Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data

被引:35
|
作者
Chen, Biwen [1 ]
Wu, Libing [1 ]
Kumar, Neeraj [2 ]
Choo, Kim-Kwang Raymond [3 ,4 ]
He, Debiao [5 ]
机构
[1] Wuhan Univ, Sch Comp Sci, Wuhan 430072, Hubei, Peoples R China
[2] Thapar Univ, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[3] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[4] Univ Texas San Antonio, Dept Elect & Comp Engn, San Antonio, TX 78249 USA
[5] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy; Encryption; Complexity theory; Public key; Servers; Industrial internet of things; cloud computing; lightweight searchable public-key encryption; forward privacy; KEYWORD SEARCH; PROTECTION; SCHEME;
D O I
10.1109/TETC.2019.2921113
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As more data from Industrial Internet of Things (IIoT) devices are been outsourced to the cloud, the need to ensure/achieve data privacy will be increasingly pressing. Searchable public-key encryption is a promising tool to achieve data privacy without sacrificing data usability. However, most existing searchable public-key encryption schemes are either inefficient (e.g., expensive in terms of encryption and searching keywords) or lack the required (security) features such as forward privacy. To address these limitations, we propose a lightweight searchable public-key encryption with forward privacy. Specifically, the scheme allows us to achieve forward privacy in a public-key cryptography (i.e., asymmetric) setting, and has the same search performance as a number of practical searchable symmetric encryption schemes. The formal security analysis shows that the proposed scheme is chosen-keyword attack resilient and achieves forward privacy. Finally, the experimental results on a real-world dataset demonstrate that the proposed scheme is highly efficient and scalable in IIoT applications.
引用
收藏
页码:1753 / 1764
页数:12
相关论文
共 50 条
  • [1] BASPED: Blockchain assisted searchable public key encryption over outsourced data
    Chakraborty, Partha Sarathi
    Tripathy, Somanath
    Nayak, Sanjeet Kumar
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (01) : 487 - 503
  • [2] BASPED: Blockchain assisted searchable public key encryption over outsourced data
    Partha Sarathi Chakraborty
    Somanath Tripathy
    Sanjeet Kumar Nayak
    [J]. International Journal of Information Security, 2024, 23 : 487 - 503
  • [3] A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing
    Chen, Biwen
    Wu, Libing
    Li, Li
    Choo, Kim-Kwang Raymond
    He, Debiao
    [J]. IEEE ACCESS, 2020, 8 : 28009 - 28020
  • [4] Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks
    Xu, Peng
    He, Shuanghong
    Wang, Wei
    Susilo, Willy
    Jin, Hai
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3712 - 3723
  • [5] Hidden-Token Searchable Public-Key Encryption
    Zuo, Cong
    Shao, Jun
    Liu, Zhe
    Ling, Yun
    Wei, Guiyi
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 248 - 254
  • [6] A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks
    Chen, Biwen
    Wu, Libing
    Wang, Huaqun
    Zhou, Lu
    He, Debiao
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) : 5813 - 5825
  • [7] An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy
    Yang, Guang
    Guo, Junling
    Han, Lidong
    Liu, Xuejiao
    Tian, Chengliang
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (01) : 503 - 515
  • [8] An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy
    Guang Yang
    Junling Guo
    Lidong Han
    Xuejiao Liu
    Chengliang Tian
    [J]. Peer-to-Peer Networking and Applications, 2022, 15 : 503 - 515
  • [9] Security-enhanced public-key authenticated searchable encryption
    Cheng, Leixiao
    Qin, Jing
    Feng, Feng
    Meng, Fei
    [J]. INFORMATION SCIENCES, 2023, 647
  • [10] Multi-keyword ranked searchable public-key encryption
    Hu, Chengyu
    Yang, Bo
    Liu, Pengtao
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2015, 6 (3-4) : 221 - 231