Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things

被引:22
|
作者
Ali, Mohammad [1 ]
Sadeghi, Mohammad-Reza [1 ]
Liu, Ximeng [2 ,3 ]
Miao, Yinbin [4 ,5 ]
Vasilakos, Athanasios V. [2 ,6 ]
机构
[1] Amirkabir Univ Technol, Dept Math & Comp Sci, Tehran, Iran
[2] Fuzhou Univ, Coll Comp & Data Sci, Fuzhou 350116, Fujian, Peoples R China
[3] Key Lab Informat Secur Network Syst, Fuzhou 350116, Fujian, Peoples R China
[4] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[5] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[6] Univ Agder, Ctr AI Res, Grimstad, Norway
关键词
Industrial Internet of Things; Online/offline encryption; Attribute-based keyword search; Verifiable search results; Outsourced encryption; Outsourced decryption; ATTRIBUTE-BASED ENCRYPTION; EFFICIENT;
D O I
10.1016/j.jisa.2021.103101
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) and attribute-based keyword search (ABKS) facilitate fine-grained access and search control for cloud-assisted Industrial Internet of Things (IIoT). However, existing schemes suffer from the following drawbacks: (1) their computational overhead in data outsourcing and retrieval is exceptionally high; (2) they obtain wrong search results if one or more of the queried keywords are wrongly selected; (3) in most existing ABKS, the untrustworthiness of the cloud server is not taken into account, and the correctness of the search results is not verified; (4) existing verifiable ABKS schemes do not support search results verification without the main data, and verifiers have to first download the search results and then check their correctness. In this paper, we design a verifiable online/offline multi-keyword search (VMKS) scheme providing high-level solutions to the aforementioned problems. We use the healthcare setting as a case study, and we demonstrate how our VMKS can be deployed in cloud-assisted Healthcare IIoT (HealthIIoT). We prove the security of our VMKS in the standard model and under the hardness assumption of the decisional bilinear Diffie-Hellman (DBDH) problem. Empirical results demonstrate that our VMKS speeds up encryption and verification processes by more than 70% and 90%, respectively. Moreover, our scheme reduces the communication overhead in the verification phase by more than 80%.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner
    Yinbin Miao
    Jianfeng Ma
    Ximeng Liu
    Zhiquan Liu
    Limin Shen
    Fushan Wei
    Peer-to-Peer Networking and Applications, 2018, 11 : 287 - 297
  • [22] Ranked Multi-Keyword Search Data Using Cloud
    Shete, Sneha
    Dongre, Nilima
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTING AND INFORMATICS (ICICI 2017), 2017, : 590 - 594
  • [23] A Verifiable and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data with Accuracy Improvement
    Zhang, Qi
    Fu, Shaojing
    Jia, Nan
    Xu, Ming
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 588 - 604
  • [24] Ranked multi-keyword search data using cloud
    Shete, Sneha
    Dongre, Nilima
    Proceedings of the International Conference on Inventive Computing and Informatics, ICICI 2017, 2018, : 590 - 594
  • [25] A Blockchain-Enabled Privacy-Preserving Verifiable Query Framework for Securing Cloud-Assisted Industrial Internet of Things Systems
    Rahman, Mohammad Saidur
    Khalil, Ibrahim
    Moustafa, Nour
    Kalapaaking, Aditya Pribadi
    Bouras, Abdelaziz
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (07) : 5007 - 5017
  • [26] Security and Dependability of Cloud-Assisted Internet of Things
    Ali, Mazhar
    Khan, Samee U.
    Zomaya, Albert Y.
    IEEE CLOUD COMPUTING, 2016, 3 (02): : 24 - 26
  • [27] Cloud-assisted Industrial Internet of Things (IIoT) - Enabled framework for health monitoring
    Hossain, M. Shamim
    Muhammad, Ghulam
    COMPUTER NETWORKS, 2016, 101 : 192 - 202
  • [28] VPAMS: Verifiable and practical attribute-based multi-keyword search over encrypted cloud data
    Liang, Yanrong
    Li, Yanping
    Cao, Qiang
    Ren, Fang
    JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 108 (108)
  • [29] Novel Multi-Keyword Search on Encrypted Data in the Cloud
    Wu, Yunyun
    Hou, Jingyu
    Liu, Jing
    Zhou, Wanlei
    Yao, Shaowen
    IEEE ACCESS, 2019, 7 : 31984 - 31996
  • [30] Secure Authentication and Key Agreement Protocol for Cloud-Assisted Industrial Internet of Things
    Hu, Huanhuan
    Liao, Longxia
    Zhao, Junhui
    ELECTRONICS, 2022, 11 (10)