Skip to main content
Log in

Identity-based encryption with authorized equivalence test for cloud-assisted IoT

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The rising popularity of cloud computing is now widely adopted by many industries including resource-restricted data owners, i.e., with the smart sensors in the Internet of things (IoT) to store their data in the cloud. Considering the untrusted nature of cloud server, the data collected by smart sensors should be encrypted before offloading them to the cloud. This unfortunately raises a concern on how to perform search functionality on encrypted data in the cloud. To tackle this challenge, an identity-based encryption scheme with authorized equivalence test (IBE-AET) is proposed in this paper to achieve simultaneously encryption and search functionality over outsourced data in cloud-assisted IoT. In IBE-AET, an authorized cloud server is allowed to carry out the equivalence test of two messages encrypted using the same identity as well as also those messages encrypted in different identities. In addition, the authorization mechanism in IBE-AET is versatile such that it enables a user to delegate the testing capability to the cloud server in a fine-grained manner. In the random oracle model, the proposed IBE-AET is formally proved to be equivalent to the bilinear Diffie–Hellman (BDH) assumption. The practicability of the suggested scheme is demonstrated by both the theoretic analysis and experiment simulation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Fang, X., Misra, S., Xue, G., Yang, D.: Smart grid the new and improved grid: a survey. IEEE Commun. Surv. Tutor. 14(4), 944–980 (2012)

    Article  Google Scholar 

  2. Eltayieb, N., Elhabob, R., Hassan, A., Li, F.: An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid. J. Syst. Archit. 98, 165–172 (2019)

    Article  Google Scholar 

  3. Galloway, B., Hancke, G.P.: Introduction to industrial control networks. IEEE Commun. Surv. Tutor. 15(2), 860–880 (2013)

    Article  Google Scholar 

  4. Toor, Y., Muhlethaler, P., Laouiti, A., De La Fortelle, A.: Vehicle ad hoc networks: applications and related technical issues. IEEE Commun. Surv. Tutor. 10(3), 74–88 (2008)

    Article  Google Scholar 

  5. Zhang, K., Ni, J., Yang, K., Liang, X., Ren, J., Shen, X.S.: Security and privacy in smart city applications: challenges and solutions. IEEE Commun. Mag. 55(1), 122–129 (2017)

    Article  Google Scholar 

  6. Elhabob, R., Sella, I., Zhao, Y., Zhu, G., Xiong, H.: A heterogeneous systems public key encryption with equality test in smart city. In: Proceedings of The 18th International Conference on Electronic Business. ICEB, Guilin(2018)

  7. Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)

    Article  Google Scholar 

  8. Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (iot): a vision, architectural elements, and future directions. Fut. Gener. Comput. Syst. 29(7), 1645–1660 (2013)

    Article  Google Scholar 

  9. Xiao, Z., Xiao, Y.: Security and privacy in cloud computing. IEEE Commun. Surv. Tutor. 15(2), 843–859 (2013)

    Article  Google Scholar 

  10. Elhabob, R., Zhao, Y., Sella, I., Xiong, H.: An efficient certificateless public key cryptography with authorized equality test in IIot. J. Ambient Intell. Hum. Comput. (2019). https://doi.org/10.1007/s12652-019-01365-4

    Article  Google Scholar 

  11. Truong, H.-L., Dustdar, S.: Principles for engineering IoT cloud systems. IEEE Cloud Comput. 2(2), 68–76 (2015)

    Article  Google Scholar 

  12. Sharma, S., Chang, V., Tim, U.S., Wong, J., Gadia, S.: Cloud and iot-based emerging services systems. Clust. Comput. 22, 71–91 (2019)

    Article  Google Scholar 

  13. Zhou, J., Cao, Z., Dong, X., Vasilakos, A.V.: Security and privacy for cloud-based IoT: challenges. IEEE Commun. Mag. 55(1), 26–33 (2017)

    Article  Google Scholar 

  14. Miloslavskaya, N., Tolstoy, A.: Internet of things: information security challenges and solutions. Clust. Comput. 22, 103–119 (2019)

    Article  Google Scholar 

  15. Xiong, H., Zhao, Y., Peng, L., Zhang, H., Yeh, K.-H.: Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. Fut. Gener. Comput. Syst. 97, 453–461 (2019)

    Article  Google Scholar 

  16. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506–522. Springer, Berlin (2004)

  17. Yang, G., Tan, C.H., Huang, Q., Wong, D.S.: Probabilistic public key encryption with equality test. In Cryptographers Track at the RSA Conference, pp. 119–131. Springer, Berlin (2010)

  18. Xiong, H., Zhang, H., Sun, J.: Attribute-based privacy-preserving data sharing for dynamic groups in cloud computing. IEEE Syst. J. (2018). https://doi.org/10.1109/JSYST.2018.2865221

    Article  Google Scholar 

  19. Ma, S., Huang, Q., Zhang, M., Yang, B.: Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans. Inf. Forensics Secur. 10(3), 458–470 (2015)

    Article  Google Scholar 

  20. Elhabob, R., Zhao, Y., Sella, I., Xiong, H.: Efficient certificateless public key cryptography with equality test for internet of vehicles. IEEE Access (2019). https://doi.org/10.1109/ACCESS.2019.2917326

    Article  Google Scholar 

  21. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Workshop on the Theory and Application of Cryptographic Techniques, pp. 47–53. Springer, Berlin (1984)

  22. Li, H., Huang, Q., Ma, S., Shen, J., Susilo, W.: Authorized equality test on identity-based ciphertexts for secret data sharing via cloud storage. IEEE Access 7, 25409–25421 (2019)

    Article  Google Scholar 

  23. Xiong, H., Bao, Y., Nie, X., Assor, Y.I.: Server-aided attribute-based signature supporting expressive access structures for industrial internet of things. IEEE Trans. Ind. Inf. (2019). https://doi.org/10.1109/TII.2018.2813304

    Article  Google Scholar 

  24. Song, Dawn Xiaoding, Wagner, David, Perrig, Adrian: Practical techniques for searches on encrypted data. In: Proceedings 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp. 44–55. IEEE (2000)

  25. Zhang, J., Mao, J.: Efficient public key encryption with revocable keyword search in cloud computing. Clust. Comput. 19(3), 1211–1217 (2016)

    Article  Google Scholar 

  26. Behnia, R., Ozmen, M.R., Yavuz, A.A.: Lattice-based public key searchable encryption from experimental perspectives. IEEE Trans. Dependable Secure Comput. (2018). https://doi.org/10.1109/TDSC.2018.2867462

    Article  Google Scholar 

  27. Lu, Y., Li, J.: Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems. Clust. Comput. 22, 285–299 (2019)

    Article  Google Scholar 

  28. Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. J. Cryptol. 21(3), 350–391 (2008)

    Article  MathSciNet  Google Scholar 

  29. Tang, Q.: Towards public key encryption scheme supporting equality test with fine-grained authorization. In: Australasian Conference on Information Security and Privacy, pp. 389–406. Springer, Berlin (2011)

  30. Tang, Q.: Public key encryption schemes supporting equality test with authorisation of different granularity. Int. J. Appl. Cryptogr. 2(4), 304–321 (2012)

    Article  MathSciNet  Google Scholar 

  31. Tang, Q.: Public key encryption supporting plaintext equality test and user-specified authorization. Secur. Commun. Netw. 5(12), 1351–1362 (2012)

    Article  Google Scholar 

  32. Ma, S., Zhang, M., Huang, Q., Yang, B.: Public key encryption with delegated equality test in a multi-user setting. Comput. J. 58(4), 986–1002 (2015)

    Article  Google Scholar 

  33. Huang, K., Tso, R., Chen, Y.-C., Mizanur, S.M., Rahman, A.A., Alamri, A.: Pke-aet: public key encryption with authorized equality test. Comput. J. 58(10), 2686–2697 (2015)

    Article  Google Scholar 

  34. Yan, X., Wang, M., Zhong, H., Cui, J., Liu, L., Franqueira, V.N.L.: Verifiable public key encryption scheme with equality test in 5g networks. IEEE Access 5, 12702–12713 (2017)

    Article  Google Scholar 

  35. Ma, S.: Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 328, 389–402 (2016)

    Article  Google Scholar 

  36. Lee, H.T., Ling, S., Seo, J.H., Wang, H.: Semi-generic construction of public key encryption and identity-based encryption with equality test. Inf. Sci. 373, 419–440 (2016)

    Article  Google Scholar 

  37. Libing, W., Zhang, Y., Choo, K.-K.R., He, D.: Efficient and secure identity-based encryption scheme with equality test in cloud computing. Fut. Gener. Comput. Syst. 73, 22–31 (2017)

    Article  Google Scholar 

  38. Libing, W., Zhang, Y., Choo, K.-K.R., He, D.: Efficient identity-based encryption scheme with equality test in smart city. IEEE Trans. Sustain. Comput. 3(1), 44–55 (2018)

    Article  Google Scholar 

  39. Ramadan, M., Liao, Y., Li, F., Zhou, S., Abdalla, H.: IBEET-RSA: identity-based encryption with equality test over rsa for wireless body area networks. Mobile Netw. Appl. (2019). https://doi.org/10.1007/s11036-019-01215-9

    Article  Google Scholar 

  40. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Annual International Cryptology Conference, pp. 213–229. Springer, Berlin (2001)

  41. Lynn, B., et al.: The Stanford pairing based crypto library. http://crypto.stanford.edu/pbc/ (2006). Accessed 27, March 2013

Download references

Acknowledgements

We thank the anonymous reviewers for their invaluable comments and suggestions. This work was supported in part by the 13th Five-Year Plan of National Cryptography Development Fund for Cryptographic Theory of China under Grant MMJJ20170204, in part by the Fundamental Research Funds for the Central Universities under Grant ZYGX2016J091, the Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems, and in part by the Natural Science Foundation of China under Grants U1401257, 61472064, and 61602096, Sichuan Science and Technology Project under Grant 2018KZ007.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hu Xiong.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Elhabob, R., Zhao, Y., Eltayieb, N. et al. Identity-based encryption with authorized equivalence test for cloud-assisted IoT. Cluster Comput 23, 1085–1101 (2020). https://doi.org/10.1007/s10586-019-02979-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-019-02979-1

Keywords

Navigation