Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data

被引:35
|
作者
Chen, Biwen [1 ]
Wu, Libing [1 ]
Kumar, Neeraj [2 ]
Choo, Kim-Kwang Raymond [3 ,4 ]
He, Debiao [5 ]
机构
[1] Wuhan Univ, Sch Comp Sci, Wuhan 430072, Hubei, Peoples R China
[2] Thapar Univ, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[3] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[4] Univ Texas San Antonio, Dept Elect & Comp Engn, San Antonio, TX 78249 USA
[5] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy; Encryption; Complexity theory; Public key; Servers; Industrial internet of things; cloud computing; lightweight searchable public-key encryption; forward privacy; KEYWORD SEARCH; PROTECTION; SCHEME;
D O I
10.1109/TETC.2019.2921113
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As more data from Industrial Internet of Things (IIoT) devices are been outsourced to the cloud, the need to ensure/achieve data privacy will be increasingly pressing. Searchable public-key encryption is a promising tool to achieve data privacy without sacrificing data usability. However, most existing searchable public-key encryption schemes are either inefficient (e.g., expensive in terms of encryption and searching keywords) or lack the required (security) features such as forward privacy. To address these limitations, we propose a lightweight searchable public-key encryption with forward privacy. Specifically, the scheme allows us to achieve forward privacy in a public-key cryptography (i.e., asymmetric) setting, and has the same search performance as a number of practical searchable symmetric encryption schemes. The formal security analysis shows that the proposed scheme is chosen-keyword attack resilient and achieves forward privacy. Finally, the experimental results on a real-world dataset demonstrate that the proposed scheme is highly efficient and scalable in IIoT applications.
引用
收藏
页码:1753 / 1764
页数:12
相关论文
共 50 条
  • [21] A forward-secure public-key encryption scheme
    Canetti, R
    Halevi, S
    Katz, J
    [J]. ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 255 - 271
  • [22] A forward-secure public-key encryption scheme
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    [J]. JOURNAL OF CRYPTOLOGY, 2007, 20 (03) : 265 - 294
  • [23] A Forward-Secure Public-Key Encryption Scheme
    Ran Canetti
    Shai Halevi
    Jonathan Katz
    [J]. Journal of Cryptology, 2007, 20 : 265 - 294
  • [24] PUBLIC-KEY ENCRYPTION
    STUBBS, E
    [J]. EDN MAGAZINE-ELECTRICAL DESIGN NEWS, 1984, 29 (04): : 29 - 29
  • [25] Searchable encryption: A survey on privacy-preserving search schemes on encrypted outsourced data
    Handa, Rohit
    Krishna, C. Rama
    Aggarwal, Naveen
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (17):
  • [26] Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments
    Wu, Tsu-Yang
    Chen, Chien-Ming
    Wang, King-Hang
    Wu, Jimmy Ming-Tai
    [J]. IEEE ACCESS, 2019, 7 : 49232 - 49239
  • [27] Certificateless Public Key Authenticated Searchable Encryption With Enhanced Security Model in IIoT Applications
    Cheng, Leixiao
    Meng, Fei
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (02): : 1391 - 1400
  • [28] PVSAE: A Public Verifiable Searchable Encryption Service Framework for Outsourced Encrypted Data
    Zhang, Rui
    Xue, Rui
    Yu, Ting
    Liu, Ling
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS), 2016, : 428 - 435
  • [29] Searchable Symmetric Encryption with Forward Search Privacy
    Li, Jin
    Huang, Yanyu
    Wei, Yu
    Lv, Siyi
    Liu, Zheli
    Dong, Changyu
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 460 - 474
  • [30] A Lightweight Certificateless Searchable Public Key Encryption Scheme for Medical Internet of Things
    Liu, Xiaoguang
    Sun, Yingying
    Dong, Hao
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2022, 2022, 1726 : 69 - 86