4.8 Article

Pairing-Free Certificate-Based Searchable Encryption Supporting Privacy-Preserving Keyword Search Function for IIoTs

Journal

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Volume 17, Issue 4, Pages 2696-2706

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2020.3006474

Keywords

Bilinear pairing; certificate-based encryption; cloud computing; industrial IoT (IIoT); keyword search; privacy

Funding

  1. Foundation of China [61772009, 61972095, U1736112]
  2. Natural Science Foundation of Jiangsu Province [BK20181304]

Ask authors/readers for more resources

Industrial IoT (IIoT) is an practical application of the Internet of Things (IoT) in modern industry that accelerates industrial development. The recent certificate-based encryption with keyword search (CBEKS) scheme aims to address data privacy protection in the cloud, showing advantages in computation performance and security against keyword guessing attacks.
As a practical application of the Internet of Things (IoT) in the modern industry, industrial IoT (IIoT) enables industrial enterprises to accelerate the development. Nowadays, the cloud computing technology has been applied to data storage and processing in IIoTs, but how to protect data privacy in the cloud has become a challenge and technical issue. Recently, the certificate-based encryption with keyword search (CBEKS) was presented to handle the cloud ciphertext retrieval. By CBEKS, one can get back all desired ciphertexts from the cloud without decrypting the ciphertexts or leaking the search keywords. However, the existing CBEKS scheme uses the computationally expensive bilinear pairing, which is disgusted by the performance-limited IIoT smart devices. In this article, a pairing-free and privacy-preserving CBEKS scheme is developed. The experimental results show that it has an obvious advantage in the computation performance when compared with the pairing-based CBEKS scheme. In addition, our security proofs indicate that it is secure against keyword guessing attacks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available