Substring-searchable attribute-based encryption and its application for IoT devices

被引:7
作者
Sun, Xi [1 ]
Wang, Hao [1 ,2 ]
Fu, Xiu [3 ]
Qin, Hong [1 ]
Jiang, Mei [1 ]
Xue, Likun [1 ]
Wei, Xiaochao [1 ]
机构
[1] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan, Peoples R China
[2] Guangxi Key Lab Cryptog & Informat Secur, Guilin, Peoples R China
[3] Shandong Prov Hosp, Jinan, Peoples R China
基金
中国国家自然科学基金;
关键词
Attribute-based encryption; Searchable encryption; Outsourcing decryption; IoT divices; BIG DATA; ANALYTICS; SECURITY; SCHEME;
D O I
10.1016/j.dcan.2020.07.008
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the development of big data and cloud computing technology, more and more users choose to store data on cloud servers, which brings much convenience to their management and use of data, and also the risk of data leakage. A common method to prevent data leakage is to encrypt the data before uploading it, but the traditional encryption method is often not conducive to data sharing and querying. In this paper, a new kind of Attribute-Based Encryption (ABE) scheme, which is called the Sub-String Searchable ABE (SSS-ABE) scheme, is proposed for the sharing and querying of the encrypted data. In the SSS-ABE scheme, the data owner encrypts the data under an access structure, and only the data user who satisfies the access structure can query and decrypt it. The data user can make a substring query on the whole ciphertext without setting keywords in advance. In addition, the outsourcing method is also introduced to reduce the local computation of the decryption process so that the outsourcing SSS-ABE scheme can be applied to IoT devices.
引用
收藏
页码:277 / 283
页数:7
相关论文
共 30 条
[1]  
[Anonymous], 2015, PoPETs
[2]  
[Anonymous], USENIX SECURITY S
[3]   Cloud Computing for Education: A Systematic Mapping Study [J].
Baldassarre, Maria Teresa ;
Caivano, Danilo ;
Dimauro, Giovanni ;
Gentile, Enrica ;
Visaggio, Giuseppe .
IEEE TRANSACTIONS ON EDUCATION, 2018, 61 (03) :234-244
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[6]   Network Service Chaining in Fog and Cloud Computing for the 5G Environment: Data Management and Security Challenges [J].
Chaudhary, Rajat ;
Kumar, Neeraj ;
Zeadally, Sherali .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (11) :114-122
[7]  
Desmoulins N, 2018, LECT NOTES COMPUT SC, V11272, P121, DOI 10.1007/978-3-030-03326-2_5
[8]   Outsourced pattern matching [J].
Faust, Sebastian ;
Hazay, Carmit ;
Venturi, Daniele .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (03) :327-346
[9]   Social media big data analytics: A survey [J].
Ghani, Norjihan Abdul ;
Hamid, Suraya ;
Hashem, Ibrahim Abaker Targio ;
Ahmed, Ejaz .
COMPUTERS IN HUMAN BEHAVIOR, 2019, 101 :417-428