Double Rainbows: A Promising Distributed Data Sharing in Augmented Intelligence of Things

被引:9
作者
Chen, Long [1 ,2 ]
Xue, Lingyan [1 ,2 ]
Huang, Haiping [1 ,2 ]
Wang, Wenming [1 ,3 ]
Cao, Mengxun [1 ,2 ]
Xiao, Fu [1 ,2 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210003, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Jiangsu High Technol Res Key Lab Wireless Sensor, Nanjing 210003, Peoples R China
[3] Anqing Normal Univ, Key Lab Intelligent Percept & Comp Anhui Prov, Anqing 246003, Peoples R China
基金
中国国家自然科学基金;
关键词
Servers; Security; Task analysis; Encryption; Cloud computing; Public key; Medical services; Authentication; pairing-free searchable encryption; privacy preserving; smart contract; KEYWORD SEARCH; INDUSTRIAL INTERNET; ENCRYPTION;
D O I
10.1109/TII.2022.3199941
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Augmented Intelligence of Things enables many edge or end devices in the Internet of Things (IoT) to perform machine reasoning to make decisions, thus become more intelligent. For healthcare enterprises, huge physical data generated by smart devices facilitate to iterate their products. However, traditional data sharing models based on cloud outsourcing meet many security challenges, such as data confidentiality, reliability, and privacy protection, and most existing schemes have high computational complexity for the utilization of time-consuming cryptographic operations, such as bilinear pairing, which is not suitable for those resource-constrained IoT devices. To tackle the abovementioned issues, we present Double Rainbows, a promising data sharing scheme based on pairing-free searchable encryption. It is constructed on the cloud-edge-end architecture, supporting computing task transfer and reliable data storage and retrieval. The experimental results show that it outperforms in efficiency and exhibit more security functionalities.
引用
收藏
页码:653 / 661
页数:9
相关论文
共 29 条
[1]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[2]   A Survey of Provably Secure Searchable Encryption [J].
Bosch, Christoph ;
Hartel, Pieter ;
Jonker, Willem ;
Peter, Andreas .
ACM COMPUTING SURVEYS, 2015, 47 (02)
[3]   Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain [J].
Cao, Sheng ;
Zhang, Gexiang ;
Liu, Pengfei ;
Zhang, Xiaosong ;
Neri, Ferrante .
INFORMATION SCIENCES, 2019, 485 :427-440
[4]   A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks [J].
Chen, Biwen ;
Wu, Libing ;
Wang, Huaqun ;
Zhou, Lu ;
He, Debiao .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) :5813-5825
[5]   Distributed computation offloading method based on deep reinforcement learning in ICV [J].
Chen, Chen ;
Zhang, Yuru ;
Wang, Zheng ;
Wan, Shaohua ;
Pei, Qingqi .
APPLIED SOFT COMPUTING, 2021, 103
[6]   Blockchain based searchable encryption for electronic health record sharing [J].
Chen, Lanxiang ;
Lee, Wai-Kong ;
Chang, Chin-Chen ;
Choo, Kim-Kwang Raymond ;
Zhang, Nan .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 95 :420-429
[7]   Secret sharing with secure secret reconstruction [J].
Harn, Lein ;
Xia, Zhe ;
Hsu, Chingfang ;
Liu, Yining .
INFORMATION SCIENCES, 2020, 519 :1-8
[8]   Certificateless Public Key Authenticated Encryption With Keyword Search or Industrial Internet of Things [J].
He, Debiao ;
Ma, Mimi ;
Zeadally, Sherali ;
Kumar, Neeraj ;
Liang, Kaitai .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) :3618-3627
[9]  
Jinna Hu, 2021, IEEE Communications Standards Magazine, V5, P12, DOI [10.1109/mcomstd.001.2000017, 10.1109/MCOMSTD.001.2000017]
[10]   Reliable Data Sharing by Certificateless Encryption Supporting Keyword Search Against Vulnerable KGC in Industrial Internet of Things [J].
Karati, Arijit ;
Fan, Chun-, I ;
Zhuang, Er-Shuo .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (06) :3661-3669