Security analysis and secure channel-free certificateless searchable public key authenticated encryption for a cloud-based Internet of things

被引:15
作者
Wu, Bin [1 ,2 ]
Wang, Caifen [3 ]
Yao, Hailong [1 ,4 ]
机构
[1] Northwest Normal Univ, Coll Math & Stat, Lanzhou, Peoples R China
[2] Lanzhou Resources & Environm Voc Tech Coll, Informat Secur Lab, Lanzhou, Peoples R China
[3] Shenzhen Technol Univ, Coll Big Data & Internet, Shenzhen, Peoples R China
[4] Lanzhou City Univ, Sch Elect & Informat Engn, Lanzhou, Peoples R China
关键词
KEYWORD GUESSING ATTACKS; SCHEME;
D O I
10.1371/journal.pone.0230722
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the rapid development of informatization, an increasing number of industries and organizations outsource their data to cloud servers, to avoid the cost of local data management and to share data. For example, industrial Internet of things systems and mobile healthcare systems rely on cloud computing's powerful data storage and processing capabilities to address the storage, provision, and maintenance of massive amounts of industrial and medical data. One of the major challenges facing cloud-based storage environments is how to ensure the confidentiality and security of outsourced sensitive data. To mitigate these issues, He et al. and Ma et al. have recently independently proposed two certificateless public key searchable encryption schemes. In this paper, we analyze the security of these two schemes and show that the reduction proof of He et al.'s CLPAEKS scheme is incorrect, and that Ma et al.'s CLPEKS scheme is not secure against keyword guessing attacks. We then propose a channel-free certificateless searchable public key authenticated encryption (dCLPAEKS) scheme and prove that it is secure against inside keyword guessing attacks under the enhanced security model. Compared with other certificateless public key searchable encryption schemes, this scheme has higher security and comparable efficiency.
引用
收藏
页数:24
相关论文
共 46 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]  
[Anonymous], SECURITY COMMUNICATI
[3]  
Babu SM, 2015, 2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), P60, DOI 10.1109/GCCT.2015.7342624
[4]  
Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
[5]  
BingJian W., 2011, INT J INF ED TECHNOL, V1, P350
[6]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[7]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[8]   An efficient Swarm-Intelligence approach for task scheduling in cloud-based internet of things applications [J].
Boveiri, Hamid Reza ;
Khayami, Raouf ;
Elhoseny, Mohamed ;
Gunasekaran, M. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (09) :3469-3479
[9]  
Boyen X, 2008, LECT NOTES COMPUT SC, V5209, P39, DOI 10.1007/978-3-540-85538-5_3
[10]  
Byun JW, 2006, LECT NOTES COMPUT SC, V4165, P75