An Agent-based Searchable Encryption Scheme in Mobile Computing Environment

被引:0
|
作者
Yang Jian [1 ]
Yang Dengqi [1 ]
机构
[1] Dali Univ, Coll Math & Comp Sci, Dali 671003, Yunnan Province, Peoples R China
关键词
Searchable encryption; Bilinear mapping; Bilinear Diffie-Hellman problem; Computing agent; Mobile computing;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The cryptographic operations in existing searchable encryption protocols will consume a lot of energy of terminals if they are used in mobile computing environment. To address this issue, novel schemes of searchable encryption are required. In this paper, for reducing user's computational burden generated by the expensive cryptographic operations, an agent-based searchable encryption (ABSE) scheme with its security model is proposed in order that the searchable encryption can be used in mobile computing environment. A concrete implement of ABSE with its security proof is presented to help user search the related data with some keywords trapdoors in either cases that the agent is online or offline. Performance analysis is also provided to show this scheme is suitable to be used in mobile environments.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Efficiently Revocable and Searchable Attribute-Based Encryption Scheme for Mobile Cloud Storage
    Wang, Shangping
    Zhang, Duo
    Zhang, Yaling
    Liu, Lihua
    [J]. IEEE ACCESS, 2018, 6 : 30444 - 30457
  • [22] Mobile agent-based digital rights management scheme
    Ziolkowski, Bartlomiej
    Stoklosa, Janusz
    [J]. 6TH INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT APPLICATIONS, PROCEEDINGS, 2007, : 213 - +
  • [23] Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment
    Yan, Liang
    Ge, Lina
    Wang, Zhe
    Zhang, Guifen
    Xu, Jingya
    Hu, Zheng
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [24] Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment
    Liang Yan
    Lina Ge
    Zhe Wang
    Guifen Zhang
    Jingya Xu
    Zheng Hu
    [J]. Journal of Cloud Computing, 12
  • [25] A Study on Access Control Scheme Based on ABE Using Searchable Encryption in Cloud Environment
    Hwang, Yong-Woon
    Lee, Im-Yeong
    Yim, Kangbin
    [J]. ADVANCES IN INTERNET, DATA AND WEB TECHNOLOGIES (EIDWT 2020), 2020, 47 : 215 - 221
  • [26] Incremental proxy re-encryption scheme for mobile cloud computing environment
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Madani, Sajjad A.
    Ali, Mazhar
    Khan, Atta Ur Rehman
    Shamshirband, Shahaboddin
    [J]. JOURNAL OF SUPERCOMPUTING, 2014, 68 (02): : 624 - 651
  • [27] Incremental proxy re-encryption scheme for mobile cloud computing environment
    Abdul Nasir Khan
    M. L. Mat Kiah
    Sajjad A. Madani
    Mazhar Ali
    Atta ur Rehman Khan
    Shahaboddin Shamshirband
    [J]. The Journal of Supercomputing, 2014, 68 : 624 - 651
  • [28] Management issues of a mobile agent-based service environment
    Choy S.
    Breugst M.
    Datta M.
    [J]. Journal of Network and Systems Management, 1999, 7 (3) : 341 - 355
  • [29] Deploying personalized mobile services in an agent-based environment
    Lee, Wei-Po
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2007, 32 (04) : 1194 - 1207
  • [30] Agent-based integration of collaborative mobile environment and smartboard
    Kadri, Abdou Al-Rahim
    Kermani, Mohammad Mozaffari
    Ghenniwa, Hamada
    Shen, Weiming
    [J]. PROCEEDINGS OF THE ASME INTERNATIONAL CONFERENCE ON MANUFACTURING SCIENCE AND ENGINEERING - 2007, 2007, : 439 - 445