Abstract
The development of Internet of things (IoT) makes data exchange more frequently, and the cloud computing can provide stable storage and efficient computation for data users. To ensure the security and functionality of data, the efficiency of decryption and keyword search should be taken into consideration in resource-constrained IoT scenarios. In order to solve the above problems, a flexible keyword search scheme in IoT is proposed over encrypted data with outsourced decryption. First, the attribute-based encryption technology is applied, by which only users whose attributes meet the access control structure can access the sharing data. Second, the reciprocal mapping of Lagrange polynomials technology is employed to implement keyword search in a large number of ciphertext data. Third, the decryption of ciphertext is outsourced to improve the efficiency of decryption on the client side. The security and performance analysis indicates that the proposed scheme is secure and efficient.
References
Jhaveri RH, Patel NM, Zhong Y, Sangaiah AK (2018) Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial iot. IEEE Access 6:20085–20103
Shen J, Wang C, Li T, Chen X, Huang X, Zhan ZH (2018) Secure data uploading scheme for a smart home system. Inform Sci 453:186–197
Wu A, Zheng D, Zhang Y, Yng M (2018) Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing. Sensors 18(7):1–17. https://doi.org/10.3390/s18072158
Zhang Y, Wu A, Zheng D (2018) Efficient and privacy-aware attribute-based data sharing in mobile cloud computing. J Ambient Intell Humaniz Comput 9(4):1039–1048
Chen X, Li J, Weng J, Ma J, Lou W (2016) Verifiable computation over large database with incremental updates. IEEE Trans Comput 65(10):3184–3195
Li J, Liu Z, Chen X, Xhafa F, Tan X, Wong DS (2015) L-encdb: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl-Based Syst 79:18–26
Zhang Y, Zheng D, Deng RH (2018) Security and privacy in smart health: e policy-hiding attribute-based access control. IEEE Internet Things J 5(3):2130–2145
Wang J, Chen X, Huang X, You I, Xiang Y (2015) Verifiable auditing for outsourced database in cloud computing. IEEE Trans Comput 64(11):3293–3303
Zhang Y, Yang M, Zheng D, Lang P, Wu A, Chen C (2018) Efficient and secure big data storage system with leakage resilience in cloud computing. Soft Comput 22(23):7763–7772
Zhang Y, Zheng D, Guo R, Lan Q (2018) Fine-grained access control systems suitable for resource-constrained users in cloud computing. Comput Inf 37(2):327–348
Zhang Y, Deng RH, Han G, Zheng D (2018) Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things. J Netw Comput Appl 123:89–100
Li H, Liu D, Dai Y, Luan TH, Shen XS (2015) Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans Emerging Topics Comput 3(1):127–138
Wang J, Chen X, Li J, Zhao J, Shen J (2017) Towards achieving flexible and verifiable search for outsourced database in cloud computing. Futur Gener Comput Syst 67:266–275
Zhang Y, Deng RH, Jiangang S, Kan Y, Dong Z (2018) Tkse: trustworthy keyword search over encrypted data with two-side verifiability via blockchain. IEEE Access 6:31077–31087
Li R, Zheng D, Zhang Y, Su H, Yang M, Lang P (2017) Attribute-based encryption with multi-keyword search. In: IEEE 2nd international conference on data science in cyberspace, pp 172–177
Li P, Li T, Ye H, Li J, Chen X, Xiang Y (2018) Privacy-preserving machine learning with multiple data providers. Futur Gener Comput Syst 87:341–350
Zhang Y, Lang P, Dong Z, Yang M, Guo R (2018) A secure and privacy-aware smart health system with secret key leakage resilience. Secur Commun Netw 2018:1–13. https://doi.org/10.1155/2018/7202598
Wang C, Shen J, Liu Q, Ren Y, Li T (2018) A novel security scheme based on instant encrypted transmission for internet of things. Secur Commun Netw 2018(2):1–7
Zhang Y, Deng RH, Ximeng L, Dong Z (2018) Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf Sci 462:262–277
Zheng D, Wu A, Hui Y, Lang Q (2018) Efficient and privacy-preserving medical data sharing in Internet of Things with limited computing power. IEEE Access 6:28019–28027
Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 457–473
Ning J, Dong X, Gao Z, Wei L, Lin X (2015) White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. IEEE Trans Inf Forensics Secur 10(6):1274–1288
Ning J, Gao Z, Dong X, Wei L (2018) White-box traceable CP-ABE for cloud storage service: how to catch people leaking their access credentials effectively. IEEE Trans Dependable Secure Comput 15(5):883–897
Ning J, Gao Z, Dong X, Wei L, Lin X (2014) Large universe ciphertext-policy attribute-based encryption with white-box traceability. European Symposium on Research in Computer Security 15(5):55–72
Li J, Chen X, Chow SSM, Huang Q, Wong DS, Liu Z (2018) Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl 112:89–96
Li H, Liu D, Dai Y, Luan TH, Yu S (2018) Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Transactions on Emerging Topics in Computing 6(1):97–109
Sun W, Yu S, Lou W, Hou YT, Li H (2014) Protecting your right: attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In: 2014 Proceedings IEEE INFOCOM, pp 226–234
Zheng Q, Xu S, Ateniese G (2014) Vabks: Verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM, pp 522–530
Li J, Zhang Y, Chen X, Xiang Y, Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1–12
Zhang Y, Zheng D, Li Q, Li J, Li H (2016) Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing. Secur Commun Netw 9(16):3688–3702
Li J, Li J, Chen X, Jia C, Lou W (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425–437
Zhang Y, Deng R H, Liu X, Zheng D (2018) Outsourcing service fair payment based on blockchain and its applications in cloud computing, IEEE transactions on services computing. https://doi.org/10.1109/TSC20182864191
Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210
Zhang Y, Chen X, Li J, Wong D S, Li H, You I (2017) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inform Sci 379:42–61
Green M, Hohenberger S, Waters B (2014). In: Usenix conference on security, pp 34–34
Ning J, Gao Z, Dong X, Ma K Liang H, Wei L (2018) Auditable σ-time outsourced attribute-based encryption for access control in cloud computing. IEEE Trans Inf Forensics Secur 13(1):94–105
Menezes A (2009) An introduction to pairing-based cryptography. Recent trends in cryptography 477:47–65
Haoxing L, Fenghua L, Chenggen S, Mang S, Xin L (2015) Public key encryption with multi-keywords search. Journal of Xidian University 42(5):20–25
Gentry C (2006) Practical identity-based encryption without random oracles. Lect Notes Comput Sci 4004:445–464
Dan B, Boyen X (2004) Efficient selective-ID secure identity-based encryption without random oracles. Springer, Berlin, pp 223–238
Zhang B, Zhang F (2011) An efficient public key encryption with conjunctive-subset keywords search. J Netw Comput Appl 34(1):262–267
Funding
This work is supported by National Key R&D Program of China (No. 2017YFB0802000), National Natural Science Foundation of China (No. 61772418, 61472472, 61402366), Natural Science Basic Research Plan in Shaanxi Province of China (No. 2018JZ6001, 2015JQ6236), and the Youth Innovation Team of Shaanxi Universities. Yinghui Zhang is supported by New Star Team of Xi’an University of Posts and Telecommunications (No. 2016-02).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhang, Y., Wu, A., Zhang, T. et al. Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things. Ann. Telecommun. 74, 413–421 (2019). https://doi.org/10.1007/s12243-018-0694-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12243-018-0694-8