Subversion-resistant public-key searchable encryption for data sharing in IIoT

被引:0
|
作者
Zhou, Rang [1 ]
He, Yongkang [1 ]
Li, Wanpeng [2 ]
Wang, Yanping [3 ]
Zhang, Xiaojun [4 ]
机构
[1] Chengdu Univ Technol, Coll Comp Sci & Cyber Secur, Chengdu 610059, Peoples R China
[2] Univ Aberdeen, Dept Comp Sci, Aberdeen, Scotland
[3] Xihua Univ, Sch Comp & Software Engn, Chengdu 610039, Peoples R China
[4] Southwest Petr Univ, Sch Comp Sci & Software Engn, Chengdu 610500, Peoples R China
基金
中国国家自然科学基金;
关键词
Searchable encryption; Cryptographic reverse firewall; Subversion-resistant; Industrial Internet of Things (IIoT); KEYWORD SEARCH; SECURE; SCHEME; INTERNET;
D O I
10.1016/j.sysarc.2025.103370
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid growth of the Industrial Internet of Things (IIoT) has driven companies to leverage its potential for enhancing manufacturing efficiency, relying heavily on data analysis. This has led to the collection of vast IIoT data volumes, often stored securely on encrypted cloud servers. To facilitate streamlined data retrieval, keyword search technology is widely employed. Traditional keyword searchable schemes focus on ensuring keyword privacy within the trapdoor and index structures. However, advanced backdoor attacks have emerged as a significant threat. These attacks exploit hidden backdoors in software or hardware, allowing random number manipulation that undermines the security of existing keyword-searchable encryption scheme. To mitigate these attacks, we propose a novel subversion-resistant public-key searchable encryption scheme that incorporates cryptographic reverse firewalls (CRFs). In our scheme, we designed a trust zone to deploy these CRFs. Moreover, the CRFs in the trust zone is randomly chosen to re-randomize the trapdoor and index values, thereby enhancing security against backdoor attacks. Additionally, our scheme facilitates data sharing in the model of one-to-one sending and receiving between different users. Performance testing demonstrates that our scheme requires only lightweight operations for the ReTrapdoor and RePEKS algorithms, making it well-suited for deployment on resource-constrained IIoT devices.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data
    Chen, Biwen
    Wu, Libing
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    He, Debiao
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (04) : 1753 - 1764
  • [2] A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing
    Chen, Biwen
    Wu, Libing
    Li, Li
    Choo, Kim-Kwang Raymond
    He, Debiao
    IEEE ACCESS, 2020, 8 : 28009 - 28020
  • [3] Searchable Public-Key Encryption with Data Sharing in Dynamic Groups for Mobile Cloud Storage
    Xia, Qi
    Ni, Jianbing
    Kanpogninge, Ansuura John Bosco Aristotle
    Gee, James C.
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2015, 21 (03) : 440 - 453
  • [4] SR-PEKS: Subversion-Resistant Public Key Encryption With Keyword Search
    Jiang, Changsong
    Xu, Chunxiang
    Zhang, Zhao
    Chen, Kefei
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) : 3168 - 3183
  • [5] Searchable Public-Key Encryption With Cryptographic Reverse Firewalls for Cloud Storage
    Zhou, Yuyang
    Hu, Zhebin
    Li, Fagen
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 383 - 396
  • [6] Certificateless Public Key Authenticated Searchable Encryption With Enhanced Security Model in IIoT Applications
    Cheng, Leixiao
    Meng, Fei
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (02): : 1391 - 1400
  • [7] Hidden-Token Searchable Public-Key Encryption
    Zuo, Cong
    Shao, Jun
    Liu, Zhe
    Ling, Yun
    Wei, Guiyi
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 248 - 254
  • [8] Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage
    Wu, Axin
    Li, Fagen
    Xin, Xiangjun
    Zhang, Yinghui
    Zhu, Jianhao
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 149
  • [9] Security-enhanced public-key authenticated searchable encryption
    Cheng, Leixiao
    Qin, Jing
    Feng, Feng
    Meng, Fei
    INFORMATION SCIENCES, 2023, 647
  • [10] Multi-keyword ranked searchable public-key encryption
    Hu, Chengyu
    Yang, Bo
    Liu, Pengtao
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2015, 6 (3-4) : 221 - 231