A Secure Data Sharing Based on Key Aggregate Searchable Encryption in Fog-Enabled IoT Environment

被引:17
|
作者
Oh, Jihyeon [1 ]
Lee, JoonYoung [1 ]
Kim, MyeongHyun [1 ]
Park, Youngho [1 ]
Park, KiSung [2 ]
Noh, SungKee [2 ]
机构
[1] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
[2] Elect & Telecommun Res Inst, Blockchain Res Sect, Daejeon 34129, South Korea
关键词
Servers; Cloud computing; Internet of Things; Blockchains; Peer-to-peer computing; Edge computing; Information sharing; Search methods; Data sharing; KASE; fog computing; blockchain; AUTHENTICATION PROTOCOL; PROVABLY SECURE; INTERNET; SYSTEM; SCHEME; EXCHANGE; DESIGN;
D O I
10.1109/TNSE.2022.3204991
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Cloud server and fog computing have been utilized to manage enormous volumes of data with low service transmission time in Internet of Things (IoT) environment. However, untrustworthy relationships between network entities and cloud server cause a lot of security concerns. Many researches have been studied based on traditional cryptosystems for data sharing systems. But they lead to key management difficulty and do not ensure the data owner's authority by depending on Trusted Third Party (TTP). Therefore, we use key aggregate searchable encryption (KASE), which enables owners to exercise their rights in data management and sharing without the help of TTP and resolves the key management problem. In this paper, we propose a secure data sharing system based on KASE in fog-enabled IoT environment using blockchain. We prove the resistance of the proposed scheme against various attacks through informal analysis and Automated Validation of Internet Security Protocols and Applications (AVISPA) simulation tool. We prove the guarantee of secure mutual authentcation using Burrows-Abadi-Needham (BAN) logic. Furthermore, we compare security features and performance of the proposed scheme with existing schemes through Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL).
引用
收藏
页码:4468 / 4481
页数:14
相关论文
共 50 条
  • [31] Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain
    Manzoor, Ahsan
    Braeken, An
    Kanhere, Salil S.
    Ylianttila, Mika
    Liyanage, Madhsanka
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 176
  • [32] A Note on One Lightweight Authenticated Key Agreement for Fog-enabled IoT Deployment
    Liu, Lihua
    Jia, Yingqing
    Cao, Zhengjun
    International Journal of Network Security, 2024, 26 (02) : 252 - 256
  • [33] Efficient privacy-preserving data replication in fog-enabled IoT
    Sarwar, Kinza
    Yongchareon, Sira
    Yu, Jian
    Rehman, Saeed Ur
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 128 : 538 - 551
  • [34] ACS-FIT: A Secure and Efficient Access Control Scheme for Fog-enabled IoT
    Sarma, Richa
    Kumar, Chandan
    Barbhuiya, Ferdous Ahmed
    2020 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2020, : 2782 - 2789
  • [35] Searchable encryption algorithm based on key aggregation of multiple data owners in data sharing
    Xu, Guangwei
    Ji, Wenrui
    Wang, Yan
    Shi, Xiujin
    Huang, Qiubo
    Gan, Yanglan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [36] Verifiable Key-Aggregate Searchable Encryption Scheme for Fog-Based Internet of Autonomous Vehicles
    Basudan, Sultan
    Alamer, Abdulrahman
    APPLIED SCIENCES-BASEL, 2025, 15 (06):
  • [37] A new hybrid encryption in fog–cloud environment for secure medical data-sharing
    G. A. Thushara
    S. Mary Saira Bhanu
    Iran Journal of Computer Science, 2023, 6 (2) : 169 - 183
  • [38] Blockchain-Enabled Secure Data Sharing with Honey Encryption and DSNN-Based Key Generation
    Siyal, Reshma
    Long, Jun
    Asim, Muhammad
    Ahmad, Naveed
    Fathi, Hanaa
    Alshinwan, Mohammad
    MATHEMATICS, 2024, 12 (13)
  • [39] The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey
    Tariq, Noshina
    Asim, Muhammad
    Al-Obeidat, Feras
    Zubair Farooqi, Muhammad
    Baker, Thar
    Hammoudeh, Mohammad
    Ghafir, Ibrahim
    SENSORS, 2019, 19 (08):
  • [40] A secure and efficient access control scheme with attribute revocation and merging capabilities for fog-enabled IoT?
    Sarma, Richa
    Barbhuiya, Ferdous Ahmed
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104