Lattice-based public key searchable encryption with fine-grained access control for edge computing

被引:19
作者
Wang, Peng [1 ]
Chen, Biwen [2 ]
Xiang, Tao [2 ]
Wang, Zhongming [2 ]
机构
[1] Chongqing Univ Sci & Technol, Sch Intelligent Technol & Engn, Chongqing 401331, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2022年 / 127卷
基金
中国国家自然科学基金;
关键词
Edge computing; Searchable encryption; Post-quantum security; Learning with errors; IDENTITY-BASED ENCRYPTION; KEYWORD SEARCH; SECURITY; INTERNET;
D O I
10.1016/j.future.2021.09.012
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As a bridge between cloud computing platforms and the Internet of Things (IoT) devices, edge computing provides various on-demand data services to reduce latency and network congestion. To ensure data security in edge computing, sensitive data should be encrypted before being outsourced to edge servers. Public key encryption with keyword search (PEKS) can provide search service for encrypted data. Nevertheless, most existing PEKS schemes are susceptible to quantum attacks because their security assumptions are based on traditional hardness assumptions. Moreover, many lattice based PEKS schemes only apply to the single-user scenario, limiting the range of applications. In this paper, we present an efficient lattice-based public key searchable encryption with fine-grained access control for edge computing. Our scheme achieves post-quantum security and highly flexible access control policies for multi-user applications, by utilizing the learning with errors (LWE) assumption and subset predicate encryption. The security proof illustrates that our proposed scheme is secure under chosen plaintext attacks and chosen keyword attacks. Finally, extensive experiments on real-world datasets illustrate that our encryption algorithm is faster than existing approaches. (C) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页码:373 / 383
页数:11
相关论文
共 50 条
[41]   Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System [J].
Mamta ;
Brij BGupta ;
KuanChing Li ;
Victor C M Leun ;
Kostas EPsannis ;
Shingo Yamaguchi .
IEEE/CAAJournalofAutomaticaSinica, 2021, 8 (12) :1877-1890
[42]   Fine-grained access control of PDM and CAPP [J].
Feng, SH ;
Jiang, ZL .
ADVANCES IN MATERIALS MANUFACTURING SCIENCE AND TECHNOLOGY, 2004, 471-472 :573-576
[43]   Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System [J].
Mamta ;
Gupta, Brij B. ;
Li, Kuan-Ching ;
Leung, Victor C. M. ;
Psannis, Kostas E. ;
Yamaguchi, Shingo .
IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2021, 8 (12) :1877-1890
[44]   Lattice-Based Searchable Encryption With Keywords Revocable and Bounded Trapdoor Exposure Resistance [J].
Yu, Xiaoling ;
Xu, Chungen ;
Xu, Lei .
IEEE ACCESS, 2019, 7 :43179-43189
[45]   Lattice-Based Searchable Encryption Scheme against Inside Keywords Guessing Attack [J].
Yu, Xiaoling ;
Xu, Chungen ;
Xu, Lei ;
Wang, Yuntao .
CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 64 (02) :1107-1125
[46]   An Attribute-Based Encryption Scheme with Revocation for Fine-Grained Access Control in Wireless Body Area Networks [J].
Tian, Ye ;
Peng, Yanbin ;
Peng, Xinguang ;
Li, Hongbin .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
[47]   Fine-grained Resource Management for Edge Computing Satellite Networks [J].
Wang, Feng ;
Jiang, Dingde ;
Qi, Sheng ;
Qiao, Chen ;
Song, Houbing .
2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
[48]   Fine-Grained Secure Attribute-Based Encryption [J].
Yuyu Wang ;
Jiaxin Pan ;
Yu Chen .
Journal of Cryptology, 2023, 36
[49]   Fine-Grained Secure Attribute-Based Encryption [J].
Wang, Yuyu ;
Pan, Jiaxin ;
Chen, Yu .
JOURNAL OF CRYPTOLOGY, 2023, 36 (04)
[50]   DACSC: Dynamic and Fine-Grained Access Control for Secure Data Collaboration in Cloud Computing [J].
Huang, Qinlong ;
Li, Nan ;
Yang, Yixian .
2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,