Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things

被引:27
作者
Ali, Mohammad [1 ]
Sadeghi, Mohammad-Reza [1 ]
Liu, Ximeng [2 ,3 ]
Miao, Yinbin [4 ,5 ]
Vasilakos, Athanasios V. [2 ,6 ]
机构
[1] Amirkabir Univ Technol, Dept Math & Comp Sci, Tehran, Iran
[2] Fuzhou Univ, Coll Comp & Data Sci, Fuzhou 350116, Fujian, Peoples R China
[3] Key Lab Informat Secur Network Syst, Fuzhou 350116, Fujian, Peoples R China
[4] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[5] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[6] Univ Agder, Ctr AI Res, Grimstad, Norway
关键词
Industrial Internet of Things; Online/offline encryption; Attribute-based keyword search; Verifiable search results; Outsourced encryption; Outsourced decryption; ATTRIBUTE-BASED ENCRYPTION; EFFICIENT;
D O I
10.1016/j.jisa.2021.103101
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) and attribute-based keyword search (ABKS) facilitate fine-grained access and search control for cloud-assisted Industrial Internet of Things (IIoT). However, existing schemes suffer from the following drawbacks: (1) their computational overhead in data outsourcing and retrieval is exceptionally high; (2) they obtain wrong search results if one or more of the queried keywords are wrongly selected; (3) in most existing ABKS, the untrustworthiness of the cloud server is not taken into account, and the correctness of the search results is not verified; (4) existing verifiable ABKS schemes do not support search results verification without the main data, and verifiers have to first download the search results and then check their correctness. In this paper, we design a verifiable online/offline multi-keyword search (VMKS) scheme providing high-level solutions to the aforementioned problems. We use the healthcare setting as a case study, and we demonstrate how our VMKS can be deployed in cloud-assisted Healthcare IIoT (HealthIIoT). We prove the security of our VMKS in the standard model and under the hardness assumption of the decisional bilinear Diffie-Hellman (DBDH) problem. Empirical results demonstrate that our VMKS speeds up encryption and verification processes by more than 70% and 90%, respectively. Moreover, our scheme reduces the communication overhead in the verification phase by more than 80%.
引用
收藏
页数:12
相关论文
共 51 条
[1]   Empathic conversational agents for real-time monitoring and co-facilitation of patient-centered healthcare [J].
Adikari, Achini ;
de Silva, Daswin ;
Moraliyage, Harsha ;
Alahakoon, Damminda ;
Wong, Jiahui ;
Gancarz, Mathew ;
Chackochan, Suja ;
Park, Bomi ;
Heo, Rachel ;
Leung, Yvonne .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 126 :318-329
[2]   Attribute-based fine-grained access control for outscored private set intersection computation [J].
Ali, Mohammad ;
Mohajeri, Javad ;
Sadeghi, Mohammad-Reza ;
Liu, Ximeng .
INFORMATION SCIENCES, 2020, 536 :222-243
[3]   A fully distributed hierarchical attribute-based encryption scheme [J].
Ali, Mohammad ;
Mohajeri, Javad ;
Sadeghi, Mohammad-Reza ;
Liu, Ximeng .
THEORETICAL COMPUTER SCIENCE, 2020, 815 :25-46
[4]   Provable secure lightweight attribute-based keyword search for cloud-based Internet of Things networks [J].
Ali, Mohammad ;
Sadeghi, Mohammad-Reza .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (05)
[5]   Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things [J].
Ali, Mohammad ;
Sadeghi, Mohammad-Reza ;
Liu, Ximeng .
IEEE ACCESS, 2020, 8 :23951-23964
[6]   Lightweight Fine-Grained Access Control for Wireless Body Area Networks [J].
Ali, Mohammad ;
Sadeghi, Mohammad-Reza ;
Liu, Ximeng .
SENSORS, 2020, 20 (04)
[7]  
[Anonymous], 2019, PYTH PAIR BAS CRYPT
[8]  
[Anonymous], 2019, SEC HASH MESS DIG LI
[9]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[10]   An IoT-Aware Architecture for Smart Healthcare Systems [J].
Catarinucci, Luca ;
de Donno, Danilo ;
Mainetti, Luca ;
Palano, Luca ;
Patrono, Luigi ;
Stefanizzi, Maria Laura ;
Tarricone, Luciano .
IEEE INTERNET OF THINGS JOURNAL, 2015, 2 (06) :515-526