Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things

被引:3
|
作者
Zhang, Yinghui [1 ,2 ]
Wu, Axin [1 ,2 ]
Zhang, Tiantian [1 ,2 ]
Zheng, Dong [1 ,2 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Shaanxi, Peoples R China
[2] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Internet of things; Attribute-based encryption; Keyword search; Outsourced decryption; ATTRIBUTE-BASED ENCRYPTION; IDENTITY-BASED ENCRYPTION; GRAINED ACCESS-CONTROL; CLOUD; EFFICIENT;
D O I
10.1007/s12243-018-0694-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The development of Internet of things (IoT) makes data exchange more frequently, and the cloud computing can provide stable storage and efficient computation for data users. To ensure the security and functionality of data, the efficiency of decryption and keyword search should be taken into consideration in resource-constrained IoT scenarios. In order to solve the above problems, a flexible keyword search scheme in IoT is proposed over encrypted data with outsourced decryption. First, the attribute-based encryption technology is applied, by which only users whose attributes meet the access control structure can access the sharing data. Second, the reciprocal mapping of Lagrange polynomials technology is employed to implement keyword search in a large number of ciphertext data. Third, the decryption of ciphertext is outsourced to improve the efficiency of decryption on the client side. The security and performance analysis indicates that the proposed scheme is secure and efficient.
引用
收藏
页码:413 / 421
页数:9
相关论文
共 50 条
  • [41] Verifiable Diversity Ranking Search Over Encrypted Outsourced Data
    Liu, Yuling
    Peng, Hua
    Wang, Jie
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 55 (01): : 37 - 57
  • [42] Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture
    Wu, Haiqin
    Dudder, Boris
    Wang, Liangmin
    Cao, Zhenfu
    Zhou, Jun
    Feng, Xia
    ACM COMPUTING SURVEYS, 2024, 56 (03)
  • [43] An Outsourced Decryption ABE Model using ECC in Internet of Things
    Kumar, Dilip
    Kumar, Manoj
    Gupta, Gaurav
    INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2021, 29 (06) : 949 - 964
  • [44] Secure conjunctive multi-keyword ranked search over encrypted cloud data for multiple data owners
    Yin, Hui
    Qin, Zheng
    Zhang, Jixin
    Ou, Lu
    Li, Fangmin
    Li, Keqin
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 : 689 - 700
  • [45] An Efficient Multi-keyword Synonym-Based Fuzzy Ranked Search Over Outsourced Encrypted Cloud Data
    Saini, Vandana
    Challa, Rama Krishna
    Khan, Neelam S.
    ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES, 2016, 452 : 433 - 441
  • [46] Two-Step-Ranking Secure Multi-Keyword Search Over Encrypted Cloud Data
    Xu, Jun
    Zhang, Weiming
    Yang, Ce
    Xu, Jiajia
    Yu, Nenghai
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICE COMPUTING (CSC), 2012, : 124 - 130
  • [47] A shareable keyword search over encrypted data in cloud computing
    Xu, Li
    Weng, Chi-Yao
    Yuan, Lun-Pin
    Wu, Mu-En
    Tso, Raylin
    Sun, Hung-Min
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (03): : 1001 - 1023
  • [48] Fuzzy Keyword Search over Encrypted Data in Cloud Computing
    Li, Jin
    Wang, Qian
    Wang, Cong
    Cao, Ning
    Ren, Kui
    Lou, Wenjing
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [49] Secure Rank-ordered Search of Multi-keyword Trapdoor over Encrypted Cloud Data
    Ibrahim, Ayad
    Jin, Hai
    Yassin, Ali A.
    Zou, Deqing
    2012 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE (APSCC), 2012, : 263 - 270
  • [50] Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
    Cui, Hui
    Wan, Zhiguo
    Deng, Robert H.
    Wang, Guilin
    Li, Yingjiu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (03) : 409 - 422