| Literature DB >> 31174350 |
Binrui Zhu1, Willy Susilo2, Jing Qin3,4, Fuchun Guo5, Zhen Zhao6, Jixin Ma7.
Abstract
Wireless sensor networks (WSN) generally utilize cloud computing to store and process sensing data in real time, namely, cloud-assisted WSN. However, the cloud-assisted WSN faces new security challenges, particularly outsourced data confidentiality. Data Encryption is a fundamental approach but it limits target data retrieval in massive encrypted data. Public key encryption with keyword search (PEKS) enables a data receiver to retrieve encrypted data containing some specific keyword in cloud-assisted WSN. However, the traditional PEKS schemes suffer from an inherent problem, namely, the keyword guessing attack (KGA). KGA includes off-line KGA and on-line KGA. To date, the existing literature on PEKS cannot simultaneously resist both off-line KGA and on-line KGA performed by an external adversary and an internal adversary. In this work, we propose a secure and efficient data sharing and searching scheme to address the aforementioned problem such that our scheme is secure against both off-line KGA and on-line KGA performed by external and internal adversaries. We would like to stress that our scheme simultaneously achieves document encryption/decryption and keyword search functions. We also prove our scheme achieves keyword security and document security. Furthermore, our scheme is more efficient than previous schemes by eliminating the pairing computation.Entities:
Keywords: Internet of Things; cloud computing; off-line keyword guessing attack; on-line keyword guessing attack; public key encryption with keyword search; wireless sensor networks
Year: 2019 PMID: 31174350 PMCID: PMC6603739 DOI: 10.3390/s19112583
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Functions of a cloud-assisted WSN.
Figure 2Off-line KGA.
Figure 3On-line KGA.
Figure 4Dual server DSS against KGA model.
Notations.
| Notation | Description |
|---|---|
|
| System parameter |
|
| Public/secret key of the cloud server 1 |
|
| Public/secret key of the cloud server 2 |
|
| Public/secret key of the receiver |
|
| Keyword |
|
| Message |
|
| Encryption algorithm Enc for the data |
|
| Encryption algorithm peks for the keyword |
|
| Message ciphertext |
|
| Searchable ciphertext for keyword |
|
| Double message ciphertext |
|
| Trapdoor for keyword |
|
| The transitional ciphertext |
|
| Adversary |
|
| Challenger or simulator |
|
| Trapdoor oracle for the keyword |
IND-CKA 1.
|
|
|
|
| if |
| else return 0. |
| Oracle |
| return |
IND-CKA 2.
|
|
|
|
| if |
| else return 0. |
| Oracle |
| return |
IND-Trapdoor 1.
|
|
|
|
| if |
| else return 0. |
| Oracle |
| return |
IND-Trapdoor 2.
|
|
|
|
| if |
| else return 0. |
| Oracle |
| return |
IND-Double ciphertext.
|
|
| Then return 1, if |
IND-CKA 3.
|
|
|
|
| if |
| else return 0. |
| Oracle |
| return |
Computation comparison.
| BCOP [ | BSW [ | RPSL [ | Our | |
|---|---|---|---|---|
| MCiph | - | - | - |
|
| KCiph |
|
|
|
|
| ReEnc | - | - | - |
|
| Trapdoor |
|
|
|
|
| Test |
|
|
|
|
| Dec | - | - | - |
|
Security comparison.
| BCOP [ | BSW [ | RPSL [ | Our | |
|---|---|---|---|---|
| Trap Ind | NO | NO | YES | YES |
| MCiph Ind | - | - | - | YES |
| KCiph Ind | YES | YES | YES | YES |
| In-off-line KGA | NO | NO | NO | YES |
| Ex-off-line KGA | NO | NO | YES | YES |
| on-line KGA | NO | NO | NO | YES |
Figure 5Computation cost of keyword ciphertext generation.
Figure 6Computation cost of trapdoor generation.
Figure 7Computation cost of test algorithm.