Abstract
Current time organizations have moved from the conventional industries to smart industries by embracing the approach of Industrial Internet of Things (IIoT), which has provided an avenue for the integration of smart devices and communication technologies. IIoT offers reduction of costs on services and technologies since it counts on the flexibility, availability and real-time data processing capabilities of the cloud server. And even with the untrusted nature of the cloud, the privacy and confidentiality of the data outsourced to the cloud has been able to be guaranteed. This has been achieved through encryption techniques apply to the data before outsourcing. This has made it feasible to have the data in the cloud secured. However, the limitation of data recovery due to it having the innate “all-or-nothing” decryption characteristic, results in a challenge in the search functionality for the encrypted data. In order to deal with this challenge, this paper nominates a Certificateless Public Key Cryptography with Authorized Equivalent Test (CL-PKC-AET). Whereby, a cloud server is given authority to actuate if two encryptions consist of the equivalent messages. Furthermore, the extra providence of a fine-grained testing capability to the cloud server makes the CL-PKC-AET scheme adaptable. We define our scheme basing on bilinear pairing and further advocate within the random oracle model its security, based on the Bilinear Diffie-Hellman assumption. Basing on comparison with existing work, our scheme proves to be more effective.
Similar content being viewed by others
References
Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H (2005) Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. Crypto 3621:205–222 (Springer)
Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. Asiacrypt 2894:452–473 (Springer)
Anagnostopoulos I, Zeadally S, Exposito E (2016) Handling big data: research challenges and future directions. J Supercomput 72(4):1494–1516
Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805
Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. Comput Sci Appl ICCSA 2008:1249–1259
Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques, Springer, pp 506–522
Elhabob R, Zhao Y, Sella I, Xiong H (2019) Efficient certificateless public key cryptography with equality test for internet of vehicles. IEEE Access, pp 1–1
Esposito C, Castiglione A, Martini B, Choo KKR (2016) Cloud manufacturing: security, privacy, and forensic concerns. IEEE Cloud Comput 3(4):16–22
Gope P, Das AK, Kumar N, Cheng Y (2019) Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE transactions on industrial informatics
Hassan A, Eltayieb N, Elhabob R, Li F (2018) An efficient certificateless user authentication and key exchange protocol for client-server environment. J Ambient Intell Hum Comput 9(6):1713–1727
Huang K, Tso R, Chen YC, Rahman SMM, Almogren A, Alamri A (2015) Pke-aet: Public key encryption with authorized equality test. Comput J 58(10):2686–2697
Kim S, Lee I (2018) Iot device security based on proxy re-encryption. J Ambient Intell Hum Comput 9(4):1267–1273
Lee HT, Ling S, Seo JH, Wang H (2016) Semi-generic construction of public key encryption and identity-based encryption with equality test. Inf Sci 373:419–440
Lynn B (2013) The stanford pairing based crypto library. In: Privacy preservation scheme for multicast communications in smart buildings of the smart grid, pp 324
Ma S (2016) Identity-based encryption with outsourced equality test in cloud computing. Inf Sci 328:389–402
Ma S, Huang Q, Zhang M, Yang B (2015a) Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans Inf Forensics Secur 10(3):458–470
Ma S, Zhang M, Huang Q, Yang B (2015b) Public key encryption with delegated equality test in a multi-user setting. Comput J 58(4):986–1002
Molano JIR, Lovelle JMC, Montenegro CE, Granados JJR, Crespo RG (2018) Metamodel for integration of internet of things, social networks, the cloud and industry 4.0. J Ambient Intell Hum Comput 2018:1–15
Noroozi M, Eslami Z (2019) Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks. J Ambient Intell Hum Comput 2019:1–12
Premkamal PK, Pasupuleti SK, Alphonse P (2018) A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud. J Ambient Intell Hum Comput 2018:1–15
Qu H, Yan Z, Lin XJ, Zhang Q, Sun L (2018) Certificateless public key encryption with equality test. Inf Sci 462:76–92
Singh S, Sharma PK, Moon SY, Park JH (2017) Advanced lightweight encryption algorithms for iot devices: survey, challenges and solutions. J Ambient Intell Hum Comput 2017:1–18
Tang Q (2011) Towards public key encryption scheme supporting equality test with fine-grained authorization. In: Australasian Conference on Information Security and Privacy, Springer, pp 389–406
Tang Q (2012a) Public key encryption schemes supporting equality test with authorisation of different granularity. Int J Appl Cryptogr 2(4):304–321
Tang Q (2012b) Public key encryption supporting plaintext equality test and user-specified authorization. Secur Commun Netw 5(12):1351–1362
Truong HL, Dustdar S (2015) Principles for engineering iot cloud systems. IEEE Cloud Comput 2(2):68–76
Wang D, Li W, Wang P (2018) Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans Ind Inf 14(9):4081–4092
Wu L, Zhang Y, Choo KKR, He D (2017) Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Gener Comput Syst 73:22–31
Wu L, Zhang Y, Choo KKR, He D (2018) Efficient identity-based encryption scheme with equality test in smart city. IEEE Trans Sustain Comput 3(1):44–55
Xu Y, Wang M, Zhong H, Cui J, Liu L, Franqueira VN (2017) Verifiable public key encryption scheme with equality test in 5G networks. IEEE Access
Yang G, Tan CH, Huang Q, Wong DS (2010) Probabilistic public key encryption with equality test. In: CryptographersTrack at the RSA Conference, Springer, pp 119–131
Acknowledgements
This work was supported in part by the 13th Five-Year Plan of National Cryptography Development Fund for Cryptographic Theory of China under Grant MMJJ20170204, in part by the Fundamental Research Funds for the Central Universities under Grant ZYGX2016J091, the Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems, and in part by the Natural Science Foundation of China under Grants U1401257, 61472064 and 61602096.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Elhabob, R., Zhao, Y., Sella, I. et al. An efficient certificateless public key cryptography with authorized equality test in IIoT. J Ambient Intell Human Comput 11, 1065–1083 (2020). https://doi.org/10.1007/s12652-019-01365-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-019-01365-4