Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things

被引:3
|
作者
Zhang, Yinghui [1 ,2 ]
Wu, Axin [1 ,2 ]
Zhang, Tiantian [1 ,2 ]
Zheng, Dong [1 ,2 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Shaanxi, Peoples R China
[2] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Internet of things; Attribute-based encryption; Keyword search; Outsourced decryption; ATTRIBUTE-BASED ENCRYPTION; IDENTITY-BASED ENCRYPTION; GRAINED ACCESS-CONTROL; CLOUD; EFFICIENT;
D O I
10.1007/s12243-018-0694-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The development of Internet of things (IoT) makes data exchange more frequently, and the cloud computing can provide stable storage and efficient computation for data users. To ensure the security and functionality of data, the efficiency of decryption and keyword search should be taken into consideration in resource-constrained IoT scenarios. In order to solve the above problems, a flexible keyword search scheme in IoT is proposed over encrypted data with outsourced decryption. First, the attribute-based encryption technology is applied, by which only users whose attributes meet the access control structure can access the sharing data. Second, the reciprocal mapping of Lagrange polynomials technology is employed to implement keyword search in a large number of ciphertext data. Third, the decryption of ciphertext is outsourced to improve the efficiency of decryption on the client side. The security and performance analysis indicates that the proposed scheme is secure and efficient.
引用
收藏
页码:413 / 421
页数:9
相关论文
共 50 条
  • [1] Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things
    Yinghui Zhang
    Axin Wu
    Tiantian Zhang
    Dong Zheng
    Annals of Telecommunications, 2019, 74 : 413 - 421
  • [2] Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment
    Sultan, Nazatul Haque
    Kaaniche, Nesrine
    Laurent, Maryline
    Barbhuiya, Ferdous Ahmed
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 216 - 233
  • [3] Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata
    Wang, Jiabei
    Zhang, Rui
    Li, Jianhao
    Xiao, Yuting
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 2746 - 2760
  • [4] Privacy-Preserving Flexible Access Control for Encrypted Data in Internet of Things
    Zhang, Leyou
    Wang, Jun
    Mu, Yi
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (19) : 14731 - 14745
  • [5] Multi-Client Verifiable Encrypted Keyword Search Scheme With Authorization Over Outsourced Encrypted Data
    Yang, Xu
    Wang, Qiuhao
    Qi, Saiyu
    Li, Ke
    Wang, Jianfeng
    Zhao, Wenjia
    Qi, Yong
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (06): : 6356 - 6371
  • [6] Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture
    Wu, Haiqin
    Dudder, Boris
    Wang, Liangmin
    Cao, Zhenfu
    Zhou, Jun
    Feng, Xia
    ACM COMPUTING SURVEYS, 2024, 56 (03)
  • [7] VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
    Zheng, Qingji
    Xu, Shouhuai
    Ateniese, Giuseppe
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 522 - 530
  • [8] Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data
    He, Kai
    Guo, Jun
    Weng, Jian
    Weng, Jiasi
    Liu, Joseph K.
    Yi, Xun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1207 - 1217
  • [9] Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data
    Miao, Yinbin
    Deng, Robert H.
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Wu, Hongjun
    Li, Hongwei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (04) : 1667 - 1680
  • [10] Verifiable Outsourced Decryption of Encrypted Data From Heterogeneous Trust Networks
    Hahn, Changhee
    Kim, Jongkil
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (22): : 22559 - 22570