Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things

被引:22
作者
Ali, Mohammad [1 ]
Sadeghi, Mohammad-Reza [1 ]
Liu, Ximeng [2 ,3 ]
Miao, Yinbin [4 ,5 ]
Vasilakos, Athanasios V. [2 ,6 ]
机构
[1] Amirkabir Univ Technol, Dept Math & Comp Sci, Tehran, Iran
[2] Fuzhou Univ, Coll Comp & Data Sci, Fuzhou 350116, Fujian, Peoples R China
[3] Key Lab Informat Secur Network Syst, Fuzhou 350116, Fujian, Peoples R China
[4] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[5] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[6] Univ Agder, Ctr AI Res, Grimstad, Norway
关键词
Industrial Internet of Things; Online/offline encryption; Attribute-based keyword search; Verifiable search results; Outsourced encryption; Outsourced decryption; ATTRIBUTE-BASED ENCRYPTION; EFFICIENT;
D O I
10.1016/j.jisa.2021.103101
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) and attribute-based keyword search (ABKS) facilitate fine-grained access and search control for cloud-assisted Industrial Internet of Things (IIoT). However, existing schemes suffer from the following drawbacks: (1) their computational overhead in data outsourcing and retrieval is exceptionally high; (2) they obtain wrong search results if one or more of the queried keywords are wrongly selected; (3) in most existing ABKS, the untrustworthiness of the cloud server is not taken into account, and the correctness of the search results is not verified; (4) existing verifiable ABKS schemes do not support search results verification without the main data, and verifiers have to first download the search results and then check their correctness. In this paper, we design a verifiable online/offline multi-keyword search (VMKS) scheme providing high-level solutions to the aforementioned problems. We use the healthcare setting as a case study, and we demonstrate how our VMKS can be deployed in cloud-assisted Healthcare IIoT (HealthIIoT). We prove the security of our VMKS in the standard model and under the hardness assumption of the decisional bilinear Diffie-Hellman (DBDH) problem. Empirical results demonstrate that our VMKS speeds up encryption and verification processes by more than 70% and 90%, respectively. Moreover, our scheme reduces the communication overhead in the verification phase by more than 80%.
引用
收藏
页数:12
相关论文
共 51 条
  • [1] Empathic conversational agents for real-time monitoring and co-facilitation of patient-centered healthcare
    Adikari, Achini
    de Silva, Daswin
    Moraliyage, Harsha
    Alahakoon, Damminda
    Wong, Jiahui
    Gancarz, Mathew
    Chackochan, Suja
    Park, Bomi
    Heo, Rachel
    Leung, Yvonne
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 126 : 318 - 329
  • [2] Attribute-based fine-grained access control for outscored private set intersection computation
    Ali, Mohammad
    Mohajeri, Javad
    Sadeghi, Mohammad-Reza
    Liu, Ximeng
    [J]. INFORMATION SCIENCES, 2020, 536 : 222 - 243
  • [3] A fully distributed hierarchical attribute-based encryption scheme
    Ali, Mohammad
    Mohajeri, Javad
    Sadeghi, Mohammad-Reza
    Liu, Ximeng
    [J]. THEORETICAL COMPUTER SCIENCE, 2020, 815 : 25 - 46
  • [4] Provable secure lightweight attribute-based keyword search for cloud-based Internet of Things networks
    Ali, Mohammad
    Sadeghi, Mohammad-Reza
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (05)
  • [5] Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things
    Ali, Mohammad
    Sadeghi, Mohammad-Reza
    Liu, Ximeng
    [J]. IEEE ACCESS, 2020, 8 : 23951 - 23964
  • [6] Lightweight Fine-Grained Access Control for Wireless Body Area Networks
    Ali, Mohammad
    Sadeghi, Mohammad-Reza
    Liu, Ximeng
    [J]. SENSORS, 2020, 20 (04)
  • [7] [Anonymous], 2011, USENIX SEC S
  • [8] [Anonymous], 2019, PYTH PAIR BAS CRYPT
  • [9] [Anonymous], 2019, SEC HASH MESS DIG LI
  • [10] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +