SearchBC: A Blockchain-Based PEKS Framework for IoT Services

被引:16
作者
Jiang, Peng [1 ,2 ]
Qiu, Baoqi [1 ]
Zhu, Liehuang [1 ]
Gai, Keke [1 ]
机构
[1] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
基金
北京市自然科学基金;
关键词
Blockchain; Servers; Reliability; Receivers; Cloud computing; Public key; Privacy; fairness; privacy; public-key encryption with keyword search (PEKS); reliability; KEYWORD-SEARCH; ENCRYPTION;
D O I
10.1109/JIOT.2020.3036705
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) makes great development and gains popularity with a mature combination with cloud computing. Plaintext data can be encrypted when data owners try to secure the confidentiality, while the encrypted data retrieval can be achieved by a cryptographic primitive named searchable encryption. Public-key encryption with keyword search (PEKS) is built on the asymmetric setting, however, the "honest-but-curious" assumption in PEKS creates challenges on the search reliability when malicious behaviors happen. It is nontrivial to enable the reliable search while preserving keyword privacy, as users who have paid need to receive either correct-and-wanted results or compensations. In this work, we apply blockchain to resolve this problem and design SearchBC, a blockchain-based PEKS framework supporting private, reliable, and fair encrypted search over the asymmetric setting. SearchBC is built on top of the blockchain and a keyword server to allow fairness in transactions and keyword preprocessing. We present a SearchBC instantiation and formally prove its security under the newly defined security model. SearchBC guarantees that search operations are fair and reliable and that the used keyword keeps privacy. The implementation results show that SearchBC provides a feasible means with reasonable communication and computation costs.
引用
收藏
页码:5031 / 5044
页数:14
相关论文
共 26 条
[1]  
Ali M, 2016, PROCEEDINGS OF USENIX ATC '16: 2016 USENIX ANNUAL TECHNICAL CONFERENCE, P181
[2]   Secure Multiparty Computations on Bitcoin [J].
Andrychowicz, Marcin ;
Dziembowski, Stefan ;
Malinowski, Daniel ;
Mazurek, Lukasz .
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, :443-458
[3]  
[Anonymous], 2020, 2019 REV DATA BREACH
[4]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[5]  
Bentov I, 2014, LECT NOTES COMPUT SC, V8617, P421, DOI 10.1007/978-3-662-44381-1_24
[6]   New constructions and practical applications for private stream searching - (Extended abstract) [J].
Bethencourt, John ;
Song, Dawn ;
Waters, Brent .
2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, :132-+
[7]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[8]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[9]  
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[10]   A fair protocol for data trading based on Bitcoin transactions [J].
Delgado-Segura, Sergi ;
Perez-Sola, Cristina ;
Navarro-Arribas, Guillermo ;
Herrera-Joancomarti, Jordi .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 (107) :832-840