TY - JOUR
T1 - File-Centric Multi-Key Aggregate Keyword Searchable Encryption for Industrial Internet of Things
AU - Zhou, Rang
AU - Zhang, Xiaosong
AU - Du, Xiaojiang
AU - Wang, Xiaofen
AU - Yang, Guowu
AU - Guizani, Mohsen
N1 - Publisher Copyright:
© 2005-2012 IEEE.
PY - 2018/8
Y1 - 2018/8
N2 - Cloud storage has been used to reduce the cost and support convenient collaborations for industrial Internet of things (IIoT) data management. When data owners share IIoT data with authorized parties for data interaction, secure cloud data searching and file access control are fundamental security requirements. In this paper, first we discuss a new insider attack to the Cui's multi-key aggregate searchable encryption scheme, where the unauthorized inside users can guess the other users private keys. Then, we propose a novel file-centric multi-key aggregate keyword searchable encryption (Fc-MKA-KSE) system for the IIoT data in the file-centric framework. Specifically, we present two formal security models, namely, the security models of the indistinguishable selective-file chosen keyword attack and the indistinguishable selective-file keyword guessing attack, which can satisfy the security requirements. Our experimental results show that the proposed scheme achieves computational efficiency.
AB - Cloud storage has been used to reduce the cost and support convenient collaborations for industrial Internet of things (IIoT) data management. When data owners share IIoT data with authorized parties for data interaction, secure cloud data searching and file access control are fundamental security requirements. In this paper, first we discuss a new insider attack to the Cui's multi-key aggregate searchable encryption scheme, where the unauthorized inside users can guess the other users private keys. Then, we propose a novel file-centric multi-key aggregate keyword searchable encryption (Fc-MKA-KSE) system for the IIoT data in the file-centric framework. Specifically, we present two formal security models, namely, the security models of the indistinguishable selective-file chosen keyword attack and the indistinguishable selective-file keyword guessing attack, which can satisfy the security requirements. Our experimental results show that the proposed scheme achieves computational efficiency.
KW - Data sharing
KW - industrial Internet of things (IIoT)
KW - searchable encryption
KW - security
KW - trapdoor privacy
UR - http://www.scopus.com/inward/record.url?scp=85041697137&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85041697137&partnerID=8YFLogxK
U2 - 10.1109/TII.2018.2794442
DO - 10.1109/TII.2018.2794442
M3 - Article
AN - SCOPUS:85041697137
SN - 1551-3203
VL - 14
SP - 3648
EP - 3658
JO - IEEE Transactions on Industrial Informatics
JF - IEEE Transactions on Industrial Informatics
IS - 8
M1 - 8260882
ER -