Lightweight Searchable Encryption Protocol for Industrial Internet of Things | IEEE Journals & Magazine | IEEE Xplore

Lightweight Searchable Encryption Protocol for Industrial Internet of Things


Abstract:

Industrial Internet of Things (IoT) has suffered from insufficient identity authentication and dynamic network topology, thereby resulting in vulnerabilities to data conf...Show More

Abstract:

Industrial Internet of Things (IoT) has suffered from insufficient identity authentication and dynamic network topology, thereby resulting in vulnerabilities to data confidentiality. Recently, the attribute-based encryption (ABE) schemes have been regarded as a solution to ensure data transmission security and the fine-grained sharing of encrypted IoT data. However, most of existing ABE schemes that bring tremendous computational cost are not suitable for resource-constrained IoT devices. Therefore, lightweight and efficient data sharing and searching schemes suitable for IoT applications are of great importance. To this end, In this article, we propose a light searchable ABE scheme (namely LSABE). Our scheme can significantly reduce the computing cost of IoT devices with the provision of multiple-keyword searching for data users. Meanwhile, we extend the LSABE scheme to multiauthority scenarios so as to effectively generate and manage the public/secret keys in the distributed IoT environment. Finally, the experimental results demonstrate that our schemes can significantly maintain computational efficiency and save the computational cost at IoT devices, compared to other existing schemes.
Published in: IEEE Transactions on Industrial Informatics ( Volume: 17, Issue: 6, June 2021)
Page(s): 4248 - 4259
Date of Publication: 04 August 2020

ISSN Information:

Funding Agency:

References is not available for this document.

I. Introduction

Industrial Internet of Things (IoT) is a new paradigm reshaping modern industries via connecting various devices with IoT gateways, access points, and base stations, consequently achieving ubiquitous data acquisition and sharing across the diverse industrial sectors. The widespread employment of IoT nodes bring an enormous amount of data. The analytics on massive IoT data can further drive the developments of fault detection, disaster forecasting, service improvement, and intelligent decision making.

Select All
1.
M. Usman, A. Jolfaei and M. A. Jan, "RaSEC: An intelligent framework for reliable and secure multi-level edge computing in industrial environments", IEEE Trans. Ind. Appl., vol. 56, no. 4, pp. 4543-4551, Jul./Aug. 2020.
2.
F. Farivar, M. S. Haghighi, A. Jolfaei and M. Alazab, "Artificial intelligence for detection estimation and compensation of malicious attacks in nonlinear cyber-physical systems and industrial IoT", IEEE Trans. Ind. Informat., vol. 16, no. 4, pp. 2716-2725, Apr. 2020.
3.
S. Ghane, A. Jolfaei, L. Kulik, K. Ramamohanarao and D. Puthal, "Preserving privacy in the internet of connected vehicles", IEEE Trans. Intell. Transp. Syst..
4.
M. Usman, M. A. Jan, X. He and J. Chen, "P2DCA: A privacy-preserving-based data collection and analysis framework for IoMT applications", IEEE J. Sel. Areas Commun., vol. 37, no. 6, pp. 1222-1230, Jun. 2019.
5.
A. Jolfaei and K. Kant, "Privacy and security of connected vehicles in intelligent transportation system", Proc. 49th Annu. IEEE/IFIP Int. Conf. Dependable Syst. Netw. Suppl. Vol., pp. 9-10, Jun. 2019.
6.
M. Green, S. Hohenberger and B. Waters, "Outsourcing the decryption of ABE ciphertexts", Proc. 20th USENIX Conf. Secur., vol. 2011, no. 3, pp. 34-50, 2011.
7.
Y. Yang, X. Liu, X. Zheng, C. Rong and W. Guo, "Efficient traceable authorization search system for secure cloud storage", IEEE Trans. Cloud Comput..
8.
S. Tan, K. Yeow and S. O. Hwang, "Enhancement of a lightweight attribute-based encryption scheme for the Internet of Things", IEEE Internet Things J., vol. 6, no. 4, pp. 6384-6395, Aug. 2019.
9.
J. Sun, H. Xiong, X. Liu, Y. Zhang, X. Nie and R. H. Deng, "Lightweight and privacy-aware fine-grained access control for IoT-oriented smart health", IEEE Internet Things J., vol. 7, no. 7, pp. 6566-6575, Jul. 2020.
10.
Y. Miao, J. Ma, X. Liu, X. Li, Z. Liu and H. Li, "Practical attribute-based multi-keyword search scheme in mobile crowdsourcing", IEEE Internet Things J., vol. 5, no. 4, pp. 3008-3018, Aug. 2018.
11.
Y. Miao et al., "Hybrid keyword-field search with efficient key management for industrial Internet of Things", IEEE Trans. Ind. Informat., vol. 15, no. 6, pp. 3206-3217, Jun. 2019.
12.
J. Li, W. Yao, Y. Zhang, H. Qian and J. Han, "Flexible and fine-grained attribute-based data storage in cloud computing", IEEE Trans. Services Comput., vol. 10, no. 5, pp. 785-796, Sep. 2017.
13.
J. Wei, W. Liu and X. Hu, "Secure and efficient attribute-based access control for multiauthority cloud storage", IEEE Syst. J., vol. 12, no. 2, pp. 1731-1742, Jun. 2018.
14.
K. Sowjanya, M. Dasgupta, S. Ray and M. S. Obaidat, "An efficient elliptic curve cryptography-based without pairing KPABE for Internet of Things", IEEE Syst. J., vol. 14, no. 2, pp. 2154-2163, Jun. 2020.
15.
J. Cui, H. Zhou, H. Zhong and Y. Xu, "AKSER: Attribute-based keyword search with efficient revocation in cloud computing", Inf. Sci., vol. 423, pp. 343-352, Jan. 2018.
16.
R. Amin, N. Kumar, G. Biswas, R. Iqbal and V. Chang, "A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment", Future Gener. Comput. Syst., vol. 78, pp. 1005-1019, 2018.
17.
J. Bethencourt, A. Sahai and B. Waters, "Ciphertext-policy attribute-based encryption", Proc. IEEE Symp. Secur. Privacy, pp. 321-334, May 2007.
18.
X. Yao, Z. Chen and Y. Tian, "A lightweight attribute-based encryption scheme for the Internet of Things", Future Gener. Comput. Syst., vol. 49, pp. 104-112, 2015.
19.
D. Boneh, G. Di Crescenzo, R. Ostrovsky and G. Persiano, "Public key encryption with keyword search" in Advances in Cryptology—EUROCRYPT, Berlin, Germany:Springer, pp. 506-522, 2004.
20.
J. Li and L. Zhang, "Attribute-based keyword search and data access control in cloud", Proc. 10th Int. Conf. Comput. Intell. Secur., pp. 382-386, 2014.
21.
K. Liang and W. Susilo, "Searchable attribute-based mechanism with efficient data sharing for secure cloud storage", IEEE Trans. Inf. Forensics Secur., vol. 10, no. 9, pp. 1981-1992, Sep. 2015.
22.
J. Sun, L. Ren, S. Wang and X. Yao, "Multi-keyword searchable and data verifiable attribute-based encryption scheme for cloud storage", IEEE Access, vol. 7, pp. 66655-66667, 2019.
23.
Y. Wang, T. L. Nguyen, Y. Xu, Z. Li, Q. Tran and R. Caire, "Cyber-physical design and implementation of distributed event-triggered secondary control in islanded microgrids", IEEE Trans. Ind. Appl., vol. 55, no. 6, pp. 5631-5642, Nov./Dec. 2019.
24.
P. Pace, G. Aloi, R. Gravina, G. Caliciuri, G. Fortino and A. Liotta, "An edge-based architecture to support efficient applications for healthcare Industry 4.0", IEEE Trans. Ind. Informat., vol. 15, no. 1, pp. 481-489, Jan. 2019.
25.
W. Sun, S. Yu, W. Lou, Y. T. Hou and H. Li, "Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud", IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 4, pp. 1187-1198, Apr. 2016.
26.
Y. Miao, J. Ma, X. Liu, X. Li, Q. Jiang and J. Zhang, "Attribute-based keyword search over hierarchical data in cloud computing", IEEE Trans. Services Comput..
27.
Q. Zheng, S. Xu and G. Ateniese, "VABKS: Verifiable attribute-based keyword search over outsourced encrypted data", Proc. IEEE Conf. Comput. Commun., pp. 522-530, 2014.
28.
S. Hohenberger and B. Waters, "Online/offline attribute-based encryption", Proc. Int. Workshop Public Key Cryptography, pp. 293-310, 2014.
29.
Y. Miao, R. Deng, K.-K. R. Choo, X. Liu, J. Ning and H. Li, "Optimized verifiable fine-grained keyword search in dynamic multi-owner settings", IEEE Trans. Dependable Secure Comput..
30.
J. Ning, X. Dong, Z. Cao, L. Wei and X. Lin, "White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes", IEEE Trans. Inf. Forensics Secur., vol. 10, no. 6, pp. 1274-1288, Jun. 2015.

Contact IEEE to Subscribe

References

References is not available for this document.