Skip to main content
Top
Published in: Cluster Computing 2/2020

29-08-2019

Identity-based encryption with authorized equivalence test for cloud-assisted IoT

Authors: Rashad Elhabob, Yanan Zhao, Nabeil Eltayieb, Abdeldime M. S. Abdelgader, Hu Xiong

Published in: Cluster Computing | Issue 2/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The rising popularity of cloud computing is now widely adopted by many industries including resource-restricted data owners, i.e., with the smart sensors in the Internet of things (IoT) to store their data in the cloud. Considering the untrusted nature of cloud server, the data collected by smart sensors should be encrypted before offloading them to the cloud. This unfortunately raises a concern on how to perform search functionality on encrypted data in the cloud. To tackle this challenge, an identity-based encryption scheme with authorized equivalence test (IBE-AET) is proposed in this paper to achieve simultaneously encryption and search functionality over outsourced data in cloud-assisted IoT. In IBE-AET, an authorized cloud server is allowed to carry out the equivalence test of two messages encrypted using the same identity as well as also those messages encrypted in different identities. In addition, the authorization mechanism in IBE-AET is versatile such that it enables a user to delegate the testing capability to the cloud server in a fine-grained manner. In the random oracle model, the proposed IBE-AET is formally proved to be equivalent to the bilinear Diffie–Hellman (BDH) assumption. The practicability of the suggested scheme is demonstrated by both the theoretic analysis and experiment simulation.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Fang, X., Misra, S., Xue, G., Yang, D.: Smart grid the new and improved grid: a survey. IEEE Commun. Surv. Tutor. 14(4), 944–980 (2012)CrossRef Fang, X., Misra, S., Xue, G., Yang, D.: Smart grid the new and improved grid: a survey. IEEE Commun. Surv. Tutor. 14(4), 944–980 (2012)CrossRef
2.
go back to reference Eltayieb, N., Elhabob, R., Hassan, A., Li, F.: An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid. J. Syst. Archit. 98, 165–172 (2019)CrossRef Eltayieb, N., Elhabob, R., Hassan, A., Li, F.: An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid. J. Syst. Archit. 98, 165–172 (2019)CrossRef
3.
go back to reference Galloway, B., Hancke, G.P.: Introduction to industrial control networks. IEEE Commun. Surv. Tutor. 15(2), 860–880 (2013)CrossRef Galloway, B., Hancke, G.P.: Introduction to industrial control networks. IEEE Commun. Surv. Tutor. 15(2), 860–880 (2013)CrossRef
4.
go back to reference Toor, Y., Muhlethaler, P., Laouiti, A., De La Fortelle, A.: Vehicle ad hoc networks: applications and related technical issues. IEEE Commun. Surv. Tutor. 10(3), 74–88 (2008)CrossRef Toor, Y., Muhlethaler, P., Laouiti, A., De La Fortelle, A.: Vehicle ad hoc networks: applications and related technical issues. IEEE Commun. Surv. Tutor. 10(3), 74–88 (2008)CrossRef
5.
go back to reference Zhang, K., Ni, J., Yang, K., Liang, X., Ren, J., Shen, X.S.: Security and privacy in smart city applications: challenges and solutions. IEEE Commun. Mag. 55(1), 122–129 (2017)CrossRef Zhang, K., Ni, J., Yang, K., Liang, X., Ren, J., Shen, X.S.: Security and privacy in smart city applications: challenges and solutions. IEEE Commun. Mag. 55(1), 122–129 (2017)CrossRef
6.
go back to reference Elhabob, R., Sella, I., Zhao, Y., Zhu, G., Xiong, H.: A heterogeneous systems public key encryption with equality test in smart city. In: Proceedings of The 18th International Conference on Electronic Business. ICEB, Guilin(2018) Elhabob, R., Sella, I., Zhao, Y., Zhu, G., Xiong, H.: A heterogeneous systems public key encryption with equality test in smart city. In: Proceedings of The 18th International Conference on Electronic Business. ICEB, Guilin(2018)
7.
go back to reference Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)CrossRef Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)CrossRef
8.
go back to reference Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (iot): a vision, architectural elements, and future directions. Fut. Gener. Comput. Syst. 29(7), 1645–1660 (2013)CrossRef Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (iot): a vision, architectural elements, and future directions. Fut. Gener. Comput. Syst. 29(7), 1645–1660 (2013)CrossRef
9.
go back to reference Xiao, Z., Xiao, Y.: Security and privacy in cloud computing. IEEE Commun. Surv. Tutor. 15(2), 843–859 (2013)CrossRef Xiao, Z., Xiao, Y.: Security and privacy in cloud computing. IEEE Commun. Surv. Tutor. 15(2), 843–859 (2013)CrossRef
11.
go back to reference Truong, H.-L., Dustdar, S.: Principles for engineering IoT cloud systems. IEEE Cloud Comput. 2(2), 68–76 (2015)CrossRef Truong, H.-L., Dustdar, S.: Principles for engineering IoT cloud systems. IEEE Cloud Comput. 2(2), 68–76 (2015)CrossRef
12.
go back to reference Sharma, S., Chang, V., Tim, U.S., Wong, J., Gadia, S.: Cloud and iot-based emerging services systems. Clust. Comput. 22, 71–91 (2019)CrossRef Sharma, S., Chang, V., Tim, U.S., Wong, J., Gadia, S.: Cloud and iot-based emerging services systems. Clust. Comput. 22, 71–91 (2019)CrossRef
13.
go back to reference Zhou, J., Cao, Z., Dong, X., Vasilakos, A.V.: Security and privacy for cloud-based IoT: challenges. IEEE Commun. Mag. 55(1), 26–33 (2017)CrossRef Zhou, J., Cao, Z., Dong, X., Vasilakos, A.V.: Security and privacy for cloud-based IoT: challenges. IEEE Commun. Mag. 55(1), 26–33 (2017)CrossRef
14.
go back to reference Miloslavskaya, N., Tolstoy, A.: Internet of things: information security challenges and solutions. Clust. Comput. 22, 103–119 (2019)CrossRef Miloslavskaya, N., Tolstoy, A.: Internet of things: information security challenges and solutions. Clust. Comput. 22, 103–119 (2019)CrossRef
15.
go back to reference Xiong, H., Zhao, Y., Peng, L., Zhang, H., Yeh, K.-H.: Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. Fut. Gener. Comput. Syst. 97, 453–461 (2019)CrossRef Xiong, H., Zhao, Y., Peng, L., Zhang, H., Yeh, K.-H.: Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. Fut. Gener. Comput. Syst. 97, 453–461 (2019)CrossRef
16.
go back to reference Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506–522. Springer, Berlin (2004) Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506–522. Springer, Berlin (2004)
17.
go back to reference Yang, G., Tan, C.H., Huang, Q., Wong, D.S.: Probabilistic public key encryption with equality test. In Cryptographers Track at the RSA Conference, pp. 119–131. Springer, Berlin (2010) Yang, G., Tan, C.H., Huang, Q., Wong, D.S.: Probabilistic public key encryption with equality test. In Cryptographers Track at the RSA Conference, pp. 119–131. Springer, Berlin (2010)
19.
go back to reference Ma, S., Huang, Q., Zhang, M., Yang, B.: Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans. Inf. Forensics Secur. 10(3), 458–470 (2015)CrossRef Ma, S., Huang, Q., Zhang, M., Yang, B.: Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans. Inf. Forensics Secur. 10(3), 458–470 (2015)CrossRef
21.
go back to reference Shamir, A.: Identity-based cryptosystems and signature schemes. In: Workshop on the Theory and Application of Cryptographic Techniques, pp. 47–53. Springer, Berlin (1984) Shamir, A.: Identity-based cryptosystems and signature schemes. In: Workshop on the Theory and Application of Cryptographic Techniques, pp. 47–53. Springer, Berlin (1984)
22.
go back to reference Li, H., Huang, Q., Ma, S., Shen, J., Susilo, W.: Authorized equality test on identity-based ciphertexts for secret data sharing via cloud storage. IEEE Access 7, 25409–25421 (2019)CrossRef Li, H., Huang, Q., Ma, S., Shen, J., Susilo, W.: Authorized equality test on identity-based ciphertexts for secret data sharing via cloud storage. IEEE Access 7, 25409–25421 (2019)CrossRef
24.
go back to reference Song, Dawn Xiaoding, Wagner, David, Perrig, Adrian: Practical techniques for searches on encrypted data. In: Proceedings 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp. 44–55. IEEE (2000) Song, Dawn Xiaoding, Wagner, David, Perrig, Adrian: Practical techniques for searches on encrypted data. In: Proceedings 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp. 44–55. IEEE (2000)
25.
go back to reference Zhang, J., Mao, J.: Efficient public key encryption with revocable keyword search in cloud computing. Clust. Comput. 19(3), 1211–1217 (2016)CrossRef Zhang, J., Mao, J.: Efficient public key encryption with revocable keyword search in cloud computing. Clust. Comput. 19(3), 1211–1217 (2016)CrossRef
27.
go back to reference Lu, Y., Li, J.: Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems. Clust. Comput. 22, 285–299 (2019)CrossRef Lu, Y., Li, J.: Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems. Clust. Comput. 22, 285–299 (2019)CrossRef
28.
go back to reference Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. J. Cryptol. 21(3), 350–391 (2008)MathSciNetCrossRef Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. J. Cryptol. 21(3), 350–391 (2008)MathSciNetCrossRef
29.
go back to reference Tang, Q.: Towards public key encryption scheme supporting equality test with fine-grained authorization. In: Australasian Conference on Information Security and Privacy, pp. 389–406. Springer, Berlin (2011) Tang, Q.: Towards public key encryption scheme supporting equality test with fine-grained authorization. In: Australasian Conference on Information Security and Privacy, pp. 389–406. Springer, Berlin (2011)
30.
go back to reference Tang, Q.: Public key encryption schemes supporting equality test with authorisation of different granularity. Int. J. Appl. Cryptogr. 2(4), 304–321 (2012)MathSciNetCrossRef Tang, Q.: Public key encryption schemes supporting equality test with authorisation of different granularity. Int. J. Appl. Cryptogr. 2(4), 304–321 (2012)MathSciNetCrossRef
31.
go back to reference Tang, Q.: Public key encryption supporting plaintext equality test and user-specified authorization. Secur. Commun. Netw. 5(12), 1351–1362 (2012)CrossRef Tang, Q.: Public key encryption supporting plaintext equality test and user-specified authorization. Secur. Commun. Netw. 5(12), 1351–1362 (2012)CrossRef
32.
go back to reference Ma, S., Zhang, M., Huang, Q., Yang, B.: Public key encryption with delegated equality test in a multi-user setting. Comput. J. 58(4), 986–1002 (2015)CrossRef Ma, S., Zhang, M., Huang, Q., Yang, B.: Public key encryption with delegated equality test in a multi-user setting. Comput. J. 58(4), 986–1002 (2015)CrossRef
33.
go back to reference Huang, K., Tso, R., Chen, Y.-C., Mizanur, S.M., Rahman, A.A., Alamri, A.: Pke-aet: public key encryption with authorized equality test. Comput. J. 58(10), 2686–2697 (2015)CrossRef Huang, K., Tso, R., Chen, Y.-C., Mizanur, S.M., Rahman, A.A., Alamri, A.: Pke-aet: public key encryption with authorized equality test. Comput. J. 58(10), 2686–2697 (2015)CrossRef
34.
go back to reference Yan, X., Wang, M., Zhong, H., Cui, J., Liu, L., Franqueira, V.N.L.: Verifiable public key encryption scheme with equality test in 5g networks. IEEE Access 5, 12702–12713 (2017)CrossRef Yan, X., Wang, M., Zhong, H., Cui, J., Liu, L., Franqueira, V.N.L.: Verifiable public key encryption scheme with equality test in 5g networks. IEEE Access 5, 12702–12713 (2017)CrossRef
35.
go back to reference Ma, S.: Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 328, 389–402 (2016)CrossRef Ma, S.: Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 328, 389–402 (2016)CrossRef
36.
go back to reference Lee, H.T., Ling, S., Seo, J.H., Wang, H.: Semi-generic construction of public key encryption and identity-based encryption with equality test. Inf. Sci. 373, 419–440 (2016)CrossRef Lee, H.T., Ling, S., Seo, J.H., Wang, H.: Semi-generic construction of public key encryption and identity-based encryption with equality test. Inf. Sci. 373, 419–440 (2016)CrossRef
37.
go back to reference Libing, W., Zhang, Y., Choo, K.-K.R., He, D.: Efficient and secure identity-based encryption scheme with equality test in cloud computing. Fut. Gener. Comput. Syst. 73, 22–31 (2017)CrossRef Libing, W., Zhang, Y., Choo, K.-K.R., He, D.: Efficient and secure identity-based encryption scheme with equality test in cloud computing. Fut. Gener. Comput. Syst. 73, 22–31 (2017)CrossRef
38.
go back to reference Libing, W., Zhang, Y., Choo, K.-K.R., He, D.: Efficient identity-based encryption scheme with equality test in smart city. IEEE Trans. Sustain. Comput. 3(1), 44–55 (2018)CrossRef Libing, W., Zhang, Y., Choo, K.-K.R., He, D.: Efficient identity-based encryption scheme with equality test in smart city. IEEE Trans. Sustain. Comput. 3(1), 44–55 (2018)CrossRef
40.
go back to reference Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Annual International Cryptology Conference, pp. 213–229. Springer, Berlin (2001) Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Annual International Cryptology Conference, pp. 213–229. Springer, Berlin (2001)
Metadata
Title
Identity-based encryption with authorized equivalence test for cloud-assisted IoT
Authors
Rashad Elhabob
Yanan Zhao
Nabeil Eltayieb
Abdeldime M. S. Abdelgader
Hu Xiong
Publication date
29-08-2019
Publisher
Springer US
Published in
Cluster Computing / Issue 2/2020
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-019-02979-1

Other articles of this Issue 2/2020

Cluster Computing 2/2020 Go to the issue

Premium Partner