ABSTRACT
Since more and more data from lightweight platforms like IoT devices or mobile apps are being outsourced to the cloud, the need to ensure privacy while retaining data usability is essential. This paper designs a framework where lightweight platforms like IoT devices can encrypt documents and generate document indexes using the public key before uploading the document to the cloud. An admin can search and retrieve the top-k most relevant documents that match a multi-keyword query using the private key. Most existing searchable encryption that supports IoT returns all the documents matching queried keywords. However, IoT devices can produce massive data, which is not practical for such schemes. We formally name our framework Multi-keyword Ranked Searchable Public-Key Encryption (MK-RS-PKE).
Supplemental Material
- Abbas Acar, Hidayet Aksu, A Selcuk Uluagac, and Mauro Conti. 2018. A survey on homomorphic encryption schemes: Theory and implementation. ACM Computing Surveys (CSUR) , Vol. 51, 4 (2018), 79.Google ScholarDigital Library
- Biwen Chen, Libing Wu, Neeraj Kumar, Kim-Kwang Raymond Choo, and Debiao He. 2019. Lightweight Searchable Public-key Encryption with Forward Privacy over IIoT Outsourced Data. IEEE Transactions on Emerging Topics in Computing (2019).Google Scholar
- Biwen Chen, Libing Wu, Huaqun Wang, Lu Zhou, and Debiao He. 2020. A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks. IEEE Transactions on Vehicular Technology , Vol. 69, 6 (2020), 5813--5825.Google ScholarCross Ref
- Yinbin Miao, Jianfeng Ma, Ximeng Liu, Jian Weng , Hongwei Li, and Hui Li. 2019. Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing. IEEE Transactions on Services Computing , Vol. 12, 5 (2019), 772--785.Google ScholarCross Ref
- Israt Jahan Mouri, Muhammad Ridowan, and Muhammad Abdullah Adnan. 2022. RS-PKE: Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight Platforms. In Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy .Google ScholarDigital Library
- Ronald L Rivest, Len Adleman, Michael L Dertouzos, et almbox. 1978. On data banks and privacy homomorphisms. Foundations of secure computation , Vol. 4, 11 (1978), 169--180.Google Scholar
- Emil Stefanov, Charalampos Papamanthou, and Elaine Shi. 2014. Practical Dynamic Searchable Encryption with Small Leakage.. In NDSS, Vol. 71. The Internet Society, Virginia, United States, 72--75.Google ScholarCross Ref
- Xiaojun Zhang, Chunxiang Xu, Huaxiong Wang, Yuan Zhang, and Shixiong Wang. 2019 b. FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things. IEEE Transactions on Dependable and Secure Computing (2019).Google Scholar
- Yuan Zhang, Chunxiang Xu, Jianbing Ni, Hongwei Li, and Xuemin Sherman Shen. 2019 a. Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage. IEEE Transactions on Cloud Computing (2019).Google Scholar
Index Terms
- MK-RS-PKE: Multi-Keyword Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight Platforms
Recommendations
RS-PKE: Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight Platforms
CODASPY '22: Proceedings of the Twelfth ACM Conference on Data and Application Security and PrivacySince more and more data from lightweight platforms like IoT devices or mobile apps are being outsourced to the cloud, the need to ensure privacy while retaining data usability is essential. In this paper, we design a framework where lightweight ...
Multi-keyword ranked searchable public-key encryption
Most related works on Public-Key Encryption with Keyword Search scheme also called Searchable Public-key Encryption focus on single keyword search. Some works supporting multi-keyword search cannot provide search result ranking. In this paper, we study ...
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
Public-key encryption with keyword search (PEKS) is a versatile tool. It allows a third party knowing the search trapdoor of a keyword to search encrypted documents containing that keyword without decrypting the documents or knowing the keyword. However,...
Comments