Flexible symmetric predicate encryption for data privacy in IoT environments

被引:1
|
作者
Bian, Qingquan [1 ]
Zhang, Yue [2 ]
Song, Chang [3 ]
Wu, Axin [4 ]
机构
[1] Henan Polytech Inst, Sch Elect & Informat Engn, Nanyang 473000, Peoples R China
[2] Henan Coll Police, Ctr Modern Educ Technol, Zhengzhou 450000, Peoples R China
[3] China Unicom Smart City Res Inst, Baoding 071700, Peoples R China
[4] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Peoples R China
关键词
Internet of things; Data privacy; Symmetric predicate encryption; Fine-grained access control; EFFICIENT; INTERNET; THINGS;
D O I
10.1007/s12083-023-01619-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) applications are revolutionizing lifestyles and social management. In IoT environments, there is a need to deploy a large number of sensing devices, which are typically resource-constrained, with limited computational power and communication resources. Due to its open nature, IoT applications confront potential security and privacy risks in exchange for convenience, with data privacy being a significant concern. Predicate encryption (PE) offers a promising approach to address this concern. However, most PE schemes are public-key cryptosystems, which are more expensive compared to symmetric cryptography. These costs are burdensome for resource-constrained devices, especially when dealing with massive amounts of data. A recent study by Viet et al. (ESORICS'2022) introduced a symmetric PE scheme. However, this scheme's representation of attributes and predicates is limited. To overcome this limitation, we propose a flexible symmetric PE scheme. In the proposed scheme, predicates and attributes are represented using vectors. Tokens are related to predicates, while ciphertexts are associated with attributes. The encrypted message can be decrypted when the values of the predicate vector and attribute vector are pairwise unequal. This scheme enables fine-grained access control over encrypted data, ensuring that users with any attribute value in the vector embedded in the ciphertext cannot decrypt it. The security analysis demonstrates that the proposed scheme effectively protects data privacy. Additionally, performance evaluations indicate that the scheme is efficient, providing a lightweight solution for data privacy in IoT environments.
引用
收藏
页码:656 / 664
页数:9
相关论文
共 50 条
  • [21] Privacy-preserving using homomorphic encryption in Mobile IoT systems
    Ren, Wang
    Tong, Xin
    Du, Jing
    Wang, Na
    Li, Shan Cang
    Min, Geyong
    Zhao, Zhiwei
    Bashir, Ali Kashif
    COMPUTER COMMUNICATIONS, 2021, 165 : 105 - 111
  • [22] On the Relationship Between Inference and Data Privacy in Decentralized IoT Networks
    Sun, Meng
    Tay, Wee Peng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 852 - 866
  • [23] Blockchain for the IoT: Privacy-Preserving Protection of Sensor Data
    Chanson, Mathieu
    Bogner, Andreas
    Bilgeri, Dominik
    Fleisch, Elgar
    Wortmann, Felix
    JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2019, 20 (09): : 1274 - 1309
  • [24] Data Fusion and IoT for Smart Ubiquitous Environments: A Survey
    Alam, Furqan
    Mehmood, Rashid
    Katib, Iyad
    Albogami, Nasser N.
    Albeshri, Aiiad
    IEEE ACCESS, 2017, 5 : 9533 - 9554
  • [25] Data Governance for Security in IoT & Cloud Converged Environments
    Al-Ruithe, Majid
    Mthunzi, Siyakha
    Benkhelifa, Elhadj
    2016 IEEE/ACS 13TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2016,
  • [26] Using DNA to develop a lightweight symmetric encryption method to encrypt the data of IoT devices
    Al-Shargabi, Bassam
    Al-Dwairi, Rame Jamil
    Al-Husainy, Mohammed Abbas Fadhil
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (02) : 173 - 189
  • [27] Privacy Regulations Challenges on Data-centric and IoT Systems: A Case Study for Smart Vehicles
    Campanile, Lelio
    Iacono, Mauro
    Marulli, Fiammetta
    Mastroianni, Michele
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS), 2020, : 507 - 518
  • [28] Dual-server certificateless public key encryption with authorized equality test for outsourced IoT data
    Zhao, Meng
    Ding, Yong
    Tang, Shijie
    Liang, Hai
    Yang, Changsong
    Wang, Huiyong
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 73
  • [29] A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data
    Khan, Mohammad Ayoub
    Quasim, Mohammad Tabrez
    Alghamdi, Norah Saleh
    Khan, Mohammad Yahiya
    IEEE ACCESS, 2020, 8 : 52018 - 52027
  • [30] A Systematic Review on Privacy-Aware IoT Personal Data Stores
    Pinto, George P.
    Donta, Praveen Kumar
    Dustdar, Schahram
    Prazeres, Cassio
    SENSORS, 2024, 24 (07)