Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things

被引:3
|
作者
Zhang, Yinghui [1 ,2 ]
Wu, Axin [1 ,2 ]
Zhang, Tiantian [1 ,2 ]
Zheng, Dong [1 ,2 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Shaanxi, Peoples R China
[2] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Internet of things; Attribute-based encryption; Keyword search; Outsourced decryption; ATTRIBUTE-BASED ENCRYPTION; IDENTITY-BASED ENCRYPTION; GRAINED ACCESS-CONTROL; CLOUD; EFFICIENT;
D O I
10.1007/s12243-018-0694-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The development of Internet of things (IoT) makes data exchange more frequently, and the cloud computing can provide stable storage and efficient computation for data users. To ensure the security and functionality of data, the efficiency of decryption and keyword search should be taken into consideration in resource-constrained IoT scenarios. In order to solve the above problems, a flexible keyword search scheme in IoT is proposed over encrypted data with outsourced decryption. First, the attribute-based encryption technology is applied, by which only users whose attributes meet the access control structure can access the sharing data. Second, the reciprocal mapping of Lagrange polynomials technology is employed to implement keyword search in a large number of ciphertext data. Third, the decryption of ciphertext is outsourced to improve the efficiency of decryption on the client side. The security and performance analysis indicates that the proposed scheme is secure and efficient.
引用
收藏
页码:413 / 421
页数:9
相关论文
共 50 条
  • [31] Efficient Keyword Search over Encrypted Cloud Data
    Meharwade, Anuradha
    Patil, G. A.
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 139 - 145
  • [32] Approach to keyword search over encrypted data in cloud
    Zhang, Peng
    Li, Yan
    Lin, Hai-Lun
    Yang, Rong
    Liu, Qing-Yun
    Tongxin Xuebao/Journal on Communications, 2014, 35 : 147 - 153
  • [33] Secure multi-keyword ranked search over encrypted cloud data for multiple data owners
    Guo, Ziqing
    Zhang, Hua
    Sun, Caijun
    Wen, Qiaoyan
    Li, Wenmin
    JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 137 : 380 - 395
  • [34] Secure Keyword Search over Encrypted Cloud Data Using Blockchain in Digital Document Sharing
    Verma, Garima
    Kanrar, Soumen
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 134 (02) : 975 - 996
  • [35] Secure and Efficient Multi-keyword Fuzzy Search Over Encrypted Data on Alliance Chain
    Song, Jimeng
    Shen, Ziqi
    Yu, Han
    Lai, Rongxin
    Li, Yuancheng
    Wang, Qingle
    Li, Jianbin
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2024, 17 (07) : 652 - 665
  • [36] Secure Keyword Search over Encrypted Cloud Data Using Blockchain in Digital Document Sharing
    Garima Verma
    Soumen Kanrar
    Wireless Personal Communications, 2024, 134 : 975 - 996
  • [37] A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
    Xia, Zhihua
    Wang, Xinhui
    Sun, Xingming
    Wang, Qian
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (02) : 340 - 352
  • [38] BSMFS: Blockchain assisted Secure Multi-keyword Fuzzy Search over Encrypted Data
    Chakraborty, Partha Sarathi
    Chandrawanshi, Mangesh Shivaji
    Kumar, Puspesh
    Tripathy, Somanath
    2022 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2022), 2022, : 216 - 221
  • [39] Secure and privacy-preserving keyword search retrieval over hashed encrypted cloud data
    Sathyabalaji, N.
    Komarasamy, G.
    Raja, Daniel Madan S.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (05)
  • [40] PRMS: A Personalized Mobile Search Over Encrypted Outsourced Data
    Zhang, Qiang
    Liu, Qin
    Wang, Guojun
    IEEE ACCESS, 2018, 6 : 31541 - 31552