Efficient Certificateless Online/Offline Signcryption Scheme for Edge IoT Devices

被引:35
作者
Chen, Jiasheng [1 ]
Wang, Liangliang [1 ]
Wen, Mi [1 ]
Zhang, Kai [1 ]
Chen, Kefei [2 ,3 ]
机构
[1] Shanghai Univ Elect Power, Coll Comp Sci & Technol, Shanghai 201306, Peoples R China
[2] Hangzhou Normal Univ, Dept Math, Hangzhou 311121, Peoples R China
[3] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; Cryptography; Internet of Things; Computational modeling; Servers; Computer architecture; Collaboration; Certificateless; edge computing; Internet of Things (IoT); online; offline; signcryption; AUTHENTICATION SCHEME; CLOUD; SECURITY; INTERNET;
D O I
10.1109/JIOT.2021.3119513
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of edge computing brings data processing and storage to the vicinity of terminal equipment, which can quickly respond to user needs and reduce the computational burden of the traditional centralized cloud computing model, resulting in a model of edge computing-assisted cloud computing. In this architecture, how to prevent other untrusted entities from leaking user privacy has become one of the most critical concerns. To address this concern, many cryptographic schemes supporting the traditional cloud model to protect the data security sharing of IoT devices have been proposed. However, resource-constrained devices are an essential component of the Internet of Things (IoT). Its characteristics are one of the main reasons that affect the efficiency of schemes, and traditional cryptographic schemes are not suitable for edge computing. Therefore, in order to ensure secure data sharing between IoT devices, we come up with an improved certificateless online/offline signcryption (CLOOSC) scheme and achieve lower computational overhead, when offline calculation is not considered, the resource-constrained IoT device under the cloud-edge collaboration architecture requires only one point multiplication, while only one bilinear pairing is required in the verification phase. In the random oracle model, our scheme is proved to be IND-CCA2 secure. The experiment results show our scheme can be lightweight in terms of time cost.
引用
收藏
页码:8967 / 8979
页数:13
相关论文
共 42 条
[1]   Secure Edge Computing in IoT Systems: Review and Case Studies [J].
Alrowaily, Mohammed ;
Lu, Zhuo .
2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, :440-444
[2]   A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things [J].
Alwarafy, Abdulmalik ;
Al-Thelaya, Khaled A. ;
Abdallah, Mohamed ;
Schneider, Jens ;
Hamdi, Mounir .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) :4004-4022
[3]  
An JH, 2002, LECT NOTES COMPUT SC, V2332, P83
[4]  
Ashibani Y, 2017, IEEE IPCCC
[5]   A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid [J].
Baek, Joonsang ;
Quang Hieu Vu ;
Liu, Joseph K. ;
Huang, Xinyi ;
Xiang, Yang .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2015, 3 (02) :233-244
[6]  
Barbosa M., 2008, P ACM S INF COMP COM, P369
[7]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[8]   A Lightweight Privacy-Preserving Solution for IoT: the Case of E-health<bold> </bold> [J].
Boussada, Rihab ;
Elhdhili, Mohamed Elhoucine ;
Saidane, Leila Azouz .
IEEE 20TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS / IEEE 16TH INTERNATIONAL CONFERENCE ON SMART CITY / IEEE 4TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2018, :555-562
[9]  
Caifen Wang, 2011, Proceedings of the 2011 Seventh International Conference on Computational Intelligence and Security (CIS 2011), P886, DOI 10.1109/CIS.2011.200
[10]  
Evans D., 2011, Technical report