Abstract
With the continuous development of the Internet of Things (IoT), a growing number of users choose to store the data collected from their smart devices on a cloud server for saving costs. However, the security and privacy issues that accompany the cloud-assisted IoT are also becoming increasingly apparent. Considering the untrusted nature of the cloud server, the data accumulated by the smart sensor must be encrypted before outsourcing to the cloud server. Nevertheless, the above mechanism raises another serious problem. For users of another public key cryptosystem, it is impractical to download all the data stored in the cloud to find the data he needs. To solve this problem, we first, proposed a public key encryption with equality test for heterogeneous systems (PKE-ET-HS) which combines the ideas of identity-based encryption with outsourced equality test and public key encryption with equality test. This scheme allows the authorized cloud server to retrieve whether two encryptions encrypted in a heterogeneous system contain equivalent messages. In addition, in the random oracle, the security of the proposed scheme has been given under the bilinear Diffie–Hellman assumption and the computational Diffie–Hellman assumption. Finally, storage size, computation complexity, and properties are compared with other related works. The results show that the PKE-ET-HS scheme proposed in this paper has a good performance.
Similar content being viewed by others
References
Harbi, Y., Aliouat, Z., Harous, S., Bentaleb, A., & Refoufi, A. (2019). A review of security in internet of things. Wireless Personal Communications, 108(1), 325–344.
Xiong, H., Mei, Q., Zhao, Y., Peng, L., & Zhang, H. (2019). Scalable and forward secure network attestation with privacy-preserving in cloud-assisted internet of things. IEEE Sensors Journal, 19, 8317–8331.
Prasad, R., & Reichert, F. (2011). Special issue on internet of things and future applications. Wireless Personal Communications, 61(3), 491–493.
Xiong, H., Bao, Y., Nie, X., & Assor, Y. I. (2019). Server-aided attribute-based signature supporting expressive access structures for industrial internet of things. IEEE Transactions on Industrial Informatics, 16, 1013–1023.
Tang, J., Dong, T., Li, L., & Shao, L. (2018). Intelligent monitoring system based on internet of things. Wireless Personal Communications, 102(2), 1521–1537.
Xiong, H., Mei, Q., & Zhao, Y. (2019). Efficient and provably secure certificateless parallel key-insulated signature without pairing for IIoT environments. IEEE Systems Journal, 1–11.
Eltayieb, N., Wang, P., Hassan, A., Elhabob, R., & Li, F. (2019). ASDS: Attribute-based secure data sharing scheme for reliable cloud environment. Security and Privacy, 2(2), e57.
Elhabob, R., Zhao, Y., Sella, I., & Xiong, H. (2019). An efficient certificateless public key cryptography with authorized equality test in IIoT. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-019-01365-4.
Truong, H.-L., & Dustdar, S. (2015). Principles for engineering IoT cloud systems. IEEE Cloud Computing, 2(2), 68–76.
Pitchai, R., Jayashri, S., & Raja, J. (2016). Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing. Wireless Personal Communications, 90(2), 947–960.
Eltayieb, N., Elhabob, R., Hassan, A., & Li, F. (2020). A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud. Journal of Systems Architecture, 102, 101653.
Mei, Q., Zhao, Y., & Xiong, H. (2019). A new provably secure certificateless signature with revocation in the standard model. Informatica, 30(4), 711–728.
Sadeghi, A.-R., Wachsmann, C., & Waidner, M. (2015). Security and privacy challenges in industrial internet of things. In Proceedings of the 52nd annual design automation conference (p 54). ACM.
Elhabob, R., Zhao, Y., Sella, I., & Xiong, H. (2019). Efficient certificateless public key cryptography with equality test for internet of vehicles. IEEE Access, 7, 68957–68969.
Xiong, H., Zhao, Y., Peng, L., Zhang, H., & Yeh, K.-H. (2019). Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. Future Generation Computer Systems, 97, 453–461.
Zhou, J., Cao, Z., Dong, X., & Vasilakos, A. V. (2017). Security and privacy for cloud-based IoT: Challenges. IEEE Communications Magazine, 55(1), 26–33.
Esposito, C., Castiglione, A., Martini, B., & Choo, K.-K. R. (2016). Cloud manufacturing: Security, privacy, and forensic concerns. IEEE Cloud Computing, 3(4), 16–22.
Eltayieb, N., Elhabob, R., Hassan, A., & Li, F. (2019). An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid. Journal of Systems Architecture, 98, 165–172.
Aziz, A., & Singh, K. (2019). Lightweight security scheme for internet of things. Wireless Personal Communications, 104(2), 577–593.
Elhabob, R., Zhao, Y., Sella, I., & Xiong, H. (2019). Public key encryption with equality test for heterogeneous systems in cloud computing. KSII Transactions on Internet and Information Systems (TIIS), 13(9), 4742–4770.
Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In International conference on the theory and applications of cryptographic techniques, (pp 506–522). Springer.
Yang, G., Tan, C. H., Huang, Q., & Wong, D. S. (2010). Probabilistic public key encryption with equality test. In Cryptographers track at the RSA conference, (pp 119–131). Springer.
Tang, Q. (2012). Public key encryption schemes supporting equality test with authorisation of different granularity. International Journal of Applied Cryptography, 2(4), 304–321.
Huang, K., Tso, R., Chen, Y.-C., Rahman, S. M. M., Almogren, A., & Alamri, A. (2015). Pke-aet: Public key encryption with authorized equality test. The Computer Journal, 58, 2686–2697.
Lee, H. T., Ling, S., Seo, J. H., & Wang, H. (2016). Cca2 attack and modification of Huang et al.’s public key encryption with authorized equality test. The Computer Journal, 59(11), 1689–1694.
Xu, Y., Wang, M., Zhong, H., Cui, J., Liu, L., & Franqueira, V. N. L. (2017). Verifiable public key encryption scheme with equality test in 5g networks. IEEE Access, 5, 12702–12713.
Elhabob, R., Sella, I., Zhao, Y., Zhu, G., & Xiong, H. (2018). A heterogeneous systems public key encryption with equality test in smart city. In ICEB 2018 Proceedings. 98.
Ma, S. (2016). Identity-based encryption with outsourced equality test in cloud computing. Information Sciences, 328, 389–402.
Baek, J., Safavi-Naini, R., & Susilo, W. (2008). Public key encryption with keyword search revisited. Computational Science and Its Applications-ICCSA, 2008, 1249–1259.
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., & Shi, H. (2005). Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. In Crypto (vol. 3621, pp. 205–222). Springer.
Tang, Q. (2011). Towards public key encryption scheme supporting equality test with fine-grained authorization. In Australasian conference on information security and privacy (pp 389–406). Springer.
Tang, Q. (2012). Public key encryption supporting plaintext equality test and user-specified authorization. Security and Communication Networks, 5(12), 1351–1362.
Ma, S., Zhang, M., Huang, Q., & Yang, B. (2014). Public key encryption with delegated equality test in a multi-user setting. The Computer Journal, 54, 986–1002.
Ma, S., Huang, Q., Zhang, M., & Yang, B. (2015). Efficient public key encryption with equality test supporting flexible authorization. IEEE Transactions on Information Forensics and Security, 10(3), 458–470.
Lee, H. T., Ling, S., Seo, J. H., & Wang, H. (2016). Semi-generic construction of public key encryption and identity-based encryption with equality test. Information Sciences, 373, 419–440.
Wu, L., Zhang, Y., Choo, K.-K. R., & He, D. (2017). Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Generation Computer Systems, 73, 22–31.
Elhabob, R., Zhao, Y., Eltayieb, N., Abdelgader, A. M. S., & Xiong, H. (2019). Identity-based encryption with authorized equivalence test for cloud-assisted IoT. Cluster Computing. https://doi.org/10.1007/s10586-019-02979-1.
Boneh, D., & Franklin, M.. (2001). Identity-based encryption from the weil pairing. In Annual international cryptology conference (pp. 213–229). Springer.
Lynn, B. (2013). The stanford pairing based crypto library. Privacy Preservation Scheme for Multicast Communications in Smart Buildings of the Smart Grid, 324.
Acknowledgements
This work was supported in part by the Natural Science Foundation of China under Grant U1936101, in part by the 13th Five-Year Plan of National Cryptography Development Fund for Cryptographic Theory of China under Grant MMJJ20170204, the Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems and in part by the Sichuan Science and Technology Project under Grant 2018KZ0007.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Elhabob, R., Zhao, Y., Hassan, A. et al. PKE-ET-HS: Public Key Encryption with Equality Test for Heterogeneous Systems in IoT. Wireless Pers Commun 113, 313–335 (2020). https://doi.org/10.1007/s11277-020-07190-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07190-9