Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things

被引:3
|
作者
Zhang, Yinghui [1 ,2 ]
Wu, Axin [1 ,2 ]
Zhang, Tiantian [1 ,2 ]
Zheng, Dong [1 ,2 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Shaanxi, Peoples R China
[2] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Internet of things; Attribute-based encryption; Keyword search; Outsourced decryption; ATTRIBUTE-BASED ENCRYPTION; IDENTITY-BASED ENCRYPTION; GRAINED ACCESS-CONTROL; CLOUD; EFFICIENT;
D O I
10.1007/s12243-018-0694-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The development of Internet of things (IoT) makes data exchange more frequently, and the cloud computing can provide stable storage and efficient computation for data users. To ensure the security and functionality of data, the efficiency of decryption and keyword search should be taken into consideration in resource-constrained IoT scenarios. In order to solve the above problems, a flexible keyword search scheme in IoT is proposed over encrypted data with outsourced decryption. First, the attribute-based encryption technology is applied, by which only users whose attributes meet the access control structure can access the sharing data. Second, the reciprocal mapping of Lagrange polynomials technology is employed to implement keyword search in a large number of ciphertext data. Third, the decryption of ciphertext is outsourced to improve the efficiency of decryption on the client side. The security and performance analysis indicates that the proposed scheme is secure and efficient.
引用
收藏
页码:413 / 421
页数:9
相关论文
共 50 条
  • [41] Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud
    Wang, Haijiang
    Ning, Jianting
    Huang, Xinyi
    Wei, Guiyi
    Poh, Geong Sen
    Liu, Ximeng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1307 - 1319
  • [42] Split keyword fuzzy and synonym search over encrypted cloud data
    Raghavendra, S.
    Girish, S.
    Geeta, C. M.
    Buyya, Rajkumar
    Venugopal, K. R.
    Iyengar, S. S.
    Patnaik, L. M.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (08) : 10135 - 10156
  • [43] Split keyword fuzzy and synonym search over encrypted cloud data
    Rajkumar Raghavendra S
    S. S. Girish S
    L. M. Geeta C. M.
    Multimedia Tools and Applications, 2018, 77 : 10135 - 10156
  • [44] Document Attribute-based Keyword Search over Encrypted Data
    Fu, Zhangjie
    Xi, Jie
    Wang, Jin
    Sun, Xingming
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 787 - 790
  • [45] Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds
    Li, Jinguo
    Wen, Mi
    Wu, Kui
    Lu, Kejie
    Li, Fengyong
    Li, Hongjiao
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (04) : 893 - 911
  • [46] Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data
    Fu, Zhangjie
    Huang, Fengxiao
    Sun, Xingming
    Vasilakos, Athanasios V.
    Yang, Ching-Nung
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2019, 12 (05) : 813 - 823
  • [47] Efficient Encrypted Keyword Search for Multi-user Data Sharing
    Kiayias, Aggelos
    Oksuz, Ozgur
    Russell, Alexander
    Tang, Qiang
    Wang, Bing
    COMPUTER SECURITY - ESORICS 2016, PT I, 2016, 9878 : 173 - 195
  • [48] Secure Data Storage Operations with Verifiable Outsourced Decryption for Mobile Cloud Computing
    Yadav, Harsh
    Dave, Mayank
    2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2014,
  • [49] Securely sharing outsourced IoT data: A secure access and privacy preserving keyword search scheme
    Sultan, Nazatul H.
    Kermanshahi, Shabnam K.
    Tran, Hong Y.
    Lai, Shangqi
    Varadharajan, Vijay
    Nepal, Surya
    Yi, Xun
    AD HOC NETWORKS, 2024, 158
  • [50] Secure Keyword Search and Data Sharing Mechanism for Cloud Computing
    Ge, Chunpeng
    Susilo, Willy
    Liu, Zhe
    Xia, Jinyue
    Szalachowski, Pawel
    Fang Liming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2787 - 2800