Distributed and Privacy-Preserving Data Dissemination at the Network Edge via Attribute-Based Searchable Encryption

被引:4
|
作者
Huso, Ingrid [1 ]
Piro, Giuseppe
Boggia, Gennaro
机构
[1] Politecn Bari, Dept Elect & Informat Engn, Bari, Italy
基金
欧盟地平线“2020”;
关键词
Industrial Internet of Things; Searchable Encryption; secure data dissemination; numerical analysis; PUBLIC-KEY ENCRYPTION; INDUSTRIAL INTERNET; KEYWORD SEARCH; MANAGEMENT; SCHEME; SECURE;
D O I
10.1109/MedComNet55087.2022.9810394
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Multi-Access Edge computing represents one of the most important enabling technologies for the Industrial Internet of Things. It allows advanced data processing and customized service provisioning, very close to the end-users. In the presence of many Multi-Access Edge computing applications, however, it is fundamental to ensure effective and privacy-preserving data dissemination at the network edge. From the security perspective, Attribute-based Encryption and Searchable Encryption techniques can be jointly used to achieve data confidentiality, flexible protection against unauthorized access, and privacy-preserving data dissemination. Available solutions, however, generally focus the attention on cloud-based approaches, use edge computing to implement some of the cryptographic tasks, and limit the investigation to single cryptographic operations. Indeed, no works investigate the adoption of these techniques in scenarios with multiple data producers and end-users, and fully operating at the network edge. To bridge this gap, this work proposes a novel methodology supporting fast and privacy-oriented data dissemination directly at the network edge. In the considered distributed network infrastructure, Multi-Access Edge computing applications express the interest to receive specific data by sending Trapdoors to Edge Servers. Data sources protect their contents through Attribute-based Encryption and deliver them to Edge Servers. In turn, Edge Servers implement Attribute-based Searchable Encryption functionalities to properly disseminate received contents towards Multi-Access Edge nodes hosting the applications that generated valid Trapdoors. The performance of the conceived approach has been evaluated through computer simulations. Obtained results highlight the benefits achieved against baseline (i.e., cloud-based) solutions.
引用
收藏
页数:9
相关论文
共 50 条
  • [21] Privacy-Preserving Auditing for Attribute-Based Credentials
    Camenisch, Jan
    Lehmann, Anja
    Neven, Gregory
    Rial, Alfredo
    COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 109 - 127
  • [22] Attribute-Based Searchable Encryption in Edge Computing for Lightweight Devices
    Niu, Shufen
    Hu, Ying
    Zhou, Siwei
    Shao, Honglin
    Wang, Caifen
    IEEE SYSTEMS JOURNAL, 2023, 17 (03): : 3503 - 3514
  • [23] Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems
    Liu, Xueqiao
    Yang, Guomin
    Susilo, Willy
    Tonien, Joseph
    Liu, Ximeng
    Shen, Jian
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021, 32 (03) : 561 - 574
  • [24] Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption
    Feng T.
    Chen L.
    Fang J.
    Shi J.
    Tongxin Xuebao/Journal on Communications, 2023, 44 (05): : 224 - 233
  • [25] Attribute-Based Symmetric Searchable Encryption
    Dang, Hai-Van
    Ullah, Amjad
    Bakas, Alexandros
    Michalas, Antonis
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 318 - 336
  • [26] Attribute-Based Searchable Encryption: A Survey
    Yan, Li
    Wang, Gaozhou
    Yin, Tian
    Liu, Peishun
    Feng, Hongxin
    Zhang, Wenbin
    Hu, Hailin
    Pan, Fading
    ELECTRONICS, 2024, 13 (09)
  • [27] Privacy-Preserving Distributed Data Fusion Based on Attribute Protection
    Su, Xin
    Fan, Kuan
    Shi, Wenbo
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (10) : 5765 - 5777
  • [28] A privacy-preserving personal health record with searchability and revocability using attribute-based encryption
    Duan, Shuhong
    Liu, Zhenhua
    Zhou, Peilin
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 831 - 838
  • [29] Privacy-Preserving Online/Offline and Outsourced Multi-Authority Attribute-Based Encryption
    Shao, Jiaye
    Zhu, Yanqin
    Ji, Qijin
    2017 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS 2017), 2017, : 285 - 291
  • [30] A Privacy-Preserving Multi-Authority Attribute-Based Encryption Approach for Mobile Healthcare
    Meng, Dacheng
    Luo, Entao
    Wang, Guojun
    PROCEEDINGS 2016 IEEE 13TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS 2016), 2016, : 299 - 306