期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
IoT Services:Realizing Private Real-Time Detection via Authenticated Conjunctive Searchable Encryption 被引量:2
1
作者 Chungen Xu Lin Mei +2 位作者 Jinxue Cheng Yu Zhao Cong Zuo 《Journal of Cyber Security》 2021年第1期55-67,共13页
With the rapid development of wireless communication technology,the Internet of Things is playing an increasingly important role in our everyday.The amount of data generated by sensor devices is increasing as a large ... With the rapid development of wireless communication technology,the Internet of Things is playing an increasingly important role in our everyday.The amount of data generated by sensor devices is increasing as a large number of connectable devices are deployed in many fields,including the medical,agricultural,and industrial areas.Uploading data to the cloud solves the problem of data overhead but results in privacy issues.Therefore,the question of how to manage the privacy of uploading data and make it available to be interconnected between devices is a crucial issue.In this paper,we propose a scheme that supports real-time authentication with conjunctive keyword detection(RA-CKD),this scheme can realize the interconnection of encrypted data between devices while ensuring some measure of privacy for both encrypted data and detection tokens.Through authentication technology,connected devices can both authenticate each other’s identity and prevent malicious adversaries from interfering with device interconnection.Finally,we prove that our scheme can resist inside keyword guessing attack through rigorous security reduction.The experiment shows that the efficiency of RA-CKD is good enough to be practical. 展开更多
关键词 searchable encryption conjunctive keyword search Internet of Things AUTHENTICATION
暂未订购
An efficient conjunctive keyword searchable encryption for cloud-based IoT systems
2
作者 Tianqi Peng Bei Gong +4 位作者 Chong Guo Akhtar Badshah Muhammad Waqas Hisham Alasmary Sheng Chen 《Digital Communications and Networks》 2025年第4期1292-1303,共12页
Data privacy leakage has always been a critical concern in cloud-based Internet of Things(IoT)systems.Dynamic Symmetric Searchable Encryption(DSSE)with forward and backward privacy aims to address this issue by enabli... Data privacy leakage has always been a critical concern in cloud-based Internet of Things(IoT)systems.Dynamic Symmetric Searchable Encryption(DSSE)with forward and backward privacy aims to address this issue by enabling updates and retrievals of ciphertext on untrusted cloud server while ensuring data privacy.However,previous research on DSSE mostly focused on single keyword search,which limits its practical application in cloud-based IoT systems.Recently,Patranabis(NDSS 2021)[1]proposed a groundbreaking DSSE scheme for conjunctive keyword search.However,this scheme fails to effectively handle deletion operations in certain circumstances,resulting in inaccurate query results.Additionally,the scheme introduces unnecessary search overhead.To overcome these problems,we present CKSE,an efficient conjunctive keyword DSSE scheme.Our scheme improves the oblivious shared computation protocol used in the scheme of Patranabis,thus enabling a more comprehensive deletion functionality.Furthermore,we introduce a state chain structure to reduce the search overhead.Through security analysis and experimental evaluation,we demonstrate that our CKSE achieves more comprehensive deletion functionality while maintaining comparable search performance and security,compared to the oblivious dynamic cross-tags protocol of Patranabis.The combination of comprehensive functionality,high efficiency,and security makes our CKSE an ideal choice for deployment in cloud-based IoT systems. 展开更多
关键词 Symmetric searchable encryption conjunctive keyword search Forward and backward privacy Cloud server
在线阅读 下载PDF
Efficient verifiable searchable encryption with search and access pattern privacy 被引量:1
3
作者 Axin Wu Dengguo Feng +2 位作者 Min Zhang Jialin Chi Yinghui Zhang 《Security and Safety》 2025年第1期28-48,共21页
Searchable encryption(SE)enables data users to securely search encrypted data stored in untrusted cloud servers.However,most SE schemes allow for leakages of access and search patterns to maximize efficiency and funct... Searchable encryption(SE)enables data users to securely search encrypted data stored in untrusted cloud servers.However,most SE schemes allow for leakages of access and search patterns to maximize efficiency and functionality.Recent attacks have shown that adversaries can recover query keywords with prior knowledge of the database by exploiting these leakages.Unfortunately,the existing schemes that protect access and search patterns result in frequent communications and high computational costs.Furthermore,complex calculation processes also raise challenges for verifying search results.To address these concerns,we first design an efficient conjunctive SE scheme with search and access pattern privacy using private set intersection.In the proposed scheme,we utilize random numbers to obfuscate the values of polynomials and randomly divide the results into two parts,which simplifies the search process,improves search efficiency,and eliminates the need for time-consuming ciphertext multiplication operations.We also extend this scheme to support search result verifiability.Specifically,by embedding a random number as the root of the return polynomial,we achieve verifiability of search results.Furthermore,we prove the security of both schemes employing the simulation-based method.Finally,we implement the schemes in a real database and thorough performance analyses demonstrate their efficiency. 展开更多
关键词 searchable encryption Private set intersection search and access pattern Verifiability conjunctive search
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部