A new efficient privacy-preserving data publish-subscribe scheme

被引:5
作者
Chen, Ping [1 ]
Wang, Zhiying [1 ]
Tao, Xiaoling [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian, Shaanxi, Peoples R China
[2] Guilin Univ Elect Technol, Sch Comp Sci & Informat Secur, Guilin, Guangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
privacy-preserving; data publish-subscribe; CP-ABE; BFtree; cloud platform; ACCESS-CONTROL; SYSTEMS; ALGORITHMS;
D O I
10.1504/IJES.2019.099406
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Data publish-subscribe is an efficient service for users to share and receive data selectively. Due to the powerful computing resources and storage capacity, the cloud platform is considered as the most appropriate choice to publish and subscribe large-scale data generated in real-world life. However, the cloud platform may be curious about the content of published data and subscribers' interests. In this paper, we aimed at realising a secure and efficient privacy-preserving data publish-subscribe scheme on cloud platforms. On one hand, we adopt ciphertext-policy attribute-based encryption (CPABE) to encrypt the data based on it's access policy. Moreover, part of the decryption computation is shifted to the cloud platform to reduce subscribers' computation overhead. On the other hand, we utilise an efficient searchable encryption scheme based on Bloom Filter tree (BFtree) to protect subscribers' privacy and match their interests with encrypted data. Not only that, publishers and subscribers can also exchange their roles in our scheme. The security analysis and experimental results prove that our scheme is efficient and secure in privacy-preserving data publish-subscribe service.
引用
收藏
页码:374 / 385
页数:12
相关论文
共 42 条
  • [1] [Anonymous], 2013, LNCS, DOI DOI 10.1007/978-3-642-38631-2_34
  • [2] [Anonymous], 2011, P 6 ACM S INFORM COM
  • [3] A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid
    Baek, Joonsang
    Quang Hieu Vu
    Liu, Joseph K.
    Huang, Xinyi
    Xiang, Yang
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2015, 3 (02) : 233 - 244
  • [4] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [5] SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS
    BLOOM, BH
    [J]. COMMUNICATIONS OF THE ACM, 1970, 13 (07) : 422 - &
  • [6] Chen T., 2016, 2016 IEEE POWER ENER, P1, DOI [DOI 10.1109/PESGM.2016.7741283, https://doi.org/10.3390/su8101069]
  • [7] New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations
    Chen, Xiaofeng
    Huang, Xinyi
    Li, Jin
    Ma, Jianfeng
    Lou, Wenjing
    Wong, Duncan S.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (01) : 69 - 78
  • [8] New Algorithms for Secure Outsourcing of Modular Exponentiations
    Chen, Xiaofeng
    Li, Jin
    Ma, Jianfeng
    Tang, Qiang
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (09) : 2386 - 2396
  • [9] New and efficient conditional e-payment systems with transferability
    Chen, Xiaofeng
    Li, Jin
    Ma, Jianfeng
    Lou, Wenjing
    Wong, Duncan S.
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 37 : 252 - 258
  • [10] Efficient Fair Conditional Payments for Outsourcing Computations
    Chen, Xiaofeng
    Li, Jin
    Susilo, Willy
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (06) : 1687 - 1694