Advertisement

Keyword Searchable Encryption with Fine-Grained Forward Secrecy for Internet of Thing Data

  • Rang Zhou
  • Xiaosong Zhang
  • Xiaofen Wang
  • Guowu Yang
  • Wanpeng Li
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11337)

Abstract

With the incessant development and popularization of Internet of things (IoT), the amount of the data collected by IoT devices has rapidly increased. This introduces the concerns over the heavy storage overhead to such systems. In order to relief the storage burden, a popular method is to use the outsourced cloud technology. While the massive collected IoT data is outsourced to the cloud, the security and privacy of these outsourced data is therefore of critical importance, and many researches have been done in this area. In this paper, we propose a new keyword searchable encryption system with fine-grained right revocation. In the system, each IoT device’s data are stored in a special document. Thus the data owner can revoke users’ search rights at fine-grained document level by setting new random number in each time period. Especially, to realize search right revocation, re-encryption operations on keyword cipheretexts are not needed in our scheme. Then, we instantiate a valid construction in practical application and discuss the security properties in the construction. Our performance evaluations show that the proposed construction is efficient.

Keywords

Searchable encryption Data sharing Fine-grained forward secrecy Internet of Things 

Notes

Acknowledgement

This work is supported by the National Key Research and Development Program under Grant 2017YFB0802300, National Natural Science Foundation of China under grant No. 61502086 and 61572115; the Sichuan Provincial Major Frontier Issues (2016JY0007); the Guangxi Key Laboratory of Trusted Software (No. PF16116X); the foundation from Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems (No. YF16202).

References

  1. 1.
    Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, pp. 44–55. IEEE Computer Society Press, May 2000Google Scholar
  2. 2.
    Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004).  https://doi.org/10.1007/978-3-540-24676-3_30CrossRefGoogle Scholar
  3. 3.
  4. 4.
    Yang, Y., Liu, X., Deng, R.H., Li, Y.: Lightweight sharable and traceable secure mobile health system. IEEE Trans. Dependable Secur. Comput. 99, 1–1 (2017)Google Scholar
  5. 5.
    Popa, R.A., Zeldovich, N.: Multi-key searchable encryption, Cryptology ePrint Archive, Report 2013/508 (2013)Google Scholar
  6. 6.
    Popa, R.A., Stark, E., Valdez, S., Helfer, J., Zeldovich, N., Balakrishnan, H.: Building web applications on top of encrypted data using Mylar. In: Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2014, pp. 157-172 (2014)Google Scholar
  7. 7.
    Tang, Q.: Nothing is for free: security in searching shared and encrypted data. IEEE Trans. Inf. Forensics Secur. 9(11), 1943–1952 (2014)CrossRefGoogle Scholar
  8. 8.
    Liu, Z., Li, J., Chen, X., Yang, J., Jia, C.: TMDS: thin-model data sharing scheme supporting keyword search in cloud storage. In: Susilo, W., Mu, Y. (eds.) ACISP 2014. LNCS, vol. 8544, pp. 115–130. Springer, Cham (2014).  https://doi.org/10.1007/978-3-319-08344-5_8CrossRefGoogle Scholar
  9. 9.
    Van Rompay, C., Molva, R., Önen, M.: Multi-user searchable encryption in the cloud. In: Lopez, J., Mitchell, C.J. (eds.) ISC 2015. LNCS, vol. 9290, pp. 299–316. Springer, Cham (2015).  https://doi.org/10.1007/978-3-319-23318-5_17CrossRefGoogle Scholar
  10. 10.
    Chu, C.-K., Chow, S.S.M., Tzeng, W.-G., Zhou, J., Deng, R.H.: Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Trans. Parallel Distrib. Syst. 25(2), 468–477 (2014)CrossRefGoogle Scholar
  11. 11.
    Cui, B., Liu, Z., Wang, L.: Key-aggregate searchable encryption for group data sharing via cloud storage. IEEE Trans. Comput. 65(8), 2374–2385 (2016)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Kiayias, A., Oksuz, O., Russell, A., Tang, Q., Wang, B.: Efficient encrypted keyword search for multi-user data sharing. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9878, pp. 173–195. Springer, Cham (2016).  https://doi.org/10.1007/978-3-319-45744-4_9CrossRefGoogle Scholar
  13. 13.
    Zhou, R., Zhang, X., Du, X., Wang, X., Yang, G., Mohsen, G.: File-centric multi-key aggregate keyword searchable encryption for industrial internet of things. IEEE Trans. Ind. Inform. 14(8), 3648–3658 (2018)CrossRefGoogle Scholar
  14. 14.
    Li, T., Liu, Z., Li, P., Jia, C., Jiang, Z.L., Li, J.: Verifiable searchable encryption with aggregate keys for data sharing in outsourcing storage. In: Liu, J.K., Steinfeld, R. (eds.) ACISP 2016. LNCS, vol. 9723, pp. 153–169. Springer, Cham (2016).  https://doi.org/10.1007/978-3-319-40367-0_10CrossRefGoogle Scholar
  15. 15.
    Liu, Z., Li, T., Li, P., Jia, C., Li, J.: Verifiable searchable encryption with aggregate keys for data sharing system. Future Gener. Comput. Syst. 78, 778–788 (2018)CrossRefGoogle Scholar
  16. 16.
    Shi, J., Lai, J., Li, Y., Deng, R.H., Weng, J.: Authorized keyword search on encrypted data. In: Kutyłowski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 419–435. Springer, Cham (2014).  https://doi.org/10.1007/978-3-319-11203-9_24CrossRefGoogle Scholar
  17. 17.
    Sun, W., Yu, S., Lou, W., Hou, Y.T.: Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans. Parallel Distrib. Syst. 27(4), 1187–1198 (2016)CrossRefGoogle Scholar
  18. 18.
    Zheng, Q., Shouhuai, X., Ateniese, G.: VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: 2014 Proceedings IEEE, INFOCOM, pp. 522–530 (2014)Google Scholar
  19. 19.
    Bao, F., Deng, R.H., Ding, X., Yang, Y.: Private query on encrypted data in multi-user settings. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 71–85. Springer, Heidelberg (2008).  https://doi.org/10.1007/978-3-540-79104-1_6CrossRefGoogle Scholar
  20. 20.
    Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001).  https://doi.org/10.1007/3-540-45682-1_30CrossRefGoogle Scholar
  21. 21.
    Dong, C., Russello, G., Dulay, N.: Shared and searchable encrypted data for untrusted servers. In: Atluri, V. (ed.) DBSec 2008. LNCS, vol. 5094, pp. 127–143. Springer, Heidelberg (2008).  https://doi.org/10.1007/978-3-540-70567-3_10CrossRefGoogle Scholar
  22. 22.
    Dong, C., Russello, G., Dulay, N.: Shared and searchable encrypted data for untrusted servers. J. Comput. Secur. 19(3), 367–397 (2011)CrossRefGoogle Scholar
  23. 23.
    Wang, X., Mu, Y., Chen, R., Zhang, X.: Secure channel free ID-based searchable encryption for peer-to-peer group. J. Comput. Sci. Technol. 31(5), 1012–1027 (2016)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Rang Zhou
    • 1
  • Xiaosong Zhang
    • 1
  • Xiaofen Wang
    • 1
  • Guowu Yang
    • 1
  • Wanpeng Li
    • 2
  1. 1.Center for Cyber Security, School of Computer Science and EngineeringUniversity of Electronic Science and Technology of ChinaChengduChina
  2. 2.School of Computing, Mathematics and Digital TechnologyManchester Metropolitan UniversityManchesterUK

Personalised recommendations