Flexible symmetric predicate encryption for data privacy in IoT environments

被引:1
|
作者
Bian, Qingquan [1 ]
Zhang, Yue [2 ]
Song, Chang [3 ]
Wu, Axin [4 ]
机构
[1] Henan Polytech Inst, Sch Elect & Informat Engn, Nanyang 473000, Peoples R China
[2] Henan Coll Police, Ctr Modern Educ Technol, Zhengzhou 450000, Peoples R China
[3] China Unicom Smart City Res Inst, Baoding 071700, Peoples R China
[4] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Peoples R China
关键词
Internet of things; Data privacy; Symmetric predicate encryption; Fine-grained access control; EFFICIENT; INTERNET; THINGS;
D O I
10.1007/s12083-023-01619-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) applications are revolutionizing lifestyles and social management. In IoT environments, there is a need to deploy a large number of sensing devices, which are typically resource-constrained, with limited computational power and communication resources. Due to its open nature, IoT applications confront potential security and privacy risks in exchange for convenience, with data privacy being a significant concern. Predicate encryption (PE) offers a promising approach to address this concern. However, most PE schemes are public-key cryptosystems, which are more expensive compared to symmetric cryptography. These costs are burdensome for resource-constrained devices, especially when dealing with massive amounts of data. A recent study by Viet et al. (ESORICS'2022) introduced a symmetric PE scheme. However, this scheme's representation of attributes and predicates is limited. To overcome this limitation, we propose a flexible symmetric PE scheme. In the proposed scheme, predicates and attributes are represented using vectors. Tokens are related to predicates, while ciphertexts are associated with attributes. The encrypted message can be decrypted when the values of the predicate vector and attribute vector are pairwise unequal. This scheme enables fine-grained access control over encrypted data, ensuring that users with any attribute value in the vector embedded in the ciphertext cannot decrypt it. The security analysis demonstrates that the proposed scheme effectively protects data privacy. Additionally, performance evaluations indicate that the scheme is efficient, providing a lightweight solution for data privacy in IoT environments.
引用
收藏
页码:656 / 664
页数:9
相关论文
共 50 条
  • [31] Towards Privacy Preserving IoT Environments: A Survey
    Seliem, Mohamed
    Elgazzar, Khalid
    Khalil, Kasem
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [32] Towards Position-Aware Symbol-Based Searches on Encrypted Data from Symmetric Predicate Encryption Schemes
    Tseng, Fu-Kuo
    Chen, Rong-Jaye
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (01) : 426 - 428
  • [33] Differential Privacy-Preserving IoT Data Sharing Through Enhanced PSO
    Dhavamani, Logeshwari
    Ananthavadivel, Devipriya
    Akilandeswari, P.
    Nanajappan, Manikandan
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
  • [34] The New Method of Sensor Data Privacy Protection for IoT
    Wu, Yue
    Song, Liangtu
    Liu, Lei
    SHOCK AND VIBRATION, 2021, 2021
  • [35] Efficient and Strong Symmetric Password Authenticated Key Exchange With Identity Privacy for IoT
    Lian, Huanhuan
    Yang, Yafang
    Zhao, Yunlei
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (06) : 4725 - 4734
  • [36] An Evolving TinyML Compression Algorithm for IoT Environments Based on Data Eccentricity
    Signoretti, Gabriel
    Silva, Marianne
    Andrade, Pedro
    Silva, Ivanovitch
    Sisinni, Emiliano
    Ferrari, Paolo
    SENSORS, 2021, 21 (12)
  • [37] A Privacy Protection Scheme for IoT Big Data Based on Time and Frequency Limitation
    Zhang, Lei
    Huo, Yu
    Ge, Qiang
    Ma, Yuxiang
    Liu, Qiqi
    Ouyang, Wenlei
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [38] An Efficient, Verifiable, and Dynamic Searchable Symmetric Encryption with Forward Privacy
    Salmani, Khosro
    2022 19TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY & TRUST (PST), 2022,
  • [39] Research and Design of Encryption Standards Based on IoT Network Layer Information Security of Data
    Wang, Jia
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2024, 11 (05):
  • [40] IoT Privacy and Security Challenges for Smart Home Environments
    Lin, Huichen
    Bergmann, Neilw.
    INFORMATION, 2016, 7 (03)