Lattice-based public key searchable encryption with fine-grained access control for edge computing

被引:17
作者
Wang, Peng [1 ]
Chen, Biwen [2 ]
Xiang, Tao [2 ]
Wang, Zhongming [2 ]
机构
[1] Chongqing Univ Sci & Technol, Sch Intelligent Technol & Engn, Chongqing 401331, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2022年 / 127卷
基金
中国国家自然科学基金;
关键词
Edge computing; Searchable encryption; Post-quantum security; Learning with errors; IDENTITY-BASED ENCRYPTION; KEYWORD SEARCH; SECURITY; INTERNET;
D O I
10.1016/j.future.2021.09.012
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As a bridge between cloud computing platforms and the Internet of Things (IoT) devices, edge computing provides various on-demand data services to reduce latency and network congestion. To ensure data security in edge computing, sensitive data should be encrypted before being outsourced to edge servers. Public key encryption with keyword search (PEKS) can provide search service for encrypted data. Nevertheless, most existing PEKS schemes are susceptible to quantum attacks because their security assumptions are based on traditional hardness assumptions. Moreover, many lattice based PEKS schemes only apply to the single-user scenario, limiting the range of applications. In this paper, we present an efficient lattice-based public key searchable encryption with fine-grained access control for edge computing. Our scheme achieves post-quantum security and highly flexible access control policies for multi-user applications, by utilizing the learning with errors (LWE) assumption and subset predicate encryption. The security proof illustrates that our proposed scheme is secure under chosen plaintext attacks and chosen keyword attacks. Finally, extensive experiments on real-world datasets illustrate that our encryption algorithm is faster than existing approaches. (C) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页码:373 / 383
页数:11
相关论文
共 50 条
  • [21] Key-Policy Attribute-Based Encryption With Switchable Attributes for Fine-Grained Access Control of Encrypted Data
    Luo, Fucai
    Wang, Haiyan
    Yan, Xingfu
    Wu, Jiahui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 7245 - 7258
  • [22] A Fine-Grained IoT Data Access Control Scheme Combining Attribute-Based Encryption and Blockchain
    Lu, Xiaofeng
    Fu, Songbing
    Jiang, Cheng
    Lio, Pietro
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [23] BTG-RKASE: Privacy Preserving Revocable Key Aggregate Searchable Encryption with Fine-grained Multi-delegation & Break-The-Glass Access Control
    Padhya, Mukti
    Jinwala, Devesh C.
    PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 109 - 124
  • [24] Lattice-based certificateless public-key encryption in the standard model
    Sepahi, Reza
    Steinfeld, Ron
    Pieprzyk, Josef
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (04) : 315 - 333
  • [25] Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits
    MahdaviOliaee, Mahdi
    Ahmadian, Zahra
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2023, 19 (04) : 515 - 528
  • [26] A dual auditing protocol for fine-grained access control in the edge-cloud-based smart home
    Zhang, XiaoXu
    Shi, Run-hua
    Guo, WanPeng
    Wang, PengBo
    Ke, WeiYang
    COMPUTER NETWORKS, 2023, 228
  • [27] Fine-Grained Access Control in the Era of Cloud Computing: An Analytical Review
    Albulayhi, Khalid
    Abuhussein, Abdullah
    Alsubaei, Faisal
    Sheldon, Frederick T.
    2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 748 - 755
  • [28] Conjunctive multi-key searchable encryption with attribute-based access control for EHR systems
    Li, Wanhua
    Xu, Lingling
    Wen, Yamin
    Zhang, Fangguo
    COMPUTER STANDARDS & INTERFACES, 2022, 82
  • [29] Keyword Searchable Encryption with Fine-Grained Forward Secrecy for Internet of Thing Data
    Zhou, Rang
    Zhang, Xiaosong
    Wang, Xiaofen
    Yang, Guowu
    Li, Wanpeng
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 288 - 302
  • [30] Fine-Grained Access Control for Microservices
    Nehme, Antonio
    Jesus, Vitor
    Mahbub, Khaled
    Abdallah, Ali
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2018, 2019, 11358 : 285 - 300