4.8 Article

Lightweight Searchable Encryption Protocol for Industrial Internet of Things

Journal

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Volume 17, Issue 6, Pages 4248-4259

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2020.3014168

Keywords

Encryption; Servers; Access control; Internet of Things; Cloud computing; Attribute based encryption; industrial internet of things; multiauthority; multikeyword search

Funding

  1. Sichuan Science and Technology Program [2019YFG0405]
  2. Natural Science Foundation of China [U1833122]
  3. Macao Science and Technology Development Fund [0026/2018/A1]
  4. Deanship of Scientific Research at King Saud University [RG-1435-051]

Ask authors/readers for more resources

The article presents a lightweight searchable attribute-based encryption scheme (LSABE) suitable for resource-constrained IoT devices, which can reduce computing costs and support multi-keyword searching. Additionally, it is extended to multi-authority scenarios to efficiently handle the generation and management of public/secret keys.
Industrial Internet of Things (IoT) has suffered from insufficient identity authentication and dynamic network topology, thereby resulting in vulnerabilities to data confidentiality. Recently, the attribute-based encryption (ABE) schemes have been regarded as a solution to ensure data transmission security and the fine-grained sharing of encrypted IoT data. However, most of existing ABE schemes that bring tremendous computational cost are not suitable for resource-constrained IoT devices. Therefore, lightweight and efficient data sharing and searching schemes suitable for IoT applications are of great importance. To this end, In this article, we propose a light searchable ABE scheme (namely LSABE). Our scheme can significantly reduce the computing cost of IoT devices with the provision of multiple-keyword searching for data users. Meanwhile, we extend the LSABE scheme to multiauthority scenarios so as to effectively generate and manage the public/secret keys in the distributed IoT environment. Finally, the experimental results demonstrate that our schemes can significantly maintain computational efficiency and save the computational cost at IoT devices, compared to other existing schemes.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available