Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things

被引:3
|
作者
Zhang, Yinghui [1 ,2 ]
Wu, Axin [1 ,2 ]
Zhang, Tiantian [1 ,2 ]
Zheng, Dong [1 ,2 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Shaanxi, Peoples R China
[2] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Internet of things; Attribute-based encryption; Keyword search; Outsourced decryption; ATTRIBUTE-BASED ENCRYPTION; IDENTITY-BASED ENCRYPTION; GRAINED ACCESS-CONTROL; CLOUD; EFFICIENT;
D O I
10.1007/s12243-018-0694-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The development of Internet of things (IoT) makes data exchange more frequently, and the cloud computing can provide stable storage and efficient computation for data users. To ensure the security and functionality of data, the efficiency of decryption and keyword search should be taken into consideration in resource-constrained IoT scenarios. In order to solve the above problems, a flexible keyword search scheme in IoT is proposed over encrypted data with outsourced decryption. First, the attribute-based encryption technology is applied, by which only users whose attributes meet the access control structure can access the sharing data. Second, the reciprocal mapping of Lagrange polynomials technology is employed to implement keyword search in a large number of ciphertext data. Third, the decryption of ciphertext is outsourced to improve the efficiency of decryption on the client side. The security and performance analysis indicates that the proposed scheme is secure and efficient.
引用
收藏
页码:413 / 421
页数:9
相关论文
共 50 条
  • [21] Authorized Keyword Search on Encrypted Data
    Shi, Jie
    Lai, Junzuo
    Li, Yingjiu
    Deng, Robert H.
    Weng, Jian
    COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 419 - 435
  • [22] Verifiable Diversity Ranking Search Over Encrypted Outsourced Data
    Liu, Yuling
    Peng, Hua
    Wang, Jie
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 55 (01): : 37 - 57
  • [23] Blockchain-Aided Keyword Search over Encrypted Data in Cloud
    Varri, Uma Sankararao
    ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2022, PT I, 2023, 1797 : 331 - 348
  • [24] PRMS: A Personalized Mobile Search Over Encrypted Outsourced Data
    Zhang, Qiang
    Liu, Qin
    Wang, Guojun
    IEEE ACCESS, 2018, 6 : 31541 - 31552
  • [25] Keyword search over encrypted cloud data based on blockchain in smart medical applications
    Niu, Shufen
    Song, Mi
    Fang, Lizhi
    Yu, Fei
    Han, Song
    Wang, Caifen
    COMPUTER COMMUNICATIONS, 2022, 192 : 33 - 47
  • [26] RSAE: Ranked Keyword Search over Asymmetric Encrypted cloud data
    Guo, Cheng
    Song, Qiongqiong
    Zhuang, Ruhan
    Feng, Bin
    PROCEEDINGS 2015 IEEE FIFTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING BDCLOUD 2015, 2015, : 82 - 86
  • [27] Practical Revocable Keyword Search Over Mobile Cloud-Assisted Internet of Things
    Liu, Shuqin
    Miao, Yinbin
    Li, Feng
    Li, Xinghua
    Choo, Kim-Kwang Raymond
    Deng, Robert H.
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (16): : 27494 - 27508
  • [28] ESAS: An Efficient Semantic and Authorized Search Scheme over Encrypted Outsourced Data
    Liu, Xueyan
    Guan, Zhitao
    Du, Xiaojiang
    Zhu, Liehuang
    Yu, Zhengtao
    Ma, Yinglong
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, : 547 - 551
  • [29] Secure conjunctive multi-keyword ranked search over encrypted cloud data for multiple data owners
    Yin, Hui
    Qin, Zheng
    Zhang, Jixin
    Ou, Lu
    Li, Fangmin
    Li, Keqin
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 : 689 - 700
  • [30] Verifiable Attribute-Based Keyword Search Over Encrypted Cloud Data Supporting Data Deduplication
    Liu, Xueyan
    Lu, Tingting
    He, Xiaomei
    Yang, Xiaotao
    Niu, Shufen
    IEEE ACCESS, 2020, 8 (08): : 52062 - 52074