Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 2/2024

11-01-2024

Flexible symmetric predicate encryption for data privacy in IoT environments

Authors: Qingquan Bian, Yue Zhang, Chang Song, Axin Wu

Published in: Peer-to-Peer Networking and Applications | Issue 2/2024

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Internet of Things (IoT) applications are revolutionizing lifestyles and social management. In IoT environments, there is a need to deploy a large number of sensing devices, which are typically resource-constrained, with limited computational power and communication resources. Due to its open nature, IoT applications confront potential security and privacy risks in exchange for convenience, with data privacy being a significant concern. Predicate encryption (PE) offers a promising approach to address this concern. However, most PE schemes are public-key cryptosystems, which are more expensive compared to symmetric cryptography. These costs are burdensome for resource-constrained devices, especially when dealing with massive amounts of data. A recent study by Viet et al. (ESORICS’2022) introduced a symmetric PE scheme. However, this scheme’s representation of attributes and predicates is limited. To overcome this limitation, we propose a flexible symmetric PE scheme. In the proposed scheme, predicates and attributes are represented using vectors. Tokens are related to predicates, while ciphertexts are associated with attributes. The encrypted message can be decrypted when the values of the predicate vector and attribute vector are pairwise unequal. This scheme enables fine-grained access control over encrypted data, ensuring that users with any attribute value in the vector embedded in the ciphertext cannot decrypt it. The security analysis demonstrates that the proposed scheme effectively protects data privacy. Additionally, performance evaluations indicate that the scheme is efficient, providing a lightweight solution for data privacy in IoT environments.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Kumar S, Tiwari P, Zymbler M (2019) Internet of things is a revolutionary approach for future technology enhancement: a review. Journal of Big data 6(1):1–21CrossRef Kumar S, Tiwari P, Zymbler M (2019) Internet of things is a revolutionary approach for future technology enhancement: a review. Journal of Big data 6(1):1–21CrossRef
2.
go back to reference Qadri YA, Nauman A, Zikria YB, Vasilakos AV, Kim SW (2020) The future of healthcare internet of things: a survey of emerging technologies. IEEE Commun Surv Tutorials 22(2):1121–1167CrossRef Qadri YA, Nauman A, Zikria YB, Vasilakos AV, Kim SW (2020) The future of healthcare internet of things: a survey of emerging technologies. IEEE Commun Surv Tutorials 22(2):1121–1167CrossRef
3.
go back to reference Nižetić S, Šolić P, González-de DLDI, Patrono L et al (2020) Internet of things (IoT): Opportunities, issues and challenges towards a smart and sustainable future. J Clean Prod 274:122877CrossRef Nižetić S, Šolić P, González-de DLDI, Patrono L et al (2020) Internet of things (IoT): Opportunities, issues and challenges towards a smart and sustainable future. J Clean Prod 274:122877CrossRef
4.
go back to reference Mahdavinejad MS, Rezvan M, Barekatain M, Adibi P, Barnaghi P, Sheth AP (2018) Machine learning for internet of things data analysis: A survey. Digital Communications and Networks 4(3):161–175CrossRef Mahdavinejad MS, Rezvan M, Barekatain M, Adibi P, Barnaghi P, Sheth AP (2018) Machine learning for internet of things data analysis: A survey. Digital Communications and Networks 4(3):161–175CrossRef
5.
go back to reference Sunhare P, Chowdhary RR, Chattopadhyay MK (2022) Internet of things and data mining: An application oriented survey. Journal of King Saud University-Computer and Information Sciences 34(6):3569–3590CrossRef Sunhare P, Chowdhary RR, Chattopadhyay MK (2022) Internet of things and data mining: An application oriented survey. Journal of King Saud University-Computer and Information Sciences 34(6):3569–3590CrossRef
6.
go back to reference Sun W, Cai Z, Li Y, Liu F, Fang S, Wang G (2018) Security and privacy in the medical internet of things: a review. Security and Communication Networks 2018:1–9 Sun W, Cai Z, Li Y, Liu F, Fang S, Wang G (2018) Security and privacy in the medical internet of things: a review. Security and Communication Networks 2018:1–9
7.
go back to reference Deep S, Zheng X, Jolfaei A, Yu D, Ostovari P, Kashif Bashir A (2022) A survey of security and privacy issues in the internet of things from the layered context. Trans Emerg Telecommun Technol 33(6):3935CrossRef Deep S, Zheng X, Jolfaei A, Yu D, Ostovari P, Kashif Bashir A (2022) A survey of security and privacy issues in the internet of things from the layered context. Trans Emerg Telecommun Technol 33(6):3935CrossRef
8.
go back to reference HaddadPajouh H, Dehghantanha A, Parizi RM, Aledhari M, Karimipour H (2021) A survey on internet of things security: Requirements, challenges, and solutions. Internet of Things 14:100129CrossRef HaddadPajouh H, Dehghantanha A, Parizi RM, Aledhari M, Karimipour H (2021) A survey on internet of things security: Requirements, challenges, and solutions. Internet of Things 14:100129CrossRef
9.
go back to reference Zhang Y, He J, Guo R, Zheng D (2020) Server-aided and verifiable attribute-based signature for industrial internet of things. J Comput Res Dev 57(10):2177 Zhang Y, He J, Guo R, Zheng D (2020) Server-aided and verifiable attribute-based signature for industrial internet of things. J Comput Res Dev 57(10):2177
10.
go back to reference Zhang Y, Deng RH, Xu S, Sun J, Li Q, Zheng D (2020) Attribute-based encryption for cloud computing access control: A survey. ACM Comput Surv 53(4):1–41 Zhang Y, Deng RH, Xu S, Sun J, Li Q, Zheng D (2020) Attribute-based encryption for cloud computing access control: A survey. ACM Comput Surv 53(4):1–41
11.
go back to reference Wu A, Zhang Y, Zheng X, Guo R, Zhao Q, Zheng D (2019) Efficient and privacy-preserving traceable attribute-based encryption in blockchain. Ann Telecommun 74(7):401–411CrossRef Wu A, Zhang Y, Zheng X, Guo R, Zhao Q, Zheng D (2019) Efficient and privacy-preserving traceable attribute-based encryption in blockchain. Ann Telecommun 74(7):401–411CrossRef
12.
go back to reference Sarma R, Kumar C, Barbhuiya FA (2021) PAC-FIT: An efficient privacy preserving access control scheme for fog-enabled IoT. Sustainable Computing: Informatics and Systems 30:100527 Sarma R, Kumar C, Barbhuiya FA (2021) PAC-FIT: An efficient privacy preserving access control scheme for fog-enabled IoT. Sustainable Computing: Informatics and Systems 30:100527
13.
go back to reference Koppula V, Waters B (2019) Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption. In: Annual International Cryptology Conference, pp. 671–700. Springer Koppula V, Waters B (2019) Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption. In: Annual International Cryptology Conference, pp. 671–700. Springer
14.
go back to reference Agrawal S, Yadav A, Yamada S (2022) Multi-input attribute based encryption and predicate encryption. In: Annual International Cryptology Conference, pp. 590–621. Springer Agrawal S, Yadav A, Yamada S (2022) Multi-input attribute based encryption and predicate encryption. In: Annual International Cryptology Conference, pp. 590–621. Springer
15.
go back to reference Zheng D, Wu A, Zhang Y, Zhao Q (2018) Efficient and privacy-preserving medical data sharing in internet of things with limited computing power. IEEE Access 6:28019–28027CrossRef Zheng D, Wu A, Zhang Y, Zhao Q (2018) Efficient and privacy-preserving medical data sharing in internet of things with limited computing power. IEEE Access 6:28019–28027CrossRef
16.
go back to reference Zhang Y, Zheng D, Guo R, Zhao Q (2018) Fine-grained access control systems suitable for resource-constrained users in cloud computing. Computing and Informatics 37(2):327–348CrossRef Zhang Y, Zheng D, Guo R, Zhao Q (2018) Fine-grained access control systems suitable for resource-constrained users in cloud computing. Computing and Informatics 37(2):327–348CrossRef
17.
go back to reference Kim I, Hwang SO, Park JH, Park C (2016) An efficient predicate encryption with constant pairing computations and minimum costs. IEEE Trans Comput 65(10):2947–2958MathSciNetCrossRef Kim I, Hwang SO, Park JH, Park C (2016) An efficient predicate encryption with constant pairing computations and minimum costs. IEEE Trans Comput 65(10):2947–2958MathSciNetCrossRef
19.
go back to reference Viet Xuan Phuong T, Susilo W, Yang G, Kim J, Chow YW, Liu D (2021) Sylpeniot: Symmetric lightweight predicate encryption for data privacy applications in iot environments. In: European Symposium on Research in Computer Security, pp. 106–126. Springer Viet Xuan Phuong T, Susilo W, Yang G, Kim J, Chow YW, Liu D (2021) Sylpeniot: Symmetric lightweight predicate encryption for data privacy applications in iot environments. In: European Symposium on Research in Computer Security, pp. 106–126. Springer
20.
go back to reference Chen Z, Zuo X, Dong N, Hou B (2022) Application of network security penetration technology in power internet of things security vulnerability detection. Trans Emerg Telecommun Technol 33(2):3859CrossRef Chen Z, Zuo X, Dong N, Hou B (2022) Application of network security penetration technology in power internet of things security vulnerability detection. Trans Emerg Telecommun Technol 33(2):3859CrossRef
21.
go back to reference Wu H, Wang W (2018) A game theory based collaborative security detection method for internet of things systems. IEEE Trans Inf Forensics Secur 13(6):1432–1445CrossRef Wu H, Wang W (2018) A game theory based collaborative security detection method for internet of things systems. IEEE Trans Inf Forensics Secur 13(6):1432–1445CrossRef
22.
go back to reference Sarma R, Barbhuiya FA (2022) A secure and efficient access control scheme with attribute revocation and merging capabilities for fog-enabled iot. Comput Electr Eng 104:108449CrossRef Sarma R, Barbhuiya FA (2022) A secure and efficient access control scheme with attribute revocation and merging capabilities for fog-enabled iot. Comput Electr Eng 104:108449CrossRef
23.
go back to reference Yang A, Weng J, Yang K, Huang C, Shen X (2020) Delegating authentication to edge: A decentralized authentication architecture for vehicular networks. IEEE Trans Intell Transp Syst 23(2):1284–1298CrossRef Yang A, Weng J, Yang K, Huang C, Shen X (2020) Delegating authentication to edge: A decentralized authentication architecture for vehicular networks. IEEE Trans Intell Transp Syst 23(2):1284–1298CrossRef
24.
go back to reference Sarma R, Kumar C, Barbhuiya FA (2020) ACS-FIT: A secure and efficient access control scheme for fog-enabled iot. In: 2020 IEEE International Conference on Systems, Man, and Cybernetics, pp. 2782–2789. IEEE Sarma R, Kumar C, Barbhuiya FA (2020) ACS-FIT: A secure and efficient access control scheme for fog-enabled iot. In: 2020 IEEE International Conference on Systems, Man, and Cybernetics, pp. 2782–2789. IEEE
25.
go back to reference Katz J, Sahai A, Waters B (2008) Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 146–162. Springer Katz J, Sahai A, Waters B (2008) Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 146–162. Springer
26.
go back to reference Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Annual International Cryptology Conference, pp. 213–229. Springer Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Annual International Cryptology Conference, pp. 213–229. Springer
27.
go back to reference Gentry C (2006) Practical identity-based encryption without random oracles. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 445–464. Springer Gentry C (2006) Practical identity-based encryption without random oracles. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 445–464. Springer
28.
go back to reference Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457–473. Springer Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457–473. Springer
29.
go back to reference Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy, pp. 321–334. IEEE Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy, pp. 321–334. IEEE
30.
go back to reference Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Theory of Cryptography Conference, pp. 535–554. Springer Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Theory of Cryptography Conference, pp. 535–554. Springer
31.
go back to reference Shahzad K, Zia T, Qazi EUH (2022) A review of functional encryption in IoT applications. Sensors 22(19):7567CrossRef Shahzad K, Zia T, Qazi EUH (2022) A review of functional encryption in IoT applications. Sensors 22(19):7567CrossRef
32.
go back to reference Okamoto T, Takashima K (2009) Hierarchical predicate encryption for inner-products. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 214–231. Springer Okamoto T, Takashima K (2009) Hierarchical predicate encryption for inner-products. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 214–231. Springer
33.
go back to reference Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 62–91. Springer Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 62–91. Springer
34.
go back to reference Katsumata S, Nishimaki R, Yamada S, Yamakawa T (2020) Adaptively secure inner product encryption from lwe. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 375–404. Springer Katsumata S, Nishimaki R, Yamada S, Yamakawa T (2020) Adaptively secure inner product encryption from lwe. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 375–404. Springer
35.
go back to reference Agrawal S, Libert B, Maitra M, Titiu R (2020) Adaptive simulation security for inner product functional encryption. In: IACR International Conference on Public-Key Cryptography, pp. 34–64. Springer Agrawal S, Libert B, Maitra M, Titiu R (2020) Adaptive simulation security for inner product functional encryption. In: IACR International Conference on Public-Key Cryptography, pp. 34–64. Springer
36.
go back to reference Shen E, Shi E, Waters B (2009) Predicate privacy in encryption systems. In: Theory of Cryptography Conference, pp. 457–473. Springer Shen E, Shi E, Waters B (2009) Predicate privacy in encryption systems. In: Theory of Cryptography Conference, pp. 457–473. Springer
37.
go back to reference Yoshino M, Kunihiro N, Naganuma K, Sato H (2012) Symmetric inner-product predicate encryption based on three groups. In: International Conference on Provable Security, pp. 215–234. Springer Yoshino M, Kunihiro N, Naganuma K, Sato H (2012) Symmetric inner-product predicate encryption based on three groups. In: International Conference on Provable Security, pp. 215–234. Springer
38.
go back to reference Sarma R, Barbhuiya FA (2021) MOFIT: An efficient access control scheme with attribute merging and outsourcing capability for fog-enhanced iot. In: International Conference on Parallel and Distributed Computing: Applications and Technologies, pp. 523–535. Springer Sarma R, Barbhuiya FA (2021) MOFIT: An efficient access control scheme with attribute merging and outsourcing capability for fog-enhanced iot. In: International Conference on Parallel and Distributed Computing: Applications and Technologies, pp. 523–535. Springer
Metadata
Title
Flexible symmetric predicate encryption for data privacy in IoT environments
Authors
Qingquan Bian
Yue Zhang
Chang Song
Axin Wu
Publication date
11-01-2024
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 2/2024
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01619-1

Other articles of this Issue 2/2024

Peer-to-Peer Networking and Applications 2/2024 Go to the issue

Premium Partner