Abstract

With the rapid development of cloud computing and Internet of Things (IoT) technology, it is becoming increasingly popular for source-limited devices to outsource the massive IoT data to the cloud. How to protect data security and user privacy is an important challenge in the cloud-assisted IoT environment. Attribute-based keyword search (ABKS) has been regarded as a promising solution to ensure data confidentiality and fine-grained search control for cloud-assisted IoT. However, due to the fact that multiple users may have the same retrieval permission in ABKS, malicious users may sell their private keys on the Internet without fear of being caught. In addition, most of existing ABKS schemes do not protect the access policy which may contain privacy information. Towards this end, we present a privacy-preserving ABKS that simultaneously supports policy hiding, malicious user traceability, and revocation. Formal security analysis shows that our scheme can not only guarantee the confidentiality of keywords and access policies but also realize the traceability of malicious users. Furthermore, we provide another more efficient construction for public tracing.

Highlights

  • As a prevalent Internet technology, Internet of ings (IoT) [1] has been widely used in various industries, such as smart healthcare, transportation, and city [2,3,4,5]

  • For the smart healthcare system based on cloud-assisted IoT, the data security issue has become a key challenge, due to the fact that the sensitive personal health record (PHR) outsourced in the cloud is vulnerable to hacker attacks

  • In order to support fine-grained search authorization, Zheng et al [14] proposed a CP-Attribute-based keyword search (ABKS) scheme based on Public key encryption with keyword search (PEKS) and CP-Attribute-based encryption (ABE) [21]

Read more

Summary

Introduction

As a prevalent Internet technology, Internet of ings (IoT) [1] has been widely used in various industries, such as smart healthcare, transportation, and city [2,3,4,5]. Public key encryption with keyword search (PEKS) [12, 13] is a more efficient solution, which can realize the retrieval of ciphertext by a cloud server without decryption. As an efficient and flexible solution to meet the above requirements, attribute-based keyword search (ABKS) [14, 15] can realize data confidentiality, ciphertext retrieval, and fine-grained access control simultaneously. The eTR-HABKS scheme achieves two other remarkable properties: (1) no identity table for tracing: the scheme only needs to maintain an identity table for revocation but does not require any identity table for tracing; (2) public traceability: besides the trusted authority, anyone without additional secret information can run the tracing algorithm to capture malicious users. To control the user search permission, our schemes allow the data owner to encrypt the keyword by a specified access policy, which can be expressed as an ANDgates on multivalued attributes. E properties comparison between our schemes with other related works can be seen in Table 1. e symbol “—” means not applicable

Related Work
Background
Problem Formulation
Our TR-HABKS Scheme
Our eTR-HABKS System
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.