Attribute-Based Searchable Encryption in Edge Computing for Lightweight Devices

被引:9
作者
Niu, Shufen [1 ]
Hu, Ying [1 ]
Zhou, Siwei [1 ]
Shao, Honglin [1 ]
Wang, Caifen [2 ]
机构
[1] Northwest Normal Univ, Sch Comp Sci & Engn, Lanzhou 730000, Peoples R China
[2] Shenzhen Univ Technol, Sch Data & Internet, Shenzhen 518118, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2023年 / 17卷 / 03期
基金
中国国家自然科学基金;
关键词
Attribute-based encryption; edge computing; outsourcing decryption; privacy protection; searchable encryption;
D O I
10.1109/JSYST.2023.3283389
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of the Internet has dramatically facilitated the present society. While a large amount of data is produced, private data security involves users' data rights. Traditionally, attribute-based encryption (ABE) still needs to improve efficiency in the face of a large amount of data. The introduction of edge computing environments reduces the operating costs of lightweight devices by outsourcing some encryption and decryption operations. Therefore, we design an efficient attribute-based encryption scheme under edge computing that supports keyword search. Data owners and users do not disclose private information to the cloud during the search phase. Our work considers the computational efficiency of ordinary and lightweight users, and partial operations can be outsourced according to the demand during decryption, which is more flexible and applicable to practical applications. The scheme also supports efficient attribute revocation and ciphertext update in the cloud environment. Moreover, the proposed algorithm has been proven to be IND-sCP-CPA security and IND-CKA security. The work compares our algorithm with some typical schemes in terms of storage overhead and computation cost in the end. The performance analysis results indicate that the proposed work is efficient and suitable for edge computing.
引用
收藏
页码:3503 / 3514
页数:12
相关论文
共 32 条
[1]  
Ali M., 2020, J. New Media, V1, P31
[2]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[3]  
Cao LC, 2020, CHINA COMMUN, V17, P153, DOI 10.23919/JCC.2020.06.013
[4]  
Green Matthew., 2011, USENIX SECURITY S, V2011
[5]  
[黄凤鸣 Huang Fengming], 2020, [计算机工程, Computer Engineering], V46, P34
[6]  
Huang K., 2021, SECUR COMMUN NETW, V1, P1
[7]  
Huang S., 2019, COMPUT SYST APPL, V28, P79
[8]   User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage [J].
Li, Jiguo ;
Yao, Wei ;
Han, Jinguang ;
Zhang, Yichen ;
Shen, Jian .
IEEE SYSTEMS JOURNAL, 2018, 12 (02) :1767-1777
[9]  
Kamal A., 2021, J INF SECUR APPL, V59, P1
[10]  
Lai J., 2013, IEEE T INF FOREN SEC, V13, P43