keyword searches and implement fine-grained access control. Further, TL-ABKS outsources the encryption and decryption computation to edge nodes to enable its usage to resource-limited IoT smart devices. In addition, TL-ABKS achieves tracing user identity who misuse their secret keys. TL-ABKS is secure against modified secret keys, chosen plaintext, and chosen keyword attacks. By comparing the proposed TL-ABKS with the current state-of-the-art schemes, and conducting a theoretical and experimental evaluation of its performance and credibility, TL-ABKS is efficient.
引用
收藏
页码:757 / 769
页数:13
相关论文
共 43 条
  • [1] Lightweight Attribute-based Keyword Search with Policy Protection for Cloud-assisted IoT
    Sun, Jianfei
    Xiong, Hu
    Deng, Robert H.
    Zhang, Yinghui
    Liu, Ximeng
    Cao, Mingsheng
    2019 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2019, : 25 - 32
  • [2] FELT-ABKS: Fog-Enabled Lightweight Traceable Attribute-Based Keyword Search Over Encrypted Data
    Varri, Uma Sankararao
    Kasani, Sreekanth
    Pasupuleti, Syam Kumar
    Kadambari, K., V
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (10) : 7559 - 7571
  • [3] STR-ABKS: Server-Aided Traceable and Revocable Attribute-Based Encryption With Keyword Search
    Meng, Fei
    Cheng, Leixiao
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 12649 - 12659
  • [4] Traceable and revocable multi-authority attribute-based keyword search for cloud storage
    Varri, Uma Sankararao
    Pasupuleti, Syam Kumar
    Kadambari, K., V
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 132
  • [5] ABKS-CSC: attribute-based keyword search with constant-size ciphertexts
    Yang, Ye
    Han, Jinguang
    Susilo, Willy
    Yuen, Tsz Hon
    Li, Jiguo
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5003 - 5015
  • [6] ABKS-PBM: Attribute-Based Keyword Search With Partial Bilinear Map
    Khan, Shawal
    Khan, Shahzad
    Zareei, Mahdi
    Alanazi, Faisal
    Kama, Nazri
    Alam, Masoom
    Anjum, Adeel
    IEEE ACCESS, 2021, 9 : 46313 - 46324
  • [7] Privacy-Preserving Traceable Attribute-Based Keyword Search in Multi-Authority Medical Cloud
    Huang, Qinlong
    Yan, Guanyu
    Yang, Yixian
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 678 - 691
  • [8] AKSER: Attribute-based keyword search with efficient revocation in cloud computing
    Cui, Jie
    Zhou, Han
    Zhong, Hong
    Xu, Yan
    INFORMATION SCIENCES, 2018, 423 : 343 - 352
  • [9] OOABKS: Online/offline attribute-based encryption for keyword search in mobile cloud
    Cui, Jie
    Zhou, Han
    Xu, Yan
    Zhong, Hong
    INFORMATION SCIENCES, 2019, 489 : 63 - 77
  • [10] Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment
    Shahidinejad, Ali
    Ghobaei-Arani, Mostafa
    Souri, Alireza
    Shojafar, Mohammad
    Kumari, Saru
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2022, 11 (02) : 57 - 63