Blockchain-enabled data sharing for IoT: A lightweight, secure and searchable scheme

被引:0
作者
Xie, Qingqing [1 ]
Zhu, Fatong [1 ]
Feng, Xia [2 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang, Peoples R China
[2] City Univ Macau, Fac Data Sci, Macau, Peoples R China
关键词
Data sharing; Blockchain; Searchable encryption; Smart contract; Malicious server; PRIVACY;
D O I
10.1016/j.sysare.2024.103230
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of Internet of Things (IoT) applications, data sharing among IoT devices has become more frequent. Many researchers have proposed fine-grained access control schemes and searchable encryption algorithms to support privacy-preserving data sharing. But there still exist two challenges. First, the existing schemes are computationally intensive, making them unsuitable for resource-limited IoT terminals. Second, they rely on a central server to honestly conduct search operations, making them unable to tackle malicious servers. To this end, we propose a blockchain-enabled data-sharing scheme for IoT that supports lightweight, secure, and searchable data sharing. We design an outsourcing attribute-based encryption algorithm to alleviate the overhead of resource-limited IoT terminals, which reduces the local encryption and decryption to a constant level. Instead of relying on central servers, we leverage smart contract to execute ciphertext retrieval, ensuring the accuracy of search results. Formal security analysis demonstrates that the proposed scheme is chosen-plaintext secure under the DBDH assumption. Experimental simulation shows that it reduces the search time by at least 79.9%, the encryption and decryption complexities to both O (1).
引用
收藏
页数:13
相关论文
共 39 条
  • [1] A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain
    Agyekum, Kwame Opuni-Boachie Obour
    Xia, Qi
    Sifah, Emmanuel Boateng
    Cobblah, Christian Nii Aflah
    Xia, Hu
    Gao, Jianbin
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1685 - 1696
  • [2] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [3] Benet J., 2014, arXiv
  • [4] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [5] Bonomi Flavio, 2018, Fog Computing and Its Role in the Internet of Things
  • [6] De Caro A, 2011, IEEE SYMP COMP COMMU
  • [7] Blockchain-Enabled Fine-Grained Searchable Encryption With Cloud-Edge Computing for Electronic Health Records Sharing
    Gao, Hancheng
    Huang, Haiping
    Xue, Lingyan
    Xiao, Fu
    Li, Qi
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (20) : 18414 - 18425
  • [8] Secure Keyword Search and Data Sharing Mechanism for Cloud Computing
    Ge, Chunpeng
    Susilo, Willy
    Liu, Zhe
    Xia, Jinyue
    Szalachowski, Pawel
    Fang Liming
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2787 - 2800
  • [9] Goyal Vipul, 2006, Computer and Communications Security
  • [10] Green M., 2011, USENIX Security Symposium