skip to main content
10.1145/3508398.3519362acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
poster

MK-RS-PKE: Multi-Keyword Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight Platforms

Authors Info & Claims
Published:15 April 2022Publication History

ABSTRACT

Since more and more data from lightweight platforms like IoT devices or mobile apps are being outsourced to the cloud, the need to ensure privacy while retaining data usability is essential. This paper designs a framework where lightweight platforms like IoT devices can encrypt documents and generate document indexes using the public key before uploading the document to the cloud. An admin can search and retrieve the top-k most relevant documents that match a multi-keyword query using the private key. Most existing searchable encryption that supports IoT returns all the documents matching queried keywords. However, IoT devices can produce massive data, which is not practical for such schemes. We formally name our framework Multi-keyword Ranked Searchable Public-Key Encryption (MK-RS-PKE).

Skip Supplemental Material Section

Supplemental Material

CODASPY22-poster14.mp4

mp4

22.4 MB

References

  1. Abbas Acar, Hidayet Aksu, A Selcuk Uluagac, and Mauro Conti. 2018. A survey on homomorphic encryption schemes: Theory and implementation. ACM Computing Surveys (CSUR) , Vol. 51, 4 (2018), 79.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Biwen Chen, Libing Wu, Neeraj Kumar, Kim-Kwang Raymond Choo, and Debiao He. 2019. Lightweight Searchable Public-key Encryption with Forward Privacy over IIoT Outsourced Data. IEEE Transactions on Emerging Topics in Computing (2019).Google ScholarGoogle Scholar
  3. Biwen Chen, Libing Wu, Huaqun Wang, Lu Zhou, and Debiao He. 2020. A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks. IEEE Transactions on Vehicular Technology , Vol. 69, 6 (2020), 5813--5825.Google ScholarGoogle ScholarCross RefCross Ref
  4. Yinbin Miao, Jianfeng Ma, Ximeng Liu, Jian Weng , Hongwei Li, and Hui Li. 2019. Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing. IEEE Transactions on Services Computing , Vol. 12, 5 (2019), 772--785.Google ScholarGoogle ScholarCross RefCross Ref
  5. Israt Jahan Mouri, Muhammad Ridowan, and Muhammad Abdullah Adnan. 2022. RS-PKE: Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight Platforms. In Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy .Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Ronald L Rivest, Len Adleman, Michael L Dertouzos, et almbox. 1978. On data banks and privacy homomorphisms. Foundations of secure computation , Vol. 4, 11 (1978), 169--180.Google ScholarGoogle Scholar
  7. Emil Stefanov, Charalampos Papamanthou, and Elaine Shi. 2014. Practical Dynamic Searchable Encryption with Small Leakage.. In NDSS, Vol. 71. The Internet Society, Virginia, United States, 72--75.Google ScholarGoogle ScholarCross RefCross Ref
  8. Xiaojun Zhang, Chunxiang Xu, Huaxiong Wang, Yuan Zhang, and Shixiong Wang. 2019 b. FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things. IEEE Transactions on Dependable and Secure Computing (2019).Google ScholarGoogle Scholar
  9. Yuan Zhang, Chunxiang Xu, Jianbing Ni, Hongwei Li, and Xuemin Sherman Shen. 2019 a. Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage. IEEE Transactions on Cloud Computing (2019).Google ScholarGoogle Scholar

Index Terms

  1. MK-RS-PKE: Multi-Keyword Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight Platforms

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            CODASPY '22: Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy
            April 2022
            392 pages
            ISBN:9781450392204
            DOI:10.1145/3508398

            Copyright © 2022 Owner/Author

            Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 15 April 2022

            Check for updates

            Qualifiers

            • poster

            Acceptance Rates

            Overall Acceptance Rate149of789submissions,19%

            Upcoming Conference

            CODASPY '24
          • Article Metrics

            • Downloads (Last 12 months)19
            • Downloads (Last 6 weeks)4

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader