Verifiable Data Search with Fine-Grained Authorization in Edge Computing

被引:1
作者
Li, Jianwei [1 ]
Wang, Xiaoming [1 ]
Gan, Qingqing [2 ]
机构
[1] Jinan Univ, Dept Informat Sci & Technol, Guangzhou 510632, Peoples R China
[2] Guangdong Univ Foreign Studies, Dept Cyber Secur, Guangzhou 510006, Peoples R China
基金
中国国家自然科学基金;
关键词
PUBLIC-KEY ENCRYPTION;
D O I
10.1155/2022/4252466
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the research of searchable encryption, fine-grained data authorization is a convenient way to manage the search rights for users. Recently, Liu et al. proposed a fine-grained searchable scheme with verification, which can control the search authorization and verify the results. In this paper, we first present a forgery attack against Liu et al.'s scheme and then propose a novel scheme of verifiable data search with fine-grained authorization in edge environment. Based on the key aggregate mechanism and Merkle hash tree, our proposed scheme not only achieves file-oriented search permission management but also implements the correctness and completeness verification of search results. In addition, with the assistance of edge server, resource-constrained users can easily perform the tasks of search and verification. Finally, we prove our scheme is secure based on the decision l-bilinear Diffie-Hellman exponent problem. The performance analysis and experiment results demonstrate that our proposed scheme has lower computation, communication, and storage costs contrast to the existing schemes.
引用
收藏
页数:15
相关论文
共 38 条
[1]  
Abdalla M., 2005, P ANN INT CRYPTOLOGY
[2]  
Ahmad Sahan, 2019, 2019 IEEE 21st International Conference on High Performance Computing and Communications
[3]  
IEEE 17th International Conference on Smart City
[4]  
IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS). Proceedings, P662, DOI 10.1109/HPCC/SmartCity/DSS.2019.00100
[5]  
[Anonymous], 2013, CYBERSPACE SAFETY SE
[6]   Hierarchical identity based encryption with constant size ciphertext [J].
Boneh, D ;
Boyen, X ;
Goh, EJ .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :440-456
[7]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[8]   Privacy-preserving searchable encryption in the intelligent edge computing [J].
Chen, Qi ;
Fan, Kai ;
Zhang, Kuan ;
Wang, Haoyang ;
Li, Hui ;
Yang, Yingtang .
COMPUTER COMMUNICATIONS, 2020, 164 :31-41
[9]   Witness-based searchable encryption with optimal overhead for cloud-edge computing [J].
Chen, Yu-Chi ;
Xie, Xin ;
Wang, Peter Shaojui ;
Tso, Raylin .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 :715-723
[10]   Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage [J].
Cui, Baojiang ;
Liu, Zheli ;
Wang, Lingyu .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) :2374-2385