Online/Offline Attribute-Based Boolean Keyword Search For Internet Of Things

被引:1
|
作者
Yao, Jiahui [1 ]
Xu, Lingling [1 ]
机构
[1] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou 510006, Guangdong, Peoples R China
来源
COMPUTER JOURNAL | 2023年 / 66卷 / 12期
关键词
Internet of Things; Searchable Encryption; Attribute-based Keyword Search; Online; offline; Boolean Keyword Search; PUBLIC-KEY ENCRYPTION;
D O I
10.1093/comjnl/bxac139
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of Internet of Things (IoT) and cloud computing, a large amount of IoT data has been stored and shared in cloud servers. However, sensitive IoT data may be leaked by untrusted cloud servers, which is a key problem hindering the development of IoT-cloud systems. To solve this problem, searchable encryption has been presented, which enables IoT devices to encrypt the collected data before uploading them to the cloud and make retrievals over the encrypted data by keyword queries. In this paper, we will study attribute-based keyword search (ABKS), which relieves us from cumbersome key management and provides a fine-grained access control. However, since the existing ABKS schemes are all constructed by bilinear pairings, which incurs high computational costs, they are not suitable for resource-constrained IoT devices. In this article, we propose an online/offline attribute-based boolean keyword search scheme, which can significantly reduce the online computing costs of IoT devices. In addition, our scheme can support boolean keyword search for data users, which has more flexible keyword expressivity than the existing online/offline ABKS schemes. We simulate our scheme and the experimental results show that it is both efficient and practical for the real IoT-cloud systems.
引用
收藏
页码:2948 / 2960
页数:13
相关论文
共 50 条
  • [41] Novel Searchable Attribute-Based Encryption for the Internet of Things
    Lu, Zhenhua
    Guo, Yuyan
    Li, Jiguo
    Jia, Weina
    Lv, Liping
    Shen, Jie
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [42] ON THE FEASIBILITY OF ATTRIBUTE-BASED ENCRYPTION ON INTERNET OF THINGS DEVICES
    Ambrosin, Moreno
    Anzanpour, Arman
    Conti, Mauro
    Dargahi, Tooska
    Moosavi, Sanaz Rahimi
    Rahmani, Amir M.
    Liljeberg, Pasi
    IEEE MICRO, 2016, 36 (06) : 25 - 35
  • [43] Offline/online attribute-based encryption with verifiable outsourced decryption
    Liu, Zechao
    Jiang, Zoe L.
    Wang, Xuan
    Huang, Xinyi
    Yiu, S. M.
    Sadakane, Kunihiko
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (07):
  • [44] Fully Secure Online/Offline Predicate and Attribute-Based Encryption
    Datta, Pratish
    Dutta, Ratna
    Mukhopadhyay, Sourav
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 331 - 345
  • [45] An Efficient Attribute-Based Multi-Keyword Search Scheme in Encrypted Keyword Generation
    Cui, Yuanbo
    Gao, Fei
    Shi, Yijie
    Yin, Wei
    Panaousis, Emmanouil
    Liang, Kaitai
    IEEE ACCESS, 2020, 8 (08): : 99024 - 99036
  • [46] AKSER: Attribute-based keyword search with efficient revocation in cloud computing
    Cui, Jie
    Zhou, Han
    Zhong, Hong
    Xu, Yan
    INFORMATION SCIENCES, 2018, 423 : 343 - 352
  • [47] Attribute-based keyword search encryption scheme for IoT edge environment
    Zhang, Kangjun
    Yuan, Lingyun
    Peng, Xingwei
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024, 2024, : 102 - 107
  • [48] Attribute-based Proxy Re-encryption Scheme with Keyword Search
    Liu Zhenhua
    Zhou Peilin
    Duan Shuhong
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (03) : 683 - 689
  • [49] ABDKS: attribute-based encryption with dynamic keyword search in fog computing
    Fei MENG
    Leixiao CHENG
    Mingqiang WANG
    Frontiers of Computer Science, 2021, (05) : 189 - 197
  • [50] Flexible Attribute-Based Keyword Search Via Two Access Policies
    Zhou, Peilin
    Liu, Zhenhua
    Duan, Shuhong
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 815 - 822