Abstract
Efficient Cloud-Based Private Set Intersection Protocol with Hidden Access Attribute and Integrity Verification
Highlights
With the rapid progress of the technology of wireless communication and sensor, the Internet of ings (IoT) is changing our lives
From medical devices and air quality monitoring to intelligent street lights, energy-efficient buildings, smart home, and more, the IoT is in more places than ever
To solve the above issue and provide fine-grained access control, in the paper, we proposed an efficient cloud-based private set intersection computation (PSI) protocol. e main contributions in this works are summarized as follows: (i) Fine-grained access control of PSI computation: it provides fine-grained access control for PSI computation in the cloud environment and makes access control over the outsourced dataset of data owners realized by applying attribute-based encryption
Summary
With the rapid progress of the technology of wireless communication and sensor, the Internet of ings (IoT) is changing our lives. Several cloud-based PSI protocols [6, 12, 13] are proposed In these schemes, to achieve PSI computation, the user needs to outsource its dataset to a cloud server. To avoid data owner real-time online and achieve fine-grained access control, Ali et al proposed an attribute-based private set intersection computation protocol [14]. Their scheme cannot ensure the integrity of the returned blinded dataset from the cloud, since when the cloud is not fully trusted, it may return the partial blinded dataset or delete some items of the outsourced dataset.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have