Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things

被引:3
|
作者
Zhang, Yinghui [1 ,2 ]
Wu, Axin [1 ,2 ]
Zhang, Tiantian [1 ,2 ]
Zheng, Dong [1 ,2 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Shaanxi, Peoples R China
[2] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Internet of things; Attribute-based encryption; Keyword search; Outsourced decryption; ATTRIBUTE-BASED ENCRYPTION; IDENTITY-BASED ENCRYPTION; GRAINED ACCESS-CONTROL; CLOUD; EFFICIENT;
D O I
10.1007/s12243-018-0694-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The development of Internet of things (IoT) makes data exchange more frequently, and the cloud computing can provide stable storage and efficient computation for data users. To ensure the security and functionality of data, the efficiency of decryption and keyword search should be taken into consideration in resource-constrained IoT scenarios. In order to solve the above problems, a flexible keyword search scheme in IoT is proposed over encrypted data with outsourced decryption. First, the attribute-based encryption technology is applied, by which only users whose attributes meet the access control structure can access the sharing data. Second, the reciprocal mapping of Lagrange polynomials technology is employed to implement keyword search in a large number of ciphertext data. Third, the decryption of ciphertext is outsourced to improve the efficiency of decryption on the client side. The security and performance analysis indicates that the proposed scheme is secure and efficient.
引用
收藏
页码:413 / 421
页数:9
相关论文
共 50 条
  • [1] Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things
    Yinghui Zhang
    Axin Wu
    Tiantian Zhang
    Dong Zheng
    Annals of Telecommunications, 2019, 74 : 413 - 421
  • [2] Secure Multi-Keyword Search Over Encrypted Outsourced Data
    Anukrishna, P. R.
    Paul, Vince
    International Journal of Computer Science and Network Security, 2016, 16 (11): : 86 - 89
  • [3] Secure conjunctive keyword search over encrypted data
    Golle, P
    Staddon, J
    Waters, B
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 31 - 45
  • [4] Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment
    Sultan, Nazatul Haque
    Kaaniche, Nesrine
    Laurent, Maryline
    Barbhuiya, Ferdous Ahmed
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 216 - 233
  • [5] Secure Ranked Keyword Search over Encrypted Cloud Data
    Wang, Cong
    Cao, Ning
    Li, Jin
    Ren, Kui
    Lou, Wenjing
    2010 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2010, 2010,
  • [6] Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata
    Wang, Jiabei
    Zhang, Rui
    Li, Jianhao
    Xiao, Yuting
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 2746 - 2760
  • [7] Secure Range Search Over Encrypted Uncertain IoT Outsourced Data
    Guo, Cheng
    Zhuang, Ruhan
    Jie, Yingmo
    Choo, Kim-Kwang Raymond
    Tang, Xinyu
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02): : 1520 - 1529
  • [8] Multi-Client Verifiable Encrypted Keyword Search Scheme With Authorization Over Outsourced Encrypted Data
    Yang, Xu
    Wang, Qiuhao
    Qi, Saiyu
    Li, Ke
    Wang, Jianfeng
    Zhao, Wenjia
    Qi, Yong
    IEEE Transactions on Network Science and Engineering, 2024, 11 (06): : 6356 - 6371
  • [9] Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data
    He, Kai
    Guo, Jun
    Weng, Jian
    Weng, Jiasi
    Liu, Joseph K.
    Yi, Xun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1207 - 1217
  • [10] VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
    Zheng, Qingji
    Xu, Shouhuai
    Ateniese, Giuseppe
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 522 - 530