Advertisement

Annals of Telecommunications

, Volume 74, Issue 7–8, pp 413–421 | Cite as

Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things

  • Yinghui ZhangEmail author
  • Axin Wu
  • Tiantian Zhang
  • Dong Zheng
Article
  • 60 Downloads

Abstract

The development of Internet of things (IoT) makes data exchange more frequently, and the cloud computing can provide stable storage and efficient computation for data users. To ensure the security and functionality of data, the efficiency of decryption and keyword search should be taken into consideration in resource-constrained IoT scenarios. In order to solve the above problems, a flexible keyword search scheme in IoT is proposed over encrypted data with outsourced decryption. First, the attribute-based encryption technology is applied, by which only users whose attributes meet the access control structure can access the sharing data. Second, the reciprocal mapping of Lagrange polynomials technology is employed to implement keyword search in a large number of ciphertext data. Third, the decryption of ciphertext is outsourced to improve the efficiency of decryption on the client side. The security and performance analysis indicates that the proposed scheme is secure and efficient.

Keywords

Internet of things Attribute-based encryption Keyword search Outsourced decryption 

Notes

Funding information

This work is supported by National Key R&D Program of China (No. 2017YFB0802000), National Natural Science Foundation of China (No. 61772418, 61472472, 61402366), Natural Science Basic Research Plan in Shaanxi Province of China (No. 2018JZ6001, 2015JQ6236), and the Youth Innovation Team of Shaanxi Universities. Yinghui Zhang is supported by New Star Team of Xi’an University of Posts and Telecommunications (No. 2016-02).

References

  1. 1.
    Jhaveri RH, Patel NM, Zhong Y, Sangaiah AK (2018) Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial iot. IEEE Access 6:20085–20103CrossRefGoogle Scholar
  2. 2.
    Shen J, Wang C, Li T, Chen X, Huang X, Zhan ZH (2018) Secure data uploading scheme for a smart home system. Inform Sci 453:186–197CrossRefGoogle Scholar
  3. 3.
    Wu A, Zheng D, Zhang Y, Yng M (2018) Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing. Sensors 18(7):1–17.  https://doi.org/10.3390/s18072158 CrossRefGoogle Scholar
  4. 4.
    Zhang Y, Wu A, Zheng D (2018) Efficient and privacy-aware attribute-based data sharing in mobile cloud computing. J Ambient Intell Humaniz Comput 9(4):1039–1048CrossRefGoogle Scholar
  5. 5.
    Chen X, Li J, Weng J, Ma J, Lou W (2016) Verifiable computation over large database with incremental updates. IEEE Trans Comput 65(10):3184–3195MathSciNetCrossRefzbMATHGoogle Scholar
  6. 6.
    Li J, Liu Z, Chen X, Xhafa F, Tan X, Wong DS (2015) L-encdb: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl-Based Syst 79:18–26CrossRefGoogle Scholar
  7. 7.
    Zhang Y, Zheng D, Deng RH (2018) Security and privacy in smart health: e policy-hiding attribute-based access control. IEEE Internet Things J 5(3):2130–2145CrossRefGoogle Scholar
  8. 8.
    Wang J, Chen X, Huang X, You I, Xiang Y (2015) Verifiable auditing for outsourced database in cloud computing. IEEE Trans Comput 64(11):3293–3303MathSciNetCrossRefzbMATHGoogle Scholar
  9. 9.
    Zhang Y, Yang M, Zheng D, Lang P, Wu A, Chen C (2018) Efficient and secure big data storage system with leakage resilience in cloud computing. Soft Comput 22(23):7763–7772CrossRefzbMATHGoogle Scholar
  10. 10.
    Zhang Y, Zheng D, Guo R, Lan Q (2018) Fine-grained access control systems suitable for resource-constrained users in cloud computing. Comput Inf 37(2):327–348Google Scholar
  11. 11.
    Zhang Y, Deng RH, Han G, Zheng D (2018) Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things. J Netw Comput Appl 123:89–100CrossRefGoogle Scholar
  12. 12.
    Li H, Liu D, Dai Y, Luan TH, Shen XS (2015) Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans Emerging Topics Comput 3(1):127–138CrossRefGoogle Scholar
  13. 13.
    Wang J, Chen X, Li J, Zhao J, Shen J (2017) Towards achieving flexible and verifiable search for outsourced database in cloud computing. Futur Gener Comput Syst 67:266–275CrossRefGoogle Scholar
  14. 14.
    Zhang Y, Deng RH, Jiangang S, Kan Y, Dong Z (2018) Tkse: trustworthy keyword search over encrypted data with two-side verifiability via blockchain. IEEE Access 6:31077–31087CrossRefGoogle Scholar
  15. 15.
    Li R, Zheng D, Zhang Y, Su H, Yang M, Lang P (2017) Attribute-based encryption with multi-keyword search. In: IEEE 2nd international conference on data science in cyberspace, pp 172–177Google Scholar
  16. 16.
    Li P, Li T, Ye H, Li J, Chen X, Xiang Y (2018) Privacy-preserving machine learning with multiple data providers. Futur Gener Comput Syst 87:341–350CrossRefGoogle Scholar
  17. 17.
    Zhang Y, Lang P, Dong Z, Yang M, Guo R (2018) A secure and privacy-aware smart health system with secret key leakage resilience. Secur Commun Netw 2018:1–13.  https://doi.org/10.1155/2018/7202598 Google Scholar
  18. 18.
    Wang C, Shen J, Liu Q, Ren Y, Li T (2018) A novel security scheme based on instant encrypted transmission for internet of things. Secur Commun Netw 2018(2):1–7CrossRefGoogle Scholar
  19. 19.
    Zhang Y, Deng RH, Ximeng L, Dong Z (2018) Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf Sci 462:262–277MathSciNetCrossRefGoogle Scholar
  20. 20.
    Zheng D, Wu A, Hui Y, Lang Q (2018) Efficient and privacy-preserving medical data sharing in Internet of Things with limited computing power. IEEE Access 6:28019–28027CrossRefGoogle Scholar
  21. 21.
    Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 457–473Google Scholar
  22. 22.
    Ning J, Dong X, Gao Z, Wei L, Lin X (2015) White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. IEEE Trans Inf Forensics Secur 10(6):1274–1288CrossRefGoogle Scholar
  23. 23.
    Ning J, Gao Z, Dong X, Wei L (2018) White-box traceable CP-ABE for cloud storage service: how to catch people leaking their access credentials effectively. IEEE Trans Dependable Secure Comput 15(5):883–897CrossRefGoogle Scholar
  24. 24.
    Ning J, Gao Z, Dong X, Wei L, Lin X (2014) Large universe ciphertext-policy attribute-based encryption with white-box traceability. European Symposium on Research in Computer Security 15(5):55–72Google Scholar
  25. 25.
    Li J, Chen X, Chow SSM, Huang Q, Wong DS, Liu Z (2018) Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl 112:89–96CrossRefGoogle Scholar
  26. 26.
    Li H, Liu D, Dai Y, Luan TH, Yu S (2018) Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Transactions on Emerging Topics in Computing 6(1):97–109CrossRefGoogle Scholar
  27. 27.
    Sun W, Yu S, Lou W, Hou YT, Li H (2014) Protecting your right: attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In: 2014 Proceedings IEEE INFOCOM, pp 226–234Google Scholar
  28. 28.
    Zheng Q, Xu S, Ateniese G (2014) Vabks: Verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM, pp 522–530Google Scholar
  29. 29.
    Li J, Zhang Y, Chen X, Xiang Y, Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1–12CrossRefGoogle Scholar
  30. 30.
    Zhang Y, Zheng D, Li Q, Li J, Li H (2016) Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing. Secur Commun Netw 9(16):3688–3702CrossRefGoogle Scholar
  31. 31.
    Li J, Li J, Chen X, Jia C, Lou W (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425–437MathSciNetCrossRefzbMATHGoogle Scholar
  32. 32.
    Zhang Y, Deng R H, Liu X, Zheng D (2018) Outsourcing service fair payment based on blockchain and its applications in cloud computing, IEEE transactions on services computing.  https://doi.org/10.1109/TSC20182864191
  33. 33.
    Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210CrossRefGoogle Scholar
  34. 34.
    Zhang Y, Chen X, Li J, Wong D S, Li H, You I (2017) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inform Sci 379:42–61CrossRefGoogle Scholar
  35. 35.
    Green M, Hohenberger S, Waters B (2014). In: Usenix conference on security, pp 34–34Google Scholar
  36. 36.
    Ning J, Gao Z, Dong X, Ma K Liang H, Wei L (2018) Auditable σ-time outsourced attribute-based encryption for access control in cloud computing. IEEE Trans Inf Forensics Secur 13(1):94–105CrossRefGoogle Scholar
  37. 37.
    Menezes A (2009) An introduction to pairing-based cryptography. Recent trends in cryptography 477:47–65MathSciNetCrossRefzbMATHGoogle Scholar
  38. 38.
    Haoxing L, Fenghua L, Chenggen S, Mang S, Xin L (2015) Public key encryption with multi-keywords search. Journal of Xidian University 42(5):20–25Google Scholar
  39. 39.
    Gentry C (2006) Practical identity-based encryption without random oracles. Lect Notes Comput Sci 4004:445–464MathSciNetCrossRefzbMATHGoogle Scholar
  40. 40.
    Dan B, Boyen X (2004) Efficient selective-ID secure identity-based encryption without random oracles. Springer, Berlin, pp 223–238zbMATHGoogle Scholar
  41. 41.
    Zhang B, Zhang F (2011) An efficient public key encryption with conjunctive-subset keywords search. J Netw Comput Appl 34(1):262–267CrossRefGoogle Scholar

Copyright information

© Institut Mines-Télécom and Springer Nature Switzerland AG 2018

Authors and Affiliations

  1. 1.National Engineering Laboratory for Wireless SecurityXi’an University of Posts and TelecommunicationsXi’anPeople’s Republic of China
  2. 2.Westone Cryptologic Research CenterBeijingChina

Personalised recommendations