Distributed and Privacy-Preserving Data Dissemination at the Network Edge via Attribute-Based Searchable Encryption

被引:4
作者
Huso, Ingrid [1 ]
Piro, Giuseppe
Boggia, Gennaro
机构
[1] Politecn Bari, Dept Elect & Informat Engn, Bari, Italy
来源
2022 20TH MEDITERRANEAN COMMUNICATION AND COMPUTER NETWORKING CONFERENCE (MEDCOMNET) | 2022年
基金
欧盟地平线“2020”;
关键词
Industrial Internet of Things; Searchable Encryption; secure data dissemination; numerical analysis; PUBLIC-KEY ENCRYPTION; INDUSTRIAL INTERNET; KEYWORD SEARCH; MANAGEMENT; SCHEME; SECURE;
D O I
10.1109/MedComNet55087.2022.9810394
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Multi-Access Edge computing represents one of the most important enabling technologies for the Industrial Internet of Things. It allows advanced data processing and customized service provisioning, very close to the end-users. In the presence of many Multi-Access Edge computing applications, however, it is fundamental to ensure effective and privacy-preserving data dissemination at the network edge. From the security perspective, Attribute-based Encryption and Searchable Encryption techniques can be jointly used to achieve data confidentiality, flexible protection against unauthorized access, and privacy-preserving data dissemination. Available solutions, however, generally focus the attention on cloud-based approaches, use edge computing to implement some of the cryptographic tasks, and limit the investigation to single cryptographic operations. Indeed, no works investigate the adoption of these techniques in scenarios with multiple data producers and end-users, and fully operating at the network edge. To bridge this gap, this work proposes a novel methodology supporting fast and privacy-oriented data dissemination directly at the network edge. In the considered distributed network infrastructure, Multi-Access Edge computing applications express the interest to receive specific data by sending Trapdoors to Edge Servers. Data sources protect their contents through Attribute-based Encryption and deliver them to Edge Servers. In turn, Edge Servers implement Attribute-based Searchable Encryption functionalities to properly disseminate received contents towards Multi-Access Edge nodes hosting the applications that generated valid Trapdoors. The performance of the conceived approach has been evaluated through computer simulations. Obtained results highlight the benefits achieved against baseline (i.e., cloud-based) solutions.
引用
收藏
页数:9
相关论文
共 36 条
  • [1] Searchable encryption on the cloud: a survey
    Andola, Nitish
    Gahlot, Raghav
    Yadav, Vijay Kumar
    Venkatesan, S.
    Verma, Shekhar
    [J]. JOURNAL OF SUPERCOMPUTING, 2022, 78 (07) : 9952 - 9984
  • [2] [Anonymous], 2019, ETSI GS MEC 003 V2.1.1
  • [3] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [4] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [5] Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data
    Chen, Biwen
    Wu, Libing
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    He, Debiao
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (04) : 1753 - 1764
  • [6] Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Guo, Fuchun
    Wang, Xiaofen
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) : 789 - 798
  • [7] Design of Edge Computing for 5G-Enabled Tactile Internet-Based Industrial Applications
    Coutinho, Rodolfo W. L.
    Boukerche, Azzedine
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2022, 60 (01) : 60 - 66
  • [8] AKSER: Attribute-based keyword search with efficient revocation in cloud computing
    Cui, Jie
    Zhou, Han
    Zhong, Hong
    Xu, Yan
    [J]. INFORMATION SCIENCES, 2018, 423 : 343 - 352
  • [9] Fan K, 2021, IEEE TRANS CLOUD COM
  • [10] Fun T. Soo, 2021, SENSORS-BASEL, V21