A practical vehicular-fog-based privacy-preserving attribute-based keyword search system using potential games

被引:1
作者
Seyedi, Zahra [1 ]
Rahmati, Farhad [1 ]
Ali, Mohammad [1 ]
机构
[1] Amirkabir Univ Technol, Dept Math & Comp Sci, Tehran, Iran
来源
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES | 2024年 / 35卷 / 10期
关键词
Differential privacy;
D O I
10.1002/ett.5042
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The growth of fog computing drives Internet of Things users to outsource data for services like storage and sharing. To ensure secure and efficient data search, extensive research has been conducted on searchable encryption, specifically attribute-based keyword search (ABKS). ABKS facilitates precise access control over encrypted data while maintaining search functionality. However, delegating complex search operations to fog nodes introduces challenges like latency limitations, compromised search results, and unauthorized occupation of server resources. In this manuscript, we propose a Time-Efficient Data Retrieval (TEDR) scheme to address these challenges. Our scheme incorporates two access policies, allowing data owners (DOs) and data users (DUs) to control data access and search queries. TEDR enables fog nodes to verify search queries before decryption, avoiding unnecessary decryption for invalid queries. We introduce a decentralized query submitting framework to allocate search queries among fog nodes, addressing redundancy concerns and latency issues. We analyze the decentralized query submitting game and classify it as a potential game, making it suitable for decentralized decision-making. We evaluate TEDR performance on real-world datasets, demonstrating practicality and efficiency. Our scheme reduces computational and communication costs by approximately 30% compared to existing methods. Our TEDR scheme proposes a novel approach to secure and efficient data search in fog computing environments. It utilizes game theory to address challenges in delegating search operations to fog nodes for outsourced data services. Incorporating two access policies and a decentralized query-submitting framework, TEDR ensures secure and efficient data search with reduced computational and communication costs image
引用
收藏
页数:17
相关论文
共 45 条
  • [1] Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things
    Ali, Mohammad
    Sadeghi, Mohammad-Reza
    Liu, Ximeng
    Miao, Yinbin
    Vasilakos, Athanasios V.
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 65
  • [2] A fully distributed hierarchical attribute-based encryption scheme
    Ali, Mohammad
    Mohajeri, Javad
    Sadeghi, Mohammad-Reza
    Liu, Ximeng
    [J]. THEORETICAL COMPUTER SCIENCE, 2020, 815 : 25 - 46
  • [3] [Anonymous], The python pairing based cryptography library
  • [4] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [5] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [6] Predictable Memory-CPU Co-Scheduling with Support for Latency-Sensitive Tasks
    Casini, Daniel
    Pazzaglia, Paolo
    Biondi, Alessandro
    Di Natale, Marco
    Buttazzo, Giorgio
    [J]. PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2020,
  • [7] Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control
    Chen, Zehong
    Zhang, Fangguo
    Zhang, Peng
    Liu, Joseph K.
    Huang, Jiwu
    Zhao, Hanbang
    Shen, Jian
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 : 712 - 724
  • [8] Interference-Aware Game-Theoretic Device Allocation for Mobile Edge Computing
    Cui, Guangming
    He, Qiang
    Chen, Feifei
    Zhang, Yiwen
    Jin, Hai
    Yang, Yun
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (11) : 4001 - 4012
  • [9] Curtain RF, 2006, LECT NOTES CONTR INF, V329, P79, DOI 10.1007/11664550_5
  • [10] A Potential Game Theoretic Approach to Computation Offloading Strategy Optimization in End-Edge-Cloud Computing
    Ding, Yan
    Li, Kenli
    Liu, Chubo
    Li, Keqin
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2022, 33 (06) : 1503 - 1519