KCB-BC-SSE: A Keyword Complete Binary Tree Searchable Symmetric Encryption Scheme using Blockchain

被引:3
作者
Liu, Xiru [1 ]
Wang, Guijuan [2 ]
Yan, Biwei [3 ]
Yu, Jiguo [2 ,4 ,5 ]
机构
[1] Qufu Normal Univ, Sch Comp Sci, Rizhao 276826, Shandong, Peoples R China
[2] Qilu Univ Technol, Sch Comp Sci & Technol, Shandong Acad Sci, Jinan 250353, Shandong, Peoples R China
[3] Qufu Normal Univ, Sch Math Sci, Qufu 273165, Shandong, Peoples R China
[4] Natl Supercomp Ctr Jinan, Shandong Comp Sci Ctr, Jinan 250014, Shandong, Peoples R China
[5] Shandong Lab Comp Networks, Jinan 250014, Shandong, Peoples R China
来源
2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020) | 2021年 / 187卷
关键词
Searchable Symmetric Encryption; Keyword Complete Binary Tree; Blockchain;
D O I
10.1016/j.procs.2021.04.114
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Internet of things (IoT) devices generate a massive amount of data every second in our lives. While cloud storage brings convenience to the users, it has the disadvantages of low scalability and weak reliability. Blockchain-based distributed storage eliminates data loss due to the tamper-resistant characteristic. Nonetheless, blockchain storage raises some confidentiality and retrieval efficiency issues of data. Searchable Symmetric Encryption (SSE) is an effective search scheme based on ciphertexts, which ensures data security. However, with the increase of data on the blockchain, the data retrieval on the blockchain will be difficult. In this paper, a Complete Binary Tree Searchable Symmetric Encryption using Blockchain (KCB-BC-SSE) scheme is proposed. According to the number of searchers, the scheme is divided into single searcher and multiple searchers where the search efficiency is improved in theory. And the simulation on ethereum shows the feasibility of our scheme. The security analysis illustrates our scheme achieves security under the chosen keyword attack. (C) 2021 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0) Peer-review under responsibility of the scientific committee of the International Conference on Identification, Information and Knowledge in the internet of Things, 2020.
引用
收藏
页码:377 / 382
页数:6
相关论文
共 16 条
[1]   A Differential-Private Framework for Urban Traffic Flows Estimation via Taxi Companies [J].
Cai, Zhipeng ;
Zheng, Xu ;
Yu, Jiguo .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (12) :6492-6499
[2]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[3]   Blockchain based searchable encryption for electronic health record sharing [J].
Chen, Lanxiang ;
Lee, Wai-Kong ;
Chang, Chin-Chen ;
Choo, Kim-Kwang Raymond ;
Zhang, Nan .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 95 (420-429) :420-429
[4]   Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage [J].
Cui, Baojiang ;
Liu, Zheli ;
Wang, Lingyu .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) :2374-2385
[5]   Searchain: Blockchain-based private keyword search in decentralized storage [J].
Jiang, Peng ;
Guo, Fuchun ;
Liang, Kaitai ;
Lai, Jianchang ;
Wen, Qiaoyan .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 :781-792
[6]  
Kamara S., 2012, CCS 2012, P965
[7]  
Li H, 2017, SEARCHABLE SYMMETRIC
[8]   Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage [J].
Liu, Xueqiao ;
Yang, Guomin ;
Mu, Yi ;
Deng, Robert H. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) :1322-1332
[9]  
Nakamoto S., 2008, White Paper
[10]   Searchable Symmetric Encryption: Designs and Challe [J].
Sen Poh, Geong ;
Chin, Ji-Jian ;
Yau, Wei-Chuen ;
Choo, Kim-Kwang Raymond ;
Mohamad, Moesfa Soeheila .
ACM COMPUTING SURVEYS, 2017, 50 (03)