Distributed and Privacy-Preserving Data Dissemination at the Network Edge via Attribute-Based Searchable Encryption

被引:4
|
作者
Huso, Ingrid [1 ]
Piro, Giuseppe
Boggia, Gennaro
机构
[1] Politecn Bari, Dept Elect & Informat Engn, Bari, Italy
基金
欧盟地平线“2020”;
关键词
Industrial Internet of Things; Searchable Encryption; secure data dissemination; numerical analysis; PUBLIC-KEY ENCRYPTION; INDUSTRIAL INTERNET; KEYWORD SEARCH; MANAGEMENT; SCHEME; SECURE;
D O I
10.1109/MedComNet55087.2022.9810394
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Multi-Access Edge computing represents one of the most important enabling technologies for the Industrial Internet of Things. It allows advanced data processing and customized service provisioning, very close to the end-users. In the presence of many Multi-Access Edge computing applications, however, it is fundamental to ensure effective and privacy-preserving data dissemination at the network edge. From the security perspective, Attribute-based Encryption and Searchable Encryption techniques can be jointly used to achieve data confidentiality, flexible protection against unauthorized access, and privacy-preserving data dissemination. Available solutions, however, generally focus the attention on cloud-based approaches, use edge computing to implement some of the cryptographic tasks, and limit the investigation to single cryptographic operations. Indeed, no works investigate the adoption of these techniques in scenarios with multiple data producers and end-users, and fully operating at the network edge. To bridge this gap, this work proposes a novel methodology supporting fast and privacy-oriented data dissemination directly at the network edge. In the considered distributed network infrastructure, Multi-Access Edge computing applications express the interest to receive specific data by sending Trapdoors to Edge Servers. Data sources protect their contents through Attribute-based Encryption and deliver them to Edge Servers. In turn, Edge Servers implement Attribute-based Searchable Encryption functionalities to properly disseminate received contents towards Multi-Access Edge nodes hosting the applications that generated valid Trapdoors. The performance of the conceived approach has been evaluated through computer simulations. Obtained results highlight the benefits achieved against baseline (i.e., cloud-based) solutions.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Schemes with Fast Decryption
    Rao, Y. Sreenivasa
    INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 521 - 531
  • [42] Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme
    Ge, Aijun
    Zhang, Jiang
    Zhang, Rui
    Ma, Chuangui
    Zhang, Zhenfeng
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (11) : 2319 - 2321
  • [43] Privacy-Preserving Attribute-Based Multi-keyword Search Encryption Scheme with User Tracing
    Liu, Zhenhua
    Liu, Yan
    Xu, Jing
    Wang, Baocang
    CYBERSPACE SAFETY AND SECURITY, PT II, 2019, 11983 : 382 - 397
  • [44] PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Zhou, Jianying
    Au, Man Ho
    COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 73 - 90
  • [45] Multi-authority Distributed Attribute-Based Encryption with Application to Searchable Encryption on Lattices
    Kuchta, Veronika
    Markowitch, Olivier
    PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 409 - 435
  • [46] Attribute-Based Access Control Meets Blockchain-Enabled Searchable Encryption: A Flexible and Privacy-Preserving Framework for Multi-User Search
    Han, Jiujiang
    Li, Ziyuan
    Liu, Jian
    Wang, Huimei
    Xian, Ming
    Zhang, Yuxiang
    Chen, Yu
    ELECTRONICS, 2022, 11 (16)
  • [47] Privacy-preserving SQL database driven by searchable encryption
    Lu, Hai
    Xue, Xianbin
    Zhu, Yan
    Chen, Cecilia E.
    Han, Haoting
    Meng, Shutong
    Lin, Hongjie
    Gongcheng Kexue Xuebao/Chinese Journal of Engineering, 2024, 46 (11): : 2085 - 2098
  • [48] Address Permutation for Privacy-Preserving Searchable Symmetric Encryption
    Choi, Daeseon
    Kim, Seung-Hyun
    Lee, Younho
    ETRI JOURNAL, 2012, 34 (01) : 66 - 75
  • [49] Privacy-Preserving Searchable Encryption Scheme Based on Public and Private Blockchains
    Du, Ruizhong
    Ma, Caixia
    Li, Mingyue
    TSINGHUA SCIENCE AND TECHNOLOGY, 2023, 28 (01): : 13 - 26
  • [50] Geometric Searchable Encryption for Privacy-Preserving Location-Based Services
    Chen, Zhenhua
    Nie, Jingjing
    Li, Zhanli
    Susilo, Willy
    Ge, Chunpeng
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (04) : 2672 - 2684