Secure search scheme for encrypted data in the VANET cloud with random query trapdoor

被引:0
|
作者
Hegde, Nayana [1 ]
Manvi, Sunilkumar S. [2 ]
Lallie, Harjinder Singh [3 ]
机构
[1] REVA Univ, Sch Elect & Commun Engn, Bengaluru 560064, India
[2] REVA Univ, Sch Comp Sci & Engn, Bengaluru, India
[3] Univ Warwick, WMG, Coventry, W Midlands, England
来源
INFORMATION SECURITY JOURNAL | 2023年 / 32卷 / 05期
关键词
Vehicular cloud; encrypted data search; trapdoor; Bloom filter; KEYWORD RANKED SEARCH;
D O I
10.1080/19393555.2022.2081636
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Integration of the Vehicular Adhoc Network (VANET) with cloud computing has played an important role in aiding the safety of vehicle drivers and passengers. Due to the dynamic nature of the vehicles and wireless communication, achieving security of outsourced data is still a major challenge in the vehicular cloud. The encryption of sensitive data prior to outsourcing is an elementary approach to achieve data confidentiality. However, it is difficult for users to search over encrypted data using customary search techniques. In this paper, we propose a secure search scheme by empowering the data users to create a random query trapdoor. We make use of the bloom filter and bilinear pairing operation to construct a secure index for keywords of each data file, which enables the vehicular cloud to carry out a search without deriving any helpful information about the query. We use the SIMITS2 simulator to implement the proposed scheme and test the performance in terms of key generation time, secure index construction time, trapdoor generation time and search time. The proposed scheme performs better than existing searchable encryption technologies based on hashing and attribute-based encryption.
引用
收藏
页码:383 / 400
页数:18
相关论文
共 50 条
  • [41] Efficient and secure multi-dimensional geometric range query over encrypted data in cloud
    Li, Xingxin
    Zhu, Youwen
    Wang, Jian
    Zhang, Ji
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 131 : 44 - 54
  • [42] Improved collusion-resisting secure nearest neighbor query over encrypted data in cloud
    Zhu, Youwen
    Zhang, Yue
    Li, Xingxin
    Yan, Hongyang
    Li, Jing
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (21):
  • [43] Secure Encrypted Image Search in Mobile Cloud Computing
    Zou, Qin
    Wang, Jianfeng
    Chen, Xiaofeng
    [J]. 2015 10TH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2015), 2015, : 572 - 575
  • [44] Secure Similarity Search over Encrypted Cloud Images
    Zhu, Yi
    Sun, Xingming
    Xia, Zhihua
    Xiong, Naixue
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (08): : 1 - 14
  • [45] Secure Similar Patients Query on Encrypted Genomic Data
    Mahdi, Md Safiur Rahman
    Al Aziz, Md Momin
    Alhadidi, Dima
    Mohammed, Noman
    [J]. IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2019, 23 (06) : 2611 - 2618
  • [46] Collusion-Resisting Secure Nearest Neighbor Query over Encrypted Data in Cloud, Revisited
    Zhu, Youwen
    Wang, Zhikuan
    Wang, Jian
    [J]. 2016 IEEE/ACM 24TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2016,
  • [47] Secure similarity search over encrypted cloud images
    Jiangsu Engineering Center of Network Monitoring, China
    不详
    不详
    [J]. Int. J. Secur. Appl., 8 (1-14):
  • [48] Similarity Search for Encrypted Images in Secure Cloud Computing
    Li, Yingying
    Ma, Jianfeng
    Miao, Yinbin
    Wang, Yue
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (02) : 1142 - 1155
  • [49] A Provably Secure and Efficient Range Query Scheme for Outsourced Encrypted Uncertain Data From Cloud-Based Internet of Things Systems
    Guo, Cheng
    Su, Shenghao
    Choo, Kim-Kwang Raymond
    Tian, Pengxu
    Tang, Xinyu
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (03) : 1848 - 1860
  • [50] Secure Data Management Scheme using One-Time Trapdoor on Cloud Storage Environment
    Lee, Sun-Ho
    Lee, Im-Yeong
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 257 - 271