Toward Data Security in 6G Networks: A Public-Key Searchable Encryption Approach

被引:6
作者
Shi, Junbin [1 ,2 ]
Yu, Yong [1 ,2 ]
Yu, Qiming [1 ,2 ]
Li, Huilin [3 ]
Wang, Lianhai [4 ]
机构
[1] Shaanxi Normal Univ, Xian, Peoples R China
[2] Sci & Technol Commun Secur Lab, Xian, Peoples R China
[3] Beihang Univ, Beijing, Peoples R China
[4] Qilu Univ Technol, Shandong Acad Sci, Shandong Prov Key Lab Comp Networks, Jinan, Peoples R China
来源
IEEE NETWORK | 2022年 / 36卷 / 04期
基金
中国国家自然科学基金;
关键词
KEYWORD SEARCH;
D O I
10.1109/MNET.006.2100714
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the advances of the fifth generation (5G) mobile communication technology, smart applications enhance the quality of daily life, the urban management by the government and the effective allocation of resources. Smart applications collect data through the Internet of Things, store massive data in the cloud server, and use cloud computing and deep learning to analyze the data, according to the data analysis results to guide human production and life. However, with the breakthrough of 6G technology, the amount of data applied is increasing, and the demand for privacy protection is becoming more prominent. Encrypting data using traditional cryptographic algorithms can solve the problem of privacy leakage, but it hampers the availability of the data. Searchable encryption is a special encryption structure with keyword search, which balances the availability and privacy of massive data. In this article, we analyze some typical security and privacy issues in 6G-based applications, discuss the solutions to these problems, and present a framework of 6G-based smart cities with searchable encryption, which provides a guarantee for the privacy and availability of smart city data (including ciphertext search, access control, etc.). We also propose a searchable encryption solution based on ciphertext-policy attribute-based encryption to solve the conflict between security and data availability of the smart cities as a specific scenario in order to demonstrate the contribution of cryptographic technologies such as public-key searchable encryption to the 6th generation mobile communication technology.
引用
收藏
页码:166 / 173
页数:8
相关论文
共 15 条
[1]  
Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
[2]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[3]   A Comprehensive Review of the COVID-19 Pandemic and the Role of IoT, Drones, AI, Blockchain, and 5G in Managing its Impact [J].
Chamola, Vinay ;
Hassija, Vikas ;
Gupta, Vatsal ;
Guizani, Mohsen .
IEEE ACCESS, 2020, 8 :90225-90265
[4]  
Du X., 2004, Ad Hoc Networks, V2, P241
[5]  
Kirti Gagandeep, 2020, Integration of WSN and IoT for Smart Cities, P65
[6]   Design for Collaborative Survival: An Inquiry into Human-Fungi Relationships [J].
Liu, Jen ;
Byrne, Daragh ;
Devendorf, Laura .
PROCEEDINGS OF THE 2018 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2018), 2018,
[7]   Trapdoor security in a searchable public-key encryption scheme with a designated tester [J].
Rhee, Hyun Sook ;
Park, Jong Hwan ;
Susilo, Willy ;
Lee, Dong Hoon .
JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (05) :763-771
[8]   Fuzzy identity-based encryption [J].
Sahai, A ;
Waters, B .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :457-473
[9]   Proxy re-encryption with keyword search [J].
Shao, Jun ;
Cao, Zhenfu ;
Liang, Xiaohui ;
Lin, Huang .
INFORMATION SCIENCES, 2010, 180 (13) :2576-2587
[10]  
Song DXD, 2000, P IEEE S SECUR PRIV, P44, DOI 10.1109/SECPRI.2000.848445