Abstract

Efficient Cloud-Based Private Set Intersection Protocol with Hidden Access Attribute and Integrity Verification

Highlights

  • With the rapid progress of the technology of wireless communication and sensor, the Internet of ings (IoT) is changing our lives

  • From medical devices and air quality monitoring to intelligent street lights, energy-efficient buildings, smart home, and more, the IoT is in more places than ever

  • To solve the above issue and provide fine-grained access control, in the paper, we proposed an efficient cloud-based private set intersection computation (PSI) protocol. e main contributions in this works are summarized as follows: (i) Fine-grained access control of PSI computation: it provides fine-grained access control for PSI computation in the cloud environment and makes access control over the outsourced dataset of data owners realized by applying attribute-based encryption

Read more

Summary

Introduction

With the rapid progress of the technology of wireless communication and sensor, the Internet of ings (IoT) is changing our lives. Several cloud-based PSI protocols [6, 12, 13] are proposed In these schemes, to achieve PSI computation, the user needs to outsource its dataset to a cloud server. To avoid data owner real-time online and achieve fine-grained access control, Ali et al proposed an attribute-based private set intersection computation protocol [14]. Their scheme cannot ensure the integrity of the returned blinded dataset from the cloud, since when the cloud is not fully trusted, it may return the partial blinded dataset or delete some items of the outsourced dataset.

Related Work
Preliminaries
Problem Formulation
Oi defines an access policy and blinds Xi under it
Our Concrete Construction
Security Analysis
Performance Analysis
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call