Efficient and secure searchable encryption protocol for cloud-based Internet of Things

被引:44
|
作者
Wu, Libing [1 ]
Chen, Biwen [1 ]
Choo, Kim-Kwang Raymond [2 ,3 ]
He, Debiao [1 ,4 ]
机构
[1] Wuhan Univ, Comp Sch, State Key Lab Software Engn, Wuhan, Hubei, Peoples R China
[2] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[3] Univ South Australia, Sch Informat Technol & Math Sci, Adelaide, SA 5095, Australia
[4] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Gulin, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Things; Cloud-of-Things; Searchable encryption; Forward privacy; File-injection attack resilience; Insider keyword guessing attack resilience; KEYWORD GUESSING ATTACKS; SYMMETRIC-ENCRYPTION; SCHEMES; PRIVACY;
D O I
10.1016/j.jpdc.2017.08.007
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Internet of things (IoT) applications comprising thousands or millions of intelligent devices or things is fast becoming a norm in our inter-connected world, and the significant amount of data generated from IoT applications is often stored in the cloud. However, searching encrypted data (i.e. Searchable Encryption-SE) in the cloud remains an ongoing challenge. Existing SE protocols include searchable symmetric encryption (SSE) and public-key encryption with keyword search (PEKS). Limitations of SSE include complex and expensive key management and distribution, while PEKS suffer from inefficiency and are vulnerable to insider keyword guessing attacks (KGA). Besides, most protocols are insecure against file-injection attacks carried out by a malicious server. Thus, in this paper, we propose an efficient and secure searchable encryption protocol using the trapdoor permutation function (TPF). The protocol is designed for cloud-based IoT (also referred to as Cloud of Things - CoT) deployment, such as Cloud of Battlefield Things and Cloud of Military Things. Compared with other existing SE protocols, our proposed SE protocol incurs lower computation cost at the expense of a slightly higher storage cost (which is less of an issue, considering the decreasing costs of storage). We also prove that our protocol achieves inside KGA resilience, forward privacy, and file-injection attack resilience. (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:152 / 161
页数:10
相关论文
共 50 条
  • [1] Efficient Protocol for Searchable Encryption and Secure Deletion on Cloud Storages
    Yu, Joon-Woo
    Choi, Hyoung-Kee
    2017 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2017,
  • [2] Security analysis and secure channel-free certificateless searchable public key authenticated encryption for a cloud-based Internet of things
    Wu, Bin
    Wang, Caifen
    Yao, Hailong
    PLOS ONE, 2020, 15 (04):
  • [3] Efficient Authenticated Key Agreement Protocol for Cloud-Based Internet of Things
    Muthukumaran, V
    Kumar, V. Vinoth
    Joseph, Rose Bindu
    Munirathnam, Meram
    Beschi, I. S.
    Niveditha, V. R.
    INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, ICICC 2022, VOL 3, 2023, 492 : 365 - 373
  • [4] Lightweight Searchable Encryption Protocol for Industrial Internet of Things
    Zhang, Ke
    Long, Jiahuan
    Wang, Xiaofen
    Dai, Hong-Ning
    Liang, Kaitai
    Imran, Muhammad
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (06) : 4248 - 4259
  • [5] Secure and Efficient Bloom-Filter-Based Image Search in Cloud-Based Internet of Things
    Li, Yingying
    Ma, Jianfeng
    Miao, Yinbin
    Wang, Xiangyu
    Lu, Rongxing
    Zhang, Wei
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (03) : 5024 - 5035
  • [7] A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption
    Unal, Devrim
    Al-Ali, Abdulla
    Catak, Ferhat Ozgur
    Hammoudeh, Mohammad
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 125 : 433 - 445
  • [8] Countering Statistical Attacks in Cloud-Based Searchable Encryption
    M. A. Manazir Ahsan
    Ihsan Ali
    Mohd Yamani Idna Bin Idris
    Muhammad Imran
    Muhammad Shoaib
    International Journal of Parallel Programming, 2020, 48 : 470 - 495
  • [9] Secure and Efficient Certificateless Searchable Authenticated Encryption Scheme Without Random Oracle for Industrial Internet of Things
    Hu, Zhenyu
    Deng, Lunzhi
    Wu, Yaying
    Shi, Hongyu
    Gao, Yan
    IEEE SYSTEMS JOURNAL, 2023, 17 (01): : 1304 - 1315
  • [10] An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted Medical Internet of Things
    Chi, Tianyu
    Qin, Baodong
    Zheng, Dong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020