Provable secure lightweight attribute-based keyword search for cloud-based Internet of Things networks

被引:7
作者
Ali, Mohammad [1 ]
Sadeghi, Mohammad-Reza [1 ]
机构
[1] Amirkabir Univ Technol, Dept Math & Comp Sci, Tehran, Iran
关键词
cloud computing; fine-grained access control; Internet of Things; lightweight searchable encryption; ENCRYPTION;
D O I
10.1002/ett.3905
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
As more data from Internet of Things (IoT) devices is outsourced to cloud service providers, the need for secure and efficient fine-grained access control and data retrieving mechanisms will be increasingly pressing. Attribute-based keyword search (ABKS) is a promising tool to provide the required infrastructures. However, most of the existing ABKS schemes suffer from expensive computational overhead on the user side. This feature makes such schemes unsuitable for IoT applications as IoT devices usually have limited computational resources. To address this problem, we design a lightweight ABKS scheme called LW-ABKS. In our scheme, by performing a constant number of efficient computational operations, a data owner can generate a searchable ciphertext. Indeed, in generating a searchable ciphertext, the number of operations performed by data owners modeling IoT devices does not depend on the number of attributes in the access control policy. Moreover, in LW-ABKS, an authorized data user can retrieve the outsourced data files by performing very lightweight computational operations. We also provide security definitions for the new primitive and prove its security in the standard model and under the hardness assumption of the discrete logarithm and the decisional bilinear Diffie-Hellman problems.
引用
收藏
页数:19
相关论文
共 44 条
[1]  
[Anonymous], 2015, IEEE T COMPUT
[2]  
[Anonymous], 2019, IEEE T SERV COMPUT
[3]  
Behnia R., 2018, IEEE Transactions on Dependable and Secure Computing, P1
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[6]   Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes [J].
Castiglione, Arcangelo ;
De Santis, Alfredo ;
Masucci, Barbara .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (04) :451-460
[7]  
Chaudhari P, 2019, IEEE T CLOUD COMPUT
[8]  
Chen B, 2019, IEEE T EMERG TOPICS
[9]   Runtime model based approach to IoT application development [J].
Chen, Xing ;
Li, Aipeng ;
Zeng, Xue'e ;
Guo, Wenzhong ;
Huang, Gang .
FRONTIERS OF COMPUTER SCIENCE, 2015, 9 (04) :540-553
[10]   Attribute-based Keyword Search Efficiency Enhancement Via an Online/Offline Approach [J].
Dong, Qiuxiang ;
Guan, Zhi ;
Chen, Zhong .
2015 IEEE 21ST INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2015, :298-305