Reliable Data Sharing by Certificateless Encryption Supporting Keyword Search Against Vulnerable KGC in Industrial Internet of Things

被引:16
作者
Karati, Arijit [1 ]
Fan, Chun-, I [2 ,3 ]
Zhuang, Er-Shuo [1 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 80424, Taiwan
[2] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Informat Secur Res Ctr, Kaohsiung 80424, Taiwan
[3] Natl Sun Yat Sen Univ, Intelligent Elect Commerce Res Ctr, Kaohsiung 80424, Taiwan
关键词
Cryptography; Security; Industrial Internet of Things; Encryption; Cloud computing; Read only memory; Keyword search; Certificateless encryption (CLE); Industrial Internet of Things (IIoT); Level-3; trust; privacy preserving keyword search; PUBLIC-KEY ENCRYPTION; IDENTITY-BASED ENCRYPTION; AUTHENTICATED ENCRYPTION; EFFICIENT; SECURE;
D O I
10.1109/TII.2021.3112986
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Outsourcing Industrial Internet of Things (IIoT) data on the cloud extends the diversity of data analysis for decision making with minimized costs in communications and storage. However, it is adverse to the confidentiality of IIoT data from the owner as access control is performed by honest-but-curious platforms. Although the encryption strategy guarantees data security, it hinders deliverance due to its inbred all-or-nothing decryption. Certificateless encryption supporting keyword search eliminates the overhead of certificates and privileges to retrieve the required data through encrypted keyword search. However, most of the prior works are precarious against a malicious key generation center, which exposes data protected by users' private keys. We design a certificateless secure data sharing by uniting the functionalities of encryption and access control on search. Our technique resists in/outside keyword guessing attacks and sustains on-demand user revocation. Besides, it achieves Girault's Level-3 security in the standard model. Nonetheless, empirical performance analysis under a suitable scenario exhibits its feasibility compared to the other related schemes.
引用
收藏
页码:3661 / 3669
页数:9
相关论文
共 25 条
[1]  
De Caro A, 2011, IEEE SYMP COMP COMMU
[2]   Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud [J].
Deng, Hua ;
Qin, Zheng ;
Wu, Qianhong ;
Guan, Zhenyu ;
Deng, Robert H. ;
Wang, Yujue ;
Zhou, Yunya .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :3168-3180
[3]   Certificateless Public Key Authenticated Encryption With Keyword Search or Industrial Internet of Things [J].
He, Debiao ;
Ma, Mimi ;
Zeadally, Sherali ;
Kumar, Neeraj ;
Liang, Kaitai .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) :3618-3627
[4]   An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks [J].
Huang, Qiong ;
Li, Hongbo .
INFORMATION SCIENCES, 2017, 403 :1-14
[5]  
Karati A., 2018, P INT COMP S, P590
[6]   Efficient and provably secure random oracle-free adaptive identity-based encryption with short-signature scheme [J].
Karati, Arijit ;
Biswas, G. P. .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) :4060-4074
[7]   Designated-server identity-based authenticated encryption with keyword search for encrypted emails [J].
Li, Hongbo ;
Huang, Qiong ;
Shen, Jian ;
Yang, Guomin ;
Susilo, Willy .
INFORMATION SCIENCES, 2019, 481 :330-343
[8]   An efficient RSA-based certificateless public key encryption scheme [J].
Lin, Xi-Jun ;
Sun, Lin ;
Qu, Haipeng .
DISCRETE APPLIED MATHEMATICS, 2018, 241 :39-47
[9]   Pairing-Free Certificate-Based Searchable Encryption Supporting Privacy-Preserving Keyword Search Function for IIoTs [J].
Lu, Yang ;
Li, Jiguo ;
Wang, Fen .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (04) :2696-2706
[10]   Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks [J].
Lu, Yang ;
Li, Jiguo ;
Zhang, Yichen .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (06) :2041-2054