Distributed and Privacy-Preserving Data Dissemination at the Network Edge via Attribute-Based Searchable Encryption

被引:4
|
作者
Huso, Ingrid [1 ]
Piro, Giuseppe
Boggia, Gennaro
机构
[1] Politecn Bari, Dept Elect & Informat Engn, Bari, Italy
基金
欧盟地平线“2020”;
关键词
Industrial Internet of Things; Searchable Encryption; secure data dissemination; numerical analysis; PUBLIC-KEY ENCRYPTION; INDUSTRIAL INTERNET; KEYWORD SEARCH; MANAGEMENT; SCHEME; SECURE;
D O I
10.1109/MedComNet55087.2022.9810394
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Multi-Access Edge computing represents one of the most important enabling technologies for the Industrial Internet of Things. It allows advanced data processing and customized service provisioning, very close to the end-users. In the presence of many Multi-Access Edge computing applications, however, it is fundamental to ensure effective and privacy-preserving data dissemination at the network edge. From the security perspective, Attribute-based Encryption and Searchable Encryption techniques can be jointly used to achieve data confidentiality, flexible protection against unauthorized access, and privacy-preserving data dissemination. Available solutions, however, generally focus the attention on cloud-based approaches, use edge computing to implement some of the cryptographic tasks, and limit the investigation to single cryptographic operations. Indeed, no works investigate the adoption of these techniques in scenarios with multiple data producers and end-users, and fully operating at the network edge. To bridge this gap, this work proposes a novel methodology supporting fast and privacy-oriented data dissemination directly at the network edge. In the considered distributed network infrastructure, Multi-Access Edge computing applications express the interest to receive specific data by sending Trapdoors to Edge Servers. Data sources protect their contents through Attribute-based Encryption and deliver them to Edge Servers. In turn, Edge Servers implement Attribute-based Searchable Encryption functionalities to properly disseminate received contents towards Multi-Access Edge nodes hosting the applications that generated valid Trapdoors. The performance of the conceived approach has been evaluated through computer simulations. Obtained results highlight the benefits achieved against baseline (i.e., cloud-based) solutions.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Privacy-preserving data dissemination scheme based on Searchable Encryption, publish-subscribe model, and edge computing
    Huso, Ingrid
    Sparapano, Daniele
    Piro, Giuseppe
    Boggia, Gennaro
    COMPUTER COMMUNICATIONS, 2023, 203 : 262 - 275
  • [2] A Privacy-Preserving Attribute-Based Encryption System for Data Sharing in Smart Cities
    Shen, Xieyang
    Huang, Chuanhe
    Wang, Danxin
    Shi, Jiaoli
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [3] A Privacy-Preserving Attribute-Based Encryption System for Data Sharing in Smart Cities
    Shen, Xieyang
    Huang, Chuanhe
    Wang, Danxin
    Shi, Jiaoli
    Wireless Communications and Mobile Computing, 2021, 2021
  • [4] A privacy-preserving data sharing system with decentralized attribute-based encryption scheme
    Kang, Li
    Zhang, Leyou
    International Journal of Network Security, 2020, 22 (05) : 815 - 827
  • [5] Efficient and privacy-preserving traceable attribute-based encryption in blockchain
    Axin Wu
    Yinghui Zhang
    Xiaokun Zheng
    Rui Guo
    Qinglan Zhao
    Dong Zheng
    Annals of Telecommunications, 2019, 74 : 401 - 411
  • [6] Efficient and privacy-preserving traceable attribute-based encryption in blockchain
    Wu, Axin
    Zhang, Yinghui
    Zheng, Xiaokun
    Guo, Rui
    Zhao, Qinglan
    Zheng, Dong
    ANNALS OF TELECOMMUNICATIONS, 2019, 74 (7-8) : 401 - 411
  • [7] Novel Secure Privacy-Preserving Decentralized Attribute-Based Encryption
    Liang, Pengfei
    Zhang, Leyou
    Shang, Yujie
    FRONTIERS IN CYBER SECURITY, 2018, 879 : 66 - 80
  • [8] The blockchain-based privacy-preserving searchable attribute-based encryption scheme for federated learning model in IoMT
    Zhou, Ziyu
    Wang, Na
    Liu, Jianwei
    Fu, Junsong
    Deng, Lunzhi
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (24):
  • [9] A Privacy-Preserving Medical Data Traceability System Based on Attribute-Based Encryption on Blockchain
    Zhao, Yujuan
    Cui, Baojiang
    Xu, Jie
    CYBER SECURITY, CNCERT 2021, 2022, 1506 : 27 - 36
  • [10] Privacy-preserving searchable encryption in the intelligent edge computing
    Chen, Qi
    Fan, Kai
    Zhang, Kuan
    Wang, Haoyang
    Li, Hui
    Yang, Yingtang
    COMPUTER COMMUNICATIONS, 2020, 164 : 31 - 41