Abstract
The rising popularity of cloud computing is now widely adopted by many industries including resource-restricted data owners, i.e., with the smart sensors in the Internet of things (IoT) to store their data in the cloud. Considering the untrusted nature of cloud server, the data collected by smart sensors should be encrypted before offloading them to the cloud. This unfortunately raises a concern on how to perform search functionality on encrypted data in the cloud. To tackle this challenge, an identity-based encryption scheme with authorized equivalence test (IBE-AET) is proposed in this paper to achieve simultaneously encryption and search functionality over outsourced data in cloud-assisted IoT. In IBE-AET, an authorized cloud server is allowed to carry out the equivalence test of two messages encrypted using the same identity as well as also those messages encrypted in different identities. In addition, the authorization mechanism in IBE-AET is versatile such that it enables a user to delegate the testing capability to the cloud server in a fine-grained manner. In the random oracle model, the proposed IBE-AET is formally proved to be equivalent to the bilinear Diffie–Hellman (BDH) assumption. The practicability of the suggested scheme is demonstrated by both the theoretic analysis and experiment simulation.
Similar content being viewed by others
References
Fang, X., Misra, S., Xue, G., Yang, D.: Smart grid the new and improved grid: a survey. IEEE Commun. Surv. Tutor. 14(4), 944–980 (2012)
Eltayieb, N., Elhabob, R., Hassan, A., Li, F.: An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid. J. Syst. Archit. 98, 165–172 (2019)
Galloway, B., Hancke, G.P.: Introduction to industrial control networks. IEEE Commun. Surv. Tutor. 15(2), 860–880 (2013)
Toor, Y., Muhlethaler, P., Laouiti, A., De La Fortelle, A.: Vehicle ad hoc networks: applications and related technical issues. IEEE Commun. Surv. Tutor. 10(3), 74–88 (2008)
Zhang, K., Ni, J., Yang, K., Liang, X., Ren, J., Shen, X.S.: Security and privacy in smart city applications: challenges and solutions. IEEE Commun. Mag. 55(1), 122–129 (2017)
Elhabob, R., Sella, I., Zhao, Y., Zhu, G., Xiong, H.: A heterogeneous systems public key encryption with equality test in smart city. In: Proceedings of The 18th International Conference on Electronic Business. ICEB, Guilin(2018)
Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (iot): a vision, architectural elements, and future directions. Fut. Gener. Comput. Syst. 29(7), 1645–1660 (2013)
Xiao, Z., Xiao, Y.: Security and privacy in cloud computing. IEEE Commun. Surv. Tutor. 15(2), 843–859 (2013)
Elhabob, R., Zhao, Y., Sella, I., Xiong, H.: An efficient certificateless public key cryptography with authorized equality test in IIot. J. Ambient Intell. Hum. Comput. (2019). https://doi.org/10.1007/s12652-019-01365-4
Truong, H.-L., Dustdar, S.: Principles for engineering IoT cloud systems. IEEE Cloud Comput. 2(2), 68–76 (2015)
Sharma, S., Chang, V., Tim, U.S., Wong, J., Gadia, S.: Cloud and iot-based emerging services systems. Clust. Comput. 22, 71–91 (2019)
Zhou, J., Cao, Z., Dong, X., Vasilakos, A.V.: Security and privacy for cloud-based IoT: challenges. IEEE Commun. Mag. 55(1), 26–33 (2017)
Miloslavskaya, N., Tolstoy, A.: Internet of things: information security challenges and solutions. Clust. Comput. 22, 103–119 (2019)
Xiong, H., Zhao, Y., Peng, L., Zhang, H., Yeh, K.-H.: Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. Fut. Gener. Comput. Syst. 97, 453–461 (2019)
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506–522. Springer, Berlin (2004)
Yang, G., Tan, C.H., Huang, Q., Wong, D.S.: Probabilistic public key encryption with equality test. In Cryptographers Track at the RSA Conference, pp. 119–131. Springer, Berlin (2010)
Xiong, H., Zhang, H., Sun, J.: Attribute-based privacy-preserving data sharing for dynamic groups in cloud computing. IEEE Syst. J. (2018). https://doi.org/10.1109/JSYST.2018.2865221
Ma, S., Huang, Q., Zhang, M., Yang, B.: Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans. Inf. Forensics Secur. 10(3), 458–470 (2015)
Elhabob, R., Zhao, Y., Sella, I., Xiong, H.: Efficient certificateless public key cryptography with equality test for internet of vehicles. IEEE Access (2019). https://doi.org/10.1109/ACCESS.2019.2917326
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Workshop on the Theory and Application of Cryptographic Techniques, pp. 47–53. Springer, Berlin (1984)
Li, H., Huang, Q., Ma, S., Shen, J., Susilo, W.: Authorized equality test on identity-based ciphertexts for secret data sharing via cloud storage. IEEE Access 7, 25409–25421 (2019)
Xiong, H., Bao, Y., Nie, X., Assor, Y.I.: Server-aided attribute-based signature supporting expressive access structures for industrial internet of things. IEEE Trans. Ind. Inf. (2019). https://doi.org/10.1109/TII.2018.2813304
Song, Dawn Xiaoding, Wagner, David, Perrig, Adrian: Practical techniques for searches on encrypted data. In: Proceedings 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp. 44–55. IEEE (2000)
Zhang, J., Mao, J.: Efficient public key encryption with revocable keyword search in cloud computing. Clust. Comput. 19(3), 1211–1217 (2016)
Behnia, R., Ozmen, M.R., Yavuz, A.A.: Lattice-based public key searchable encryption from experimental perspectives. IEEE Trans. Dependable Secure Comput. (2018). https://doi.org/10.1109/TDSC.2018.2867462
Lu, Y., Li, J.: Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems. Clust. Comput. 22, 285–299 (2019)
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. J. Cryptol. 21(3), 350–391 (2008)
Tang, Q.: Towards public key encryption scheme supporting equality test with fine-grained authorization. In: Australasian Conference on Information Security and Privacy, pp. 389–406. Springer, Berlin (2011)
Tang, Q.: Public key encryption schemes supporting equality test with authorisation of different granularity. Int. J. Appl. Cryptogr. 2(4), 304–321 (2012)
Tang, Q.: Public key encryption supporting plaintext equality test and user-specified authorization. Secur. Commun. Netw. 5(12), 1351–1362 (2012)
Ma, S., Zhang, M., Huang, Q., Yang, B.: Public key encryption with delegated equality test in a multi-user setting. Comput. J. 58(4), 986–1002 (2015)
Huang, K., Tso, R., Chen, Y.-C., Mizanur, S.M., Rahman, A.A., Alamri, A.: Pke-aet: public key encryption with authorized equality test. Comput. J. 58(10), 2686–2697 (2015)
Yan, X., Wang, M., Zhong, H., Cui, J., Liu, L., Franqueira, V.N.L.: Verifiable public key encryption scheme with equality test in 5g networks. IEEE Access 5, 12702–12713 (2017)
Ma, S.: Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 328, 389–402 (2016)
Lee, H.T., Ling, S., Seo, J.H., Wang, H.: Semi-generic construction of public key encryption and identity-based encryption with equality test. Inf. Sci. 373, 419–440 (2016)
Libing, W., Zhang, Y., Choo, K.-K.R., He, D.: Efficient and secure identity-based encryption scheme with equality test in cloud computing. Fut. Gener. Comput. Syst. 73, 22–31 (2017)
Libing, W., Zhang, Y., Choo, K.-K.R., He, D.: Efficient identity-based encryption scheme with equality test in smart city. IEEE Trans. Sustain. Comput. 3(1), 44–55 (2018)
Ramadan, M., Liao, Y., Li, F., Zhou, S., Abdalla, H.: IBEET-RSA: identity-based encryption with equality test over rsa for wireless body area networks. Mobile Netw. Appl. (2019). https://doi.org/10.1007/s11036-019-01215-9
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Annual International Cryptology Conference, pp. 213–229. Springer, Berlin (2001)
Lynn, B., et al.: The Stanford pairing based crypto library. http://crypto.stanford.edu/pbc/ (2006). Accessed 27, March 2013
Acknowledgements
We thank the anonymous reviewers for their invaluable comments and suggestions. This work was supported in part by the 13th Five-Year Plan of National Cryptography Development Fund for Cryptographic Theory of China under Grant MMJJ20170204, in part by the Fundamental Research Funds for the Central Universities under Grant ZYGX2016J091, the Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems, and in part by the Natural Science Foundation of China under Grants U1401257, 61472064, and 61602096, Sichuan Science and Technology Project under Grant 2018KZ007.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Elhabob, R., Zhao, Y., Eltayieb, N. et al. Identity-based encryption with authorized equivalence test for cloud-assisted IoT. Cluster Comput 23, 1085–1101 (2020). https://doi.org/10.1007/s10586-019-02979-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-019-02979-1