Forward Secure Public Key Encryption with Keyword Search for Cloud-assisted IoT

被引:8
|
作者
Kim, Hyeongseob [1 ]
Hahn, Changhee [1 ]
Hur, Junbeom [1 ]
机构
[1] Korea Univ, Dept Comp Sci & Engn, Seoul, South Korea
关键词
Cloud; Internet of Things; public key encryption with keyword search; security; forward privacy; IDENTITY-BASED ENCRYPTION; INTERNET;
D O I
10.1109/CLOUD49709.2020.00083
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) features a mechanism that extends connectivity to diverse computing devices, such as smart phones, commodity sensors, and appliances. Due to the huge quantity of data generated by the IoT devices, they are likely to be stored and managed by the cloud these days. However, because of the privacy concern about the sensitive data, encryption techniques are typically adopted by the cloud. In order to enable searching over encrypted data for multiple data senders in the cloud, public key encryption with keyword search (PEKS) has been proposed as one variant of searchable encryption (SE). Unfortunately, existing PEKS schemes are vulnerable to adaptive file-injection attack due to the lack of forward privacy. In this paper, we propose a forward secure PEKS scheme based on hierarchical identity-based encryption for cloud-assisted IoT environments. While the existing schemes incur to the data receiver a storage overhead that increases linearly with the number of data senders, our scheme incurs only a constant cost. The experimental analysis with Amazon EC2 and Raspberri Pi shows that our scheme is two to five times more efficient than the previous schemes, which makes our scheme more suitable for multiple data senders in the cloud-assisted IoT environments.
引用
收藏
页码:549 / 556
页数:8
相关论文
共 50 条
  • [31] Improved Secure Server-Designated Public Key Encryption with Keyword Search
    Andola, Nitish
    Prakash, Sourabh
    Venkatesan, S.
    Verma, Shekhar
    2017 CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (CICT), 2017,
  • [32] Verifiable Multilevel Dynamic Searchable Encryption With Forward and Backward Privacy in Cloud-Assisted IoT
    Ge, Yue
    Gao, Ying
    Ning, Jianting
    Ma, Jie
    Chen, Xiaofeng
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (24): : 40861 - 40874
  • [33] An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing
    Bo, Yang
    Zhang, Mingwu
    Du, Jun-Qiang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04): : 1083 - 1093
  • [34] Public Key Encryption with Authorized Equality Test on Outsourced Ciphertexts for Cloud-Assisted IoT in Dual Server Model
    Zhao, Meng
    Ding, Yong
    Tang, Shijie
    Liang, Hai
    Wang, Huiyong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [35] Generic combination of public key encryption with keyword search and public key encryption
    Zhang, Rui
    Imai, Hideki
    CRYPTOLOGY AND NETWORK SECURITY, 2007, 4856 : 159 - 174
  • [36] On the integration of public key data encryption and public key encryption with keyword search
    Baek, Joonsang
    Safavi-Naini, Reihaneh
    Susilo, Willy
    INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 217 - 232
  • [37] The Public Verifiability of Public Key Encryption with Keyword Search
    Zhu, Binrui
    Sun, Jiameng
    Qin, Jing
    Ma, Jixin
    MOBILE NETWORKS AND MANAGEMENT (MONAMI 2017), 2018, 235 : 299 - 312
  • [38] Public key encryption with keyword search revisited
    Baek, Joonsang
    Safavi-Naini, Reihaneh
    Susilo, Willy
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2008, PT 1, PROCEEDINGS, 2008, 5072 : 1249 - 1259
  • [39] Public Key Encryption with Wildcards Keyword Search
    Wang, Zhao-li
    Han, Jin-li
    Wang, Mei-juan
    Shi, Ya-qing
    Dong, Hui
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 538 - 541
  • [40] Public key encryption with distributed keyword search
    Eslami, Ziba
    Noroozi, Mahnaz
    Amirizirtol, Kobra
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (08): : 2369 - 2393