Skip to main content

Lightweight Distributed Attribute Based Keyword Search System for Internet of Things

  • Conference paper
  • First Online:
Book cover Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11637))

Abstract

Internet of Things (IoT) is a promising networking paradigm that connects various kinds of sensors and exchanges data from smart devices. Since IoT always related to user’s daily life, the problems of security and privacy are of great importance. Presently, the attribute based encryption (ABE) is a popular solution to guarantee the fine-grained sharing of encrypted data in IoT. In this paper, an attribute based keyword search with lightweight decryption in multi-authority (ABKS-LD-MA) is proposed. Our system supports multi-keyword search in cloud by using searchable attribute based encryption. We also integrate the lightweight decryption to searchable ABE scheme that largely reduces the computing overhead for users. Furthermore, our ABKS-LD-MA scheme supports multi-authority scenario, which is more adaptive to the real IoT environment. The experiment analysis shows that our scheme has relatively lowered the communication cost on IoT devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27

    Chapter  Google Scholar 

  2. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334. IEEE, Berkeley, May 2007. https://doi.org/10.1109/SP.2007.11, http://ieeexplore.ieee.org/document/4223236

  3. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_30

    Chapter  Google Scholar 

  4. Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535–554. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-70936-7_29

    Chapter  Google Scholar 

  5. Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515–534. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-70936-7_28

    Chapter  Google Scholar 

  6. Cui, J., Zhou, H., Zhong, H., Xu, Y.: AKSER: attribute-based keyword search with efficient revocation in cloud computing. Inf. Sci. 423, 343–352 (2018). https://doi.org/10.1016/j.ins.2017.09.029. http://linkinghub.elsevier.com/retrieve/pii/S0020025516311215

    Article  Google Scholar 

  7. De Caro, A., Iovino, V.: JPBC: Java pairing based cryptography. In: Proceedings of the 16th IEEE Symposium on Computers and Communications, ISCC 2011, Kerkyra, Corfu, Greece, 28 June–1 July, pp. 850–855 (2011)

    Google Scholar 

  8. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security - CCS 2006, Alexandria, Virginia, USA, p. 89. ACM Press (2006). https://doi.org/10.1145/1180405.1180418, http://portal.acm.org/citation.cfm?doid=1180405.1180418

  9. Green, M., Hohenberger, S., Waters, B., et al.: Outsourcing the decryption of ABE ciphertexts. In: USENIX Security Symposium, vol. 2011 (2011)

    Google Scholar 

  10. Hohenberger, S., Waters, B.: Online/offline attribute-based encryption. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 293–310. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-54631-0_17

    Chapter  Google Scholar 

  11. Liang, K., Susilo, W.: Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 10(9), 1981–1992 (2015). https://doi.org/10.1109/TIFS.2015.2442215. http://ieeexplore.ieee.org/document/7118738/

    Article  Google Scholar 

  12. Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568–588. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-20465-4_31

    Chapter  Google Scholar 

  13. Li, H., Liu, D., Jia, K., Lin, X.: Achieving authorized and ranked multi-keyword search over encrypted cloud data. In: 2015 IEEE International Conference on Communications (ICC), London, pp. 7450–7455. IEEE, June 2015. https://doi.org/10.1109/ICC.2015.7249517, http://ieeexplore.ieee.org/document/7249517/

  14. Li, J., Zhang, L.: Attribute-based keyword search and data access control in cloud. In: 2014 Tenth International Conference on Computational Intelligence and Security, Kunming, Yunnan, China, pp. 382–386. IEEE, November 2014. https://doi.org/10.1109/CIS.2014.113, http://ieeexplore.ieee.org/document/7016922/

  15. Li, J., Yao, W., Zhang, Y., Qian, H., Han, J.: Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Trans. Serv. Comput. 10(5), 785–796, September 2017. https://doi.org/10.1109/TSC.2016.2520932, http://ieeexplore.ieee.org/document/7390098/

    Article  Google Scholar 

  16. Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131–143 (2013). https://doi.org/10.1109/TPDS.2012.97. http://ieeexplore.ieee.org/document/6171175/

    Article  Google Scholar 

  17. Miao, Y., Ma, J., Liu, X., Li, X., Jiang, Q., Zhang, J.: Attribute-based keyword search over hierarchical data in cloud computing. IEEE Trans. Serv. Comput. 1–14 (2017). https://doi.org/10.1109/TSC.2017.2757467, https://ink.library.smu.edu.sg/sis_research/3856

  18. Miao, Y., Ma, J., Liu, X., Li, X., Liu, Z., Li, H.: Practical attribute-based multi-keyword search scheme in mobile crowdsourcing. IEEE Internet Things J. 1 (2017). https://doi.org/10.1109/JIOT.2017.2779124

    Article  Google Scholar 

  19. Ning, J., Dong, X., Cao, Z., Wei, L., Lin, X.: White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. IEEE Trans. Inf. Forensics Secur. 10(6), 1274–1288 (2015). https://doi.org/10.1109/TIFS.2015.2405905

    Article  Google Scholar 

  20. Ruj, S., Nayak, A., Stojmenovic, I.: DACC: distributed access control in clouds. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, pp. 91–98. IEEE, November 2011. https://doi.org/10.1109/TrustCom.2011.15, http://ieeexplore.ieee.org/document/6120807/

  21. Wei, J., Liu, W., Hu, X.: Secure and efficient attribute-based access control for multiauthority cloud storage. IEEE Syst. J. 12(2), 1731–1742 (2018). https://doi.org/10.1109/JSYST.2016.2633559. http://ieeexplore.ieee.org/document/7792622/

    Article  Google Scholar 

  22. Zhang, W., Lin, Y., Xiao, S., Wu, J., Zhou, S.: Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. IEEE Trans. Comput. 65(5), 1566–1577 (2016). https://doi.org/10.1109/TC.2015.2448099. http://ieeexplore.ieee.org/document/7130597/

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgments

The paper is partially supported by the Sichuan Science and Technology Program (No. 2019YFG0405), the 6th Innovation and Entrepreneurship Leading Talents Project of Dongguan, the Project of Science and Technology on Electronic Information Control Laboratory, the National Natural Science Foundation of China under Grants U1833122, and the Macao Science and Technology Development Fund under Grants 0026/2018/A1.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaofen Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Long, J., Zhang, K., Wang, X., Dai, HN. (2019). Lightweight Distributed Attribute Based Keyword Search System for Internet of Things. In: Wang, G., Feng, J., Bhuiyan, M., Lu, R. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2019. Lecture Notes in Computer Science(), vol 11637. Springer, Cham. https://doi.org/10.1007/978-3-030-24900-7_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24900-7_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24899-4

  • Online ISBN: 978-3-030-24900-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics