Flexible symmetric predicate encryption for data privacy in IoT environments

被引:1
|
作者
Bian, Qingquan [1 ]
Zhang, Yue [2 ]
Song, Chang [3 ]
Wu, Axin [4 ]
机构
[1] Henan Polytech Inst, Sch Elect & Informat Engn, Nanyang 473000, Peoples R China
[2] Henan Coll Police, Ctr Modern Educ Technol, Zhengzhou 450000, Peoples R China
[3] China Unicom Smart City Res Inst, Baoding 071700, Peoples R China
[4] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Peoples R China
关键词
Internet of things; Data privacy; Symmetric predicate encryption; Fine-grained access control; EFFICIENT; INTERNET; THINGS;
D O I
10.1007/s12083-023-01619-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) applications are revolutionizing lifestyles and social management. In IoT environments, there is a need to deploy a large number of sensing devices, which are typically resource-constrained, with limited computational power and communication resources. Due to its open nature, IoT applications confront potential security and privacy risks in exchange for convenience, with data privacy being a significant concern. Predicate encryption (PE) offers a promising approach to address this concern. However, most PE schemes are public-key cryptosystems, which are more expensive compared to symmetric cryptography. These costs are burdensome for resource-constrained devices, especially when dealing with massive amounts of data. A recent study by Viet et al. (ESORICS'2022) introduced a symmetric PE scheme. However, this scheme's representation of attributes and predicates is limited. To overcome this limitation, we propose a flexible symmetric PE scheme. In the proposed scheme, predicates and attributes are represented using vectors. Tokens are related to predicates, while ciphertexts are associated with attributes. The encrypted message can be decrypted when the values of the predicate vector and attribute vector are pairwise unequal. This scheme enables fine-grained access control over encrypted data, ensuring that users with any attribute value in the vector embedded in the ciphertext cannot decrypt it. The security analysis demonstrates that the proposed scheme effectively protects data privacy. Additionally, performance evaluations indicate that the scheme is efficient, providing a lightweight solution for data privacy in IoT environments.
引用
收藏
页码:656 / 664
页数:9
相关论文
共 50 条
  • [41] Artistic expression and data protection: Balancing aesthetics with data privacy in IoT
    Zhang, Qi
    HELIYON, 2023, 9 (09)
  • [42] Privacy-Preserving Federated Learning for Intrusion Detection in IoT Environments: A Survey
    Vyas, Abhishek
    Lin, Po-Ching
    Hwang, Ren-Hung
    Tripathi, Meenakshi
    IEEE ACCESS, 2024, 12 : 127018 - 127050
  • [43] Data Verification and Privacy in IoT Architecture
    Lomotey, Richard K.
    Rickabaugh, Jacob
    Slivkanich, Natalia
    Orji, Rita
    2019 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2019), 2019, : 66 - 71
  • [44] Flexible Security and Privacy, System Architecture for IoT, in Healthcare
    Tsantikidou, Kyriaki
    Sklavos, Nicolas
    PROCEEDINGS OF THE 2022 IFIP/IEEE 30TH INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2022,
  • [45] A Robust and Optional Privacy Data Aggregation Scheme for Fog-Enhanced IoT Network
    Zeng, Zhixin
    Liu, Yining
    Chang, Liang
    IEEE SYSTEMS JOURNAL, 2023, 17 (01): : 1110 - 1120
  • [46] The Privacy Protection of IoT Data Fusion and Sensing Detection Under Artificial Intelligence Technology
    Zhang, Xinyue
    WIRELESS PERSONAL COMMUNICATIONS, 2024,
  • [47] A Robust Energy Optimization and Data Reduction Scheme for IoT Based Indoor Environments Using Local Processing Framework
    Bebortta, Sujit
    Singh, Amit Kumar
    Pati, Bibudhendu
    Senapati, Dilip
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2021, 29 (01)
  • [48] An Easily Scalable Docker-Based Privacy-Preserving Malicious Traffic Detection Architecture for IoT Environments
    Niu, Tong
    Liu, Yaqiu
    Li, Qingfeng
    Bao, Qichi
    IEEE ACCESS, 2024, 12 : 191010 - 191019
  • [49] Verifiable Multilevel Dynamic Searchable Encryption With Forward and Backward Privacy in Cloud-Assisted IoT
    Ge, Yue
    Gao, Ying
    Ning, Jianting
    Ma, Jie
    Chen, Xiaofeng
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (24): : 40861 - 40874
  • [50] Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage
    Wang, Xu An
    Xhafa, Fatos
    Cai, Weiyi
    Ma, Jianfeng
    Wei, Fushan
    COMPUTERS & ELECTRICAL ENGINEERING, 2016, 56 : 871 - 883