A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks

被引:5
作者
Zhu, Binrui [1 ]
Susilo, Willy [2 ]
Qin, Jing [1 ,3 ]
Guo, Fuchun [2 ]
Zhao, Zhen [2 ]
Ma, Jixin [4 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Shandong, Peoples R China
[2] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[4] Univ Greenwich, Sch Comp & Math Sci, Ctr Comp & Computat Sci, London SE10 9LS, England
关键词
wireless sensor networks; cloud computing; Internet of Things; public key encryption with keyword search; off-line keyword guessing attack; on-line keyword guessing attack; PUBLIC-KEY ENCRYPTION; KEYWORD-SEARCH; INTERNET; CLOUD;
D O I
10.3390/s19112583
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Wireless sensor networks (WSN) generally utilize cloud computing to store and process sensing data in real time, namely, cloud-assisted WSN. However, the cloud-assisted WSN faces new security challenges, particularly outsourced data confidentiality. Data Encryption is a fundamental approach but it limits target data retrieval in massive encrypted data. Public key encryption with keyword search (PEKS) enables a data receiver to retrieve encrypted data containing some specific keyword in cloud-assisted WSN. However, the traditional PEKS schemes suffer from an inherent problem, namely, the keyword guessing attack (KGA). KGA includes off-line KGA and on-line KGA. To date, the existing literature on PEKS cannot simultaneously resist both off-line KGA and on-line KGA performed by an external adversary and an internal adversary. In this work, we propose a secure and efficient data sharing and searching scheme to address the aforementioned problem such that our scheme is secure against both off-line KGA and on-line KGA performed by external and internal adversaries. We would like to stress that our scheme simultaneously achieves document encryption/decryption and keyword search functions. We also prove our scheme achieves keyword security and document security. Furthermore, our scheme is more efficient than previous schemes by eliminating the pairing computation.
引用
收藏
页数:23
相关论文
共 32 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3621, P205
[2]  
Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
[3]  
Baek J, 2006, LECT NOTES COMPUT SC, V4176, P217
[4]   Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey [J].
Bista, Rabindra ;
Chang, Jae-Woo .
SENSORS, 2010, 10 (05) :4577-4601
[5]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[6]  
Chang YC, 2005, LECT NOTES COMPUT SC, V3531, P442
[7]   Server-Aided Public Key Encryption With Keyword Search [J].
Chen, Rongmao ;
Mu, Yi ;
Yang, Guomin ;
Guo, Fuchun ;
Huang, Xinyi ;
Wang, Xiaofen ;
Wang, Yongjun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) :2833-2842
[8]   Generic constructions of integrated PKE and PEKS [J].
Chen, Yu ;
Zhang, Jiang ;
Lin, Dongdai ;
Zhang, Zhenfeng .
DESIGNS CODES AND CRYPTOGRAPHY, 2016, 78 (02) :493-526
[9]   SPEKS: Secure Server-Designation Public Key Encryption with Keyword Search against Keyword Guessing Attacks [J].
Chen, Yu-Chi .
COMPUTER JOURNAL, 2015, 58 (04) :922-933
[10]  
Cramer R, 1998, LECT NOTES COMPUT SC, V1462, P13, DOI 10.1007/BFb0055717