4.7 Article

Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing

期刊

IEEE TRANSACTIONS ON SERVICES COMPUTING
卷 12, 期 5, 页码 772-785

出版社

IEEE COMPUTER SOC
DOI: 10.1109/TSC.2018.2823309

关键词

Keyword search; Cloud computing; Edge computing; Access control; Encryption; Fog computing; attribute-based encryption; searchable encryption; conjunctive keyword search; attribute update

资金

  1. National Natural Science Foundation of China [61702404, 61702105, 61672413, 61472310]
  2. China Postdoctoral Science Foundation [2017M613080]
  3. Fundamental Research Funds for the Central Universities [JB171504]
  4. National High Technology Research and Development Program (863 Program) [2015AA016007]
  5. 111 project [B16037]
  6. NSFC [U1405255]
  7. Shaanxi Science & Technology Coordination & Innovation Project [2016TZC-G-6-3]

向作者/读者索取更多资源

Fog computing, as an extension of cloud computing, outsources the encrypted sensitive data to multiple fog nodes on the edge of Internet of Things (IoT) to decrease latency and network congestion. However, the existing ciphertext retrieval schemes rarely focus on the fog computing environment and most of them still impose high computational and storage overhead on resource-limited end users. In this paper, we first present a Lightweight Fine-Grained ciphertexts Search (LFGS) system in fog computing by extending Ciphertext-Policy Attribute-Based Encryption (CP-ABE) and Searchable Encryption (SE) technologies, which can achieve fine-grained access control and keyword search simultaneously. The LFGS can shift partial computational and storage overhead from end users to chosen fog nodes. Furthermore, the basic LFGS system is improved to support conjunctive keyword search and attribute update to avoid returning irrelevant search results and illegal accesses. The formal security analysis shows that the LFGS system can resist Chosen-Keyword Attack (CKA) and Chosen-Plaintext Attack (CPA), and the simulation using a real-world dataset demonstrates that the LFGS system is efficient and feasible in practice.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据