Verifiable Multilevel Dynamic Searchable Encryption With Forward and Backward Privacy in Cloud-Assisted IoT

被引:1
作者
Ge, Yue [1 ]
Gao, Ying [1 ]
Ning, Jianting [2 ]
Ma, Jie [1 ]
Chen, Xiaofeng [1 ]
机构
[1] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyberspace Secur, Fuzhou 350000, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 24期
关键词
Privacy; Encryption; Servers; Smart contracts; Security; Cloud computing; Internet of Things; Access control; dynamic searchable symmetric encryption (DSSE); forward and backward privacy; smart contract; verification; DATA-STORAGE; RETRIEVAL; INTERNET;
D O I
10.1109/JIOT.2024.3457270
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) boom has enabled massive data collection in cloud servers. Therefore, access efficiency and data privacy in cloud storage services have become a significant concern. Data and users are hierarchical in IoT applications, which require fine-grained multilevel access control. Additionally, achieving public verification to resist the malicious server and clients is indispensable. Aiming at the challenge above, we propose a new forward private multilevel dynamic searchable symmetric encryption (MLDSSE) scheme called Peony, employing multilevel linked lists and constrained pseudorandom function, which is more efficient and secure. Then, we introduce a cryptographic primitive named multilevel symmetric revocable encryption (MSRE), and we give a general method for constructing a novel forward and Type-II backward-private MLDSSE scheme Peony++ based on MSRE. Further, we design the multilevel digests and utilize the smart contract as a trusted platform to support public verification for Peony++. Theoretical analysis and experimental evaluations show that Peony achieves higher security and reduces search time by an average of 35.81% compared to the state-of-the-art MLDSSE scheme. To the best of our knowledge, Peony++ is the only multilevel searchable encryption currently available that can achieve forward and Type-II backward privacy, all while balancing efficiency and functionality.
引用
收藏
页码:40861 / 40874
页数:14
相关论文
共 47 条
[1]  
Alderman James, 2017, Financial Cryptography and Data Security. FC 2017 International Workshops WAHC, BITCOIN, VOTING, WTSC, and TA. Revised Selected Papers: LNCS 10323, P35, DOI 10.1007/978-3-319-70278-0_3
[2]   Forward and Backward Private Searchable Encryption with SGX [J].
Amjad, Ghous ;
Kamara, Seny ;
Moataz, Tarik .
PROCEEDINGS OF THE 12TH EUROPEAN WORKSHOP ON SYSTEMS SECURITY (EUROSEC 2019), 2019,
[3]   Tokenised Multi-client Provisioning for Dynamic Searchable Encryption with Forward and Backward Privacy [J].
Bag, Arnab ;
Patranabis, Sikhar ;
Mukhopadhyay, Debdeep .
PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, :1691-1707
[4]   Personal health record storage and sharing using searchable encryption and blockchain: A comprehensive survey [J].
Bisht, Abhishek ;
Das, Ashok Kumar ;
Giri, Debasis .
SECURITY AND PRIVACY, 2024, 7 (02)
[5]   Efficient Personal-Health-Records Sharing in Internet of Medical Things Using Searchable Symmetric Encryption, Blockchain, and IPFS [J].
Bisht, Abhishek ;
Das, Ashok Kumar ;
Niyato, Dusit ;
Park, Youngho .
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2023, 4 :2225-2244
[6]  
Boneh D, 2013, LECT NOTES COMPUT SC, V8270, P280, DOI 10.1007/978-3-642-42045-0_15
[7]   Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [J].
Bost, Raphael ;
Minaud, Brice ;
Ohrimenko, Olga .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1465-1482
[8]   Σοφοζ - Forward Secure Searchable Encryption [J].
Bost, Raphael .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :1143-1154
[9]  
Boyle E, 2014, LECT NOTES COMPUT SC, V8383, P501, DOI 10.1007/978-3-642-54631-0_29
[10]  
Brasser F., 2017, P 11 USENIX SEC S, P431