A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks

被引:5
|
作者
Zhu, Binrui [1 ]
Susilo, Willy [2 ]
Qin, Jing [1 ,3 ]
Guo, Fuchun [2 ]
Zhao, Zhen [2 ]
Ma, Jixin [4 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Shandong, Peoples R China
[2] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[4] Univ Greenwich, Sch Comp & Math Sci, Ctr Comp & Computat Sci, London SE10 9LS, England
关键词
wireless sensor networks; cloud computing; Internet of Things; public key encryption with keyword search; off-line keyword guessing attack; on-line keyword guessing attack; PUBLIC-KEY ENCRYPTION; KEYWORD-SEARCH; INTERNET; CLOUD;
D O I
10.3390/s19112583
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Wireless sensor networks (WSN) generally utilize cloud computing to store and process sensing data in real time, namely, cloud-assisted WSN. However, the cloud-assisted WSN faces new security challenges, particularly outsourced data confidentiality. Data Encryption is a fundamental approach but it limits target data retrieval in massive encrypted data. Public key encryption with keyword search (PEKS) enables a data receiver to retrieve encrypted data containing some specific keyword in cloud-assisted WSN. However, the traditional PEKS schemes suffer from an inherent problem, namely, the keyword guessing attack (KGA). KGA includes off-line KGA and on-line KGA. To date, the existing literature on PEKS cannot simultaneously resist both off-line KGA and on-line KGA performed by an external adversary and an internal adversary. In this work, we propose a secure and efficient data sharing and searching scheme to address the aforementioned problem such that our scheme is secure against both off-line KGA and on-line KGA performed by external and internal adversaries. We would like to stress that our scheme simultaneously achieves document encryption/decryption and keyword search functions. We also prove our scheme achieves keyword security and document security. Furthermore, our scheme is more efficient than previous schemes by eliminating the pairing computation.
引用
收藏
页数:23
相关论文
共 50 条
  • [41] An energy efficient and secure data forwarding scheme for wireless body sensor network
    Dinesh Kumar, A.
    Smys, S.
    [J]. International Journal of Networking and Virtual Organisations, 2019, 21 (02) : 163 - 186
  • [42] A Secure Distributed Consensus Scheme for Wireless Sensor Networks Against Data Falsification
    Mi, Shichao
    Han, Hui
    Zhu, Shanying
    Chen, Cailian
    Yang, Bo
    Guan, Xinping
    [J]. 2014 11TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION (WCICA), 2014, : 3025 - 3030
  • [43] A Blockchain-Based Scheme for Secure Data Provenance in Wireless Sensor Networks
    Zeng, Yu
    Zhang, Xing
    Akhtar, Rizwan
    Wang, Changda
    [J]. 2018 14TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2018), 2018, : 13 - 18
  • [44] A Secure Data Transmission Scheme Based on Information Hiding in Wireless Sensor Networks
    Wang, Baowei
    Qian, Hongwei
    Sun, Xingming
    Shen, Jian
    Xie, Xiaoyu
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 125 - 138
  • [45] Secure data aggregation scheme based on homomorphic MAC for wireless sensor networks
    Zhou, Qiang
    Yang, Geng
    Chen, Lei
    Chen, Zheng-Yu
    Dai, Hua
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2014, 36 (07): : 1743 - 1748
  • [46] A secure data collection scheme based on compressive sensing in wireless sensor networks
    Zhang, Ping
    Wang, Shaokai
    Guo, Kehua
    Wang, Jianxin
    [J]. AD HOC NETWORKS, 2018, 70 : 73 - 84
  • [47] Energy Efficient Clustering Scheme with secure data aggregation for mobile wireless sensor networks 9EECSSDA)
    Mohan, B. A.
    Dayananda, K. R.
    Devi, Saroja H.
    [J]. PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,
  • [48] H2S : A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks
    Ren, Wei
    Ren, Yi
    Zhang, Hui
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 450 - +
  • [49] An efficient secure tracking scheme in wireless sensor network
    Wang, Jiahao
    Qin, Zhiguang
    Zhao, Yang
    Ma, Xinxin
    Zhang, Fengli
    [J]. 2007 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS; VOL 2: SIGNAL PROCESSING, COMPUTATIONAL INTELLIGENCE, CIRCUITS AND SYSTEMS, 2007, : 419 - +
  • [50] An efficient secure data transmission and node authentication scheme for wireless sensing networks?
    Li, Lixiang
    Li, Sirui
    Peng, Haipeng
    Bi, Jingguo
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 133