Distributed and Privacy-Preserving Data Dissemination at the Network Edge via Attribute-Based Searchable Encryption

被引:4
|
作者
Huso, Ingrid [1 ]
Piro, Giuseppe
Boggia, Gennaro
机构
[1] Politecn Bari, Dept Elect & Informat Engn, Bari, Italy
基金
欧盟地平线“2020”;
关键词
Industrial Internet of Things; Searchable Encryption; secure data dissemination; numerical analysis; PUBLIC-KEY ENCRYPTION; INDUSTRIAL INTERNET; KEYWORD SEARCH; MANAGEMENT; SCHEME; SECURE;
D O I
10.1109/MedComNet55087.2022.9810394
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Multi-Access Edge computing represents one of the most important enabling technologies for the Industrial Internet of Things. It allows advanced data processing and customized service provisioning, very close to the end-users. In the presence of many Multi-Access Edge computing applications, however, it is fundamental to ensure effective and privacy-preserving data dissemination at the network edge. From the security perspective, Attribute-based Encryption and Searchable Encryption techniques can be jointly used to achieve data confidentiality, flexible protection against unauthorized access, and privacy-preserving data dissemination. Available solutions, however, generally focus the attention on cloud-based approaches, use edge computing to implement some of the cryptographic tasks, and limit the investigation to single cryptographic operations. Indeed, no works investigate the adoption of these techniques in scenarios with multiple data producers and end-users, and fully operating at the network edge. To bridge this gap, this work proposes a novel methodology supporting fast and privacy-oriented data dissemination directly at the network edge. In the considered distributed network infrastructure, Multi-Access Edge computing applications express the interest to receive specific data by sending Trapdoors to Edge Servers. Data sources protect their contents through Attribute-based Encryption and deliver them to Edge Servers. In turn, Edge Servers implement Attribute-based Searchable Encryption functionalities to properly disseminate received contents towards Multi-Access Edge nodes hosting the applications that generated valid Trapdoors. The performance of the conceived approach has been evaluated through computer simulations. Obtained results highlight the benefits achieved against baseline (i.e., cloud-based) solutions.
引用
收藏
页数:9
相关论文
共 50 条
  • [31] Concepts and languages for privacy-preserving attribute-based authentication
    Camenisch, Jan
    Dubovitskaya, Maria
    Enderlein, Robert R.
    Lehmann, Anja
    Neven, Gregory
    Paquin, Christian
    Preiss, Franz-Stefan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 25 - 44
  • [32] A Privacy-Preserving Attribute-Based Access Control Scheme
    Xu, Yang
    Zeng, Quanrun
    Wang, Guojun
    Zhang, Cheng
    Ren, Ju
    Zhang, Yaoxue
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE (SPACCS 2018), 2018, 11342 : 361 - 370
  • [33] Privacy-preserving Data Sharing with Attribute-based Private Matching Based on Edge Computation in the Internet-of-Things
    Hsu, Ruei-Hau
    Hu, Yu-Hsaing
    Lin, Guan-Wei
    Ko, Bing-Cheng
    2020 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2020, : 1578 - 1587
  • [34] Dual Traceable Distributed Attribute-Based Searchable Encryption and Ownership Transfer
    Yang, Yang
    Deng, Robert H.
    Guo, Wenzhong
    Cheng, Hongju
    Luo, Xiangyang
    Zheng, Xianghan
    Rong, Chunming
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 247 - 262
  • [35] Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing
    Xiong, Hu
    Zhang, Hao
    Sun, Jianfei
    IEEE SYSTEMS JOURNAL, 2019, 13 (03): : 2739 - 2750
  • [36] A privacy preserving attribute-based encryption scheme with user revocation
    Li, Jiguo
    Shi, Yuerong
    Zhang, Yichen
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2281 - 2292
  • [37] Privacy-preserving Multi-authority Attribute-based Encryption with Dynamic Policy Updating in PHR
    Yan, Xixi
    Ni, Hao
    Liu, Yuan
    Han, Dezhi
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2019, 16 (03) : 831 - 847
  • [38] Security analysis of a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme
    Wang, Minqian
    Zhang, Zhenfeng
    Chen, Cheng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04): : 1237 - 1245
  • [39] Privacy-Preserving Multi-authority Ciphertext-Policy Attribute-Based Encryption with Revocation
    Ma, Hua
    Dong, Enting
    Liu, Zhenhua
    Zhang, Linchao
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, BWCCA-2017, 2018, 12 : 811 - 820
  • [40] Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud
    Song, Yujiao
    Wang, Hao
    Wei, Xiaochao
    Wu, Lei
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019