Efficient and secure searchable encryption protocol for cloud-based Internet of Things

被引:44
|
作者
Wu, Libing [1 ]
Chen, Biwen [1 ]
Choo, Kim-Kwang Raymond [2 ,3 ]
He, Debiao [1 ,4 ]
机构
[1] Wuhan Univ, Comp Sch, State Key Lab Software Engn, Wuhan, Hubei, Peoples R China
[2] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[3] Univ South Australia, Sch Informat Technol & Math Sci, Adelaide, SA 5095, Australia
[4] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Gulin, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Things; Cloud-of-Things; Searchable encryption; Forward privacy; File-injection attack resilience; Insider keyword guessing attack resilience; KEYWORD GUESSING ATTACKS; SYMMETRIC-ENCRYPTION; SCHEMES; PRIVACY;
D O I
10.1016/j.jpdc.2017.08.007
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Internet of things (IoT) applications comprising thousands or millions of intelligent devices or things is fast becoming a norm in our inter-connected world, and the significant amount of data generated from IoT applications is often stored in the cloud. However, searching encrypted data (i.e. Searchable Encryption-SE) in the cloud remains an ongoing challenge. Existing SE protocols include searchable symmetric encryption (SSE) and public-key encryption with keyword search (PEKS). Limitations of SSE include complex and expensive key management and distribution, while PEKS suffer from inefficiency and are vulnerable to insider keyword guessing attacks (KGA). Besides, most protocols are insecure against file-injection attacks carried out by a malicious server. Thus, in this paper, we propose an efficient and secure searchable encryption protocol using the trapdoor permutation function (TPF). The protocol is designed for cloud-based IoT (also referred to as Cloud of Things - CoT) deployment, such as Cloud of Battlefield Things and Cloud of Military Things. Compared with other existing SE protocols, our proposed SE protocol incurs lower computation cost at the expense of a slightly higher storage cost (which is less of an issue, considering the decreasing costs of storage). We also prove that our protocol achieves inside KGA resilience, forward privacy, and file-injection attack resilience. (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:152 / 161
页数:10
相关论文
共 50 条
  • [21] Cloud-based federated identity for the Internet of Things
    Paul Fremantle
    Benjamin Aziz
    Annals of Telecommunications, 2018, 73 : 415 - 427
  • [22] Benchmarking Dynamic Searchable Symmetric Encryption Scheme for Cloud-Internet of Things Applications
    Ti, Yen-Wu
    Wu, Chia-Feng
    Yu, Chia-Mu
    Kuo, Sy-Yen
    IEEE ACCESS, 2020, 8 : 1715 - 1732
  • [23] Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems
    Yang Lu
    Jiguo Li
    Cluster Computing, 2019, 22 : 285 - 299
  • [24] Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems
    Lu, Yang
    Li, Jiguo
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (01): : 285 - 299
  • [25] An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
    Bypour, H.
    Farhadi, M.
    Mortazavi, R.
    INTERNATIONAL JOURNAL OF ENGINEERING, 2019, 32 (08): : 1117 - 1125
  • [26] Secure Quantum Steganography Protocol for Fog Cloud Internet of Things
    Abd El-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Hossain, M. Shamim
    Elmougy, Samir
    Ghoneim, Ahmed
    IEEE ACCESS, 2018, 6 : 10332 - 10340
  • [27] Divertible Searchable Symmetric Encryption for Secure Cloud Storage
    Zhang, Xi
    Huang, Cheng
    Su, Ye
    Qin, Jing
    Shen, Xuemin
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 3785 - 3790
  • [28] An efficient secure Internet of things data storage auditing protocol with adjustable parameter in cloud computing
    Liu, Meng
    Wang, Xuan
    Yang, Chi
    Jiang, Zoe Lin
    Li, Ye
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (01):
  • [29] Efficient Homomorphic-Encryption-Based Secure Search in Multiowner Setting for Internet of Things
    Wang, Yibing
    Miao, Yinbin
    Li, Xinghua
    Leng, Tao
    Liu, Zhiquan
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Deng, Robert H.
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (07): : 8885 - 8896
  • [30] An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage
    Wu, Libing
    Chen, Biwen
    Zeadally, Sherali
    He, Debiao
    SOFT COMPUTING, 2018, 22 (23) : 7685 - 7696