Skip to main content
Erschienen in: Wireless Personal Communications 1/2020

29.01.2020

PKE-ET-HS: Public Key Encryption with Equality Test for Heterogeneous Systems in IoT

verfasst von: Rashad Elhabob, Yanan Zhao, Alzubair Hassan, Hu Xiong

Erschienen in: Wireless Personal Communications | Ausgabe 1/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the continuous development of the Internet of Things (IoT), a growing number of users choose to store the data collected from their smart devices on a cloud server for saving costs. However, the security and privacy issues that accompany the cloud-assisted IoT are also becoming increasingly apparent. Considering the untrusted nature of the cloud server, the data accumulated by the smart sensor must be encrypted before outsourcing to the cloud server. Nevertheless, the above mechanism raises another serious problem. For users of another public key cryptosystem, it is impractical to download all the data stored in the cloud to find the data he needs. To solve this problem, we first, proposed a public key encryption with equality test for heterogeneous systems (PKE-ET-HS) which combines the ideas of identity-based encryption with outsourced equality test and public key encryption with equality test. This scheme allows the authorized cloud server to retrieve whether two encryptions encrypted in a heterogeneous system contain equivalent messages. In addition, in the random oracle, the security of the proposed scheme has been given under the bilinear Diffie–Hellman assumption and the computational Diffie–Hellman assumption. Finally, storage size, computation complexity, and properties are compared with other related works. The results show that the PKE-ET-HS scheme proposed in this paper has a good performance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Harbi, Y., Aliouat, Z., Harous, S., Bentaleb, A., & Refoufi, A. (2019). A review of security in internet of things. Wireless Personal Communications, 108(1), 325–344.CrossRef Harbi, Y., Aliouat, Z., Harous, S., Bentaleb, A., & Refoufi, A. (2019). A review of security in internet of things. Wireless Personal Communications, 108(1), 325–344.CrossRef
2.
Zurück zum Zitat Xiong, H., Mei, Q., Zhao, Y., Peng, L., & Zhang, H. (2019). Scalable and forward secure network attestation with privacy-preserving in cloud-assisted internet of things. IEEE Sensors Journal, 19, 8317–8331.CrossRef Xiong, H., Mei, Q., Zhao, Y., Peng, L., & Zhang, H. (2019). Scalable and forward secure network attestation with privacy-preserving in cloud-assisted internet of things. IEEE Sensors Journal, 19, 8317–8331.CrossRef
3.
Zurück zum Zitat Prasad, R., & Reichert, F. (2011). Special issue on internet of things and future applications. Wireless Personal Communications, 61(3), 491–493.CrossRef Prasad, R., & Reichert, F. (2011). Special issue on internet of things and future applications. Wireless Personal Communications, 61(3), 491–493.CrossRef
4.
Zurück zum Zitat Xiong, H., Bao, Y., Nie, X., & Assor, Y. I. (2019). Server-aided attribute-based signature supporting expressive access structures for industrial internet of things. IEEE Transactions on Industrial Informatics, 16, 1013–1023.CrossRef Xiong, H., Bao, Y., Nie, X., & Assor, Y. I. (2019). Server-aided attribute-based signature supporting expressive access structures for industrial internet of things. IEEE Transactions on Industrial Informatics, 16, 1013–1023.CrossRef
5.
Zurück zum Zitat Tang, J., Dong, T., Li, L., & Shao, L. (2018). Intelligent monitoring system based on internet of things. Wireless Personal Communications, 102(2), 1521–1537.CrossRef Tang, J., Dong, T., Li, L., & Shao, L. (2018). Intelligent monitoring system based on internet of things. Wireless Personal Communications, 102(2), 1521–1537.CrossRef
6.
Zurück zum Zitat Xiong, H., Mei, Q., & Zhao, Y. (2019). Efficient and provably secure certificateless parallel key-insulated signature without pairing for IIoT environments. IEEE Systems Journal, 1–11. Xiong, H., Mei, Q., & Zhao, Y. (2019). Efficient and provably secure certificateless parallel key-insulated signature without pairing for IIoT environments. IEEE Systems Journal, 1–11.
7.
Zurück zum Zitat Eltayieb, N., Wang, P., Hassan, A., Elhabob, R., & Li, F. (2019). ASDS: Attribute-based secure data sharing scheme for reliable cloud environment. Security and Privacy, 2(2), e57.CrossRef Eltayieb, N., Wang, P., Hassan, A., Elhabob, R., & Li, F. (2019). ASDS: Attribute-based secure data sharing scheme for reliable cloud environment. Security and Privacy, 2(2), e57.CrossRef
9.
Zurück zum Zitat Truong, H.-L., & Dustdar, S. (2015). Principles for engineering IoT cloud systems. IEEE Cloud Computing, 2(2), 68–76.CrossRef Truong, H.-L., & Dustdar, S. (2015). Principles for engineering IoT cloud systems. IEEE Cloud Computing, 2(2), 68–76.CrossRef
10.
Zurück zum Zitat Pitchai, R., Jayashri, S., & Raja, J. (2016). Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing. Wireless Personal Communications, 90(2), 947–960.CrossRef Pitchai, R., Jayashri, S., & Raja, J. (2016). Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing. Wireless Personal Communications, 90(2), 947–960.CrossRef
11.
Zurück zum Zitat Eltayieb, N., Elhabob, R., Hassan, A., & Li, F. (2020). A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud. Journal of Systems Architecture, 102, 101653.CrossRef Eltayieb, N., Elhabob, R., Hassan, A., & Li, F. (2020). A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud. Journal of Systems Architecture, 102, 101653.CrossRef
12.
Zurück zum Zitat Mei, Q., Zhao, Y., & Xiong, H. (2019). A new provably secure certificateless signature with revocation in the standard model. Informatica, 30(4), 711–728.CrossRef Mei, Q., Zhao, Y., & Xiong, H. (2019). A new provably secure certificateless signature with revocation in the standard model. Informatica, 30(4), 711–728.CrossRef
13.
Zurück zum Zitat Sadeghi, A.-R., Wachsmann, C., & Waidner, M. (2015). Security and privacy challenges in industrial internet of things. In Proceedings of the 52nd annual design automation conference (p 54). ACM. Sadeghi, A.-R., Wachsmann, C., & Waidner, M. (2015). Security and privacy challenges in industrial internet of things. In Proceedings of the 52nd annual design automation conference (p 54). ACM.
14.
Zurück zum Zitat Elhabob, R., Zhao, Y., Sella, I., & Xiong, H. (2019). Efficient certificateless public key cryptography with equality test for internet of vehicles. IEEE Access, 7, 68957–68969.CrossRef Elhabob, R., Zhao, Y., Sella, I., & Xiong, H. (2019). Efficient certificateless public key cryptography with equality test for internet of vehicles. IEEE Access, 7, 68957–68969.CrossRef
15.
Zurück zum Zitat Xiong, H., Zhao, Y., Peng, L., Zhang, H., & Yeh, K.-H. (2019). Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. Future Generation Computer Systems, 97, 453–461.CrossRef Xiong, H., Zhao, Y., Peng, L., Zhang, H., & Yeh, K.-H. (2019). Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. Future Generation Computer Systems, 97, 453–461.CrossRef
16.
Zurück zum Zitat Zhou, J., Cao, Z., Dong, X., & Vasilakos, A. V. (2017). Security and privacy for cloud-based IoT: Challenges. IEEE Communications Magazine, 55(1), 26–33.CrossRef Zhou, J., Cao, Z., Dong, X., & Vasilakos, A. V. (2017). Security and privacy for cloud-based IoT: Challenges. IEEE Communications Magazine, 55(1), 26–33.CrossRef
17.
Zurück zum Zitat Esposito, C., Castiglione, A., Martini, B., & Choo, K.-K. R. (2016). Cloud manufacturing: Security, privacy, and forensic concerns. IEEE Cloud Computing, 3(4), 16–22.CrossRef Esposito, C., Castiglione, A., Martini, B., & Choo, K.-K. R. (2016). Cloud manufacturing: Security, privacy, and forensic concerns. IEEE Cloud Computing, 3(4), 16–22.CrossRef
18.
Zurück zum Zitat Eltayieb, N., Elhabob, R., Hassan, A., & Li, F. (2019). An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid. Journal of Systems Architecture, 98, 165–172.CrossRef Eltayieb, N., Elhabob, R., Hassan, A., & Li, F. (2019). An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid. Journal of Systems Architecture, 98, 165–172.CrossRef
19.
Zurück zum Zitat Aziz, A., & Singh, K. (2019). Lightweight security scheme for internet of things. Wireless Personal Communications, 104(2), 577–593.CrossRef Aziz, A., & Singh, K. (2019). Lightweight security scheme for internet of things. Wireless Personal Communications, 104(2), 577–593.CrossRef
20.
Zurück zum Zitat Elhabob, R., Zhao, Y., Sella, I., & Xiong, H. (2019). Public key encryption with equality test for heterogeneous systems in cloud computing. KSII Transactions on Internet and Information Systems (TIIS), 13(9), 4742–4770. Elhabob, R., Zhao, Y., Sella, I., & Xiong, H. (2019). Public key encryption with equality test for heterogeneous systems in cloud computing. KSII Transactions on Internet and Information Systems (TIIS), 13(9), 4742–4770.
21.
Zurück zum Zitat Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In International conference on the theory and applications of cryptographic techniques, (pp 506–522). Springer. Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In International conference on the theory and applications of cryptographic techniques, (pp 506–522). Springer.
22.
Zurück zum Zitat Yang, G., Tan, C. H., Huang, Q., & Wong, D. S. (2010). Probabilistic public key encryption with equality test. In Cryptographers track at the RSA conference, (pp 119–131). Springer. Yang, G., Tan, C. H., Huang, Q., & Wong, D. S. (2010). Probabilistic public key encryption with equality test. In Cryptographers track at the RSA conference, (pp 119–131). Springer.
23.
Zurück zum Zitat Tang, Q. (2012). Public key encryption schemes supporting equality test with authorisation of different granularity. International Journal of Applied Cryptography, 2(4), 304–321.MathSciNetCrossRef Tang, Q. (2012). Public key encryption schemes supporting equality test with authorisation of different granularity. International Journal of Applied Cryptography, 2(4), 304–321.MathSciNetCrossRef
24.
Zurück zum Zitat Huang, K., Tso, R., Chen, Y.-C., Rahman, S. M. M., Almogren, A., & Alamri, A. (2015). Pke-aet: Public key encryption with authorized equality test. The Computer Journal, 58, 2686–2697.CrossRef Huang, K., Tso, R., Chen, Y.-C., Rahman, S. M. M., Almogren, A., & Alamri, A. (2015). Pke-aet: Public key encryption with authorized equality test. The Computer Journal, 58, 2686–2697.CrossRef
25.
Zurück zum Zitat Lee, H. T., Ling, S., Seo, J. H., & Wang, H. (2016). Cca2 attack and modification of Huang et al.’s public key encryption with authorized equality test. The Computer Journal, 59(11), 1689–1694.MathSciNetCrossRef Lee, H. T., Ling, S., Seo, J. H., & Wang, H. (2016). Cca2 attack and modification of Huang et al.’s public key encryption with authorized equality test. The Computer Journal, 59(11), 1689–1694.MathSciNetCrossRef
26.
Zurück zum Zitat Xu, Y., Wang, M., Zhong, H., Cui, J., Liu, L., & Franqueira, V. N. L. (2017). Verifiable public key encryption scheme with equality test in 5g networks. IEEE Access, 5, 12702–12713.CrossRef Xu, Y., Wang, M., Zhong, H., Cui, J., Liu, L., & Franqueira, V. N. L. (2017). Verifiable public key encryption scheme with equality test in 5g networks. IEEE Access, 5, 12702–12713.CrossRef
27.
Zurück zum Zitat Elhabob, R., Sella, I., Zhao, Y., Zhu, G., & Xiong, H. (2018). A heterogeneous systems public key encryption with equality test in smart city. In ICEB 2018 Proceedings. 98. Elhabob, R., Sella, I., Zhao, Y., Zhu, G., & Xiong, H. (2018). A heterogeneous systems public key encryption with equality test in smart city. In ICEB 2018 Proceedings. 98.
28.
Zurück zum Zitat Ma, S. (2016). Identity-based encryption with outsourced equality test in cloud computing. Information Sciences, 328, 389–402.CrossRef Ma, S. (2016). Identity-based encryption with outsourced equality test in cloud computing. Information Sciences, 328, 389–402.CrossRef
29.
Zurück zum Zitat Baek, J., Safavi-Naini, R., & Susilo, W. (2008). Public key encryption with keyword search revisited. Computational Science and Its Applications-ICCSA, 2008, 1249–1259.MATH Baek, J., Safavi-Naini, R., & Susilo, W. (2008). Public key encryption with keyword search revisited. Computational Science and Its Applications-ICCSA, 2008, 1249–1259.MATH
30.
Zurück zum Zitat Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., & Shi, H. (2005). Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. In Crypto (vol. 3621, pp. 205–222). Springer. Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., & Shi, H. (2005). Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. In Crypto (vol. 3621, pp. 205–222). Springer.
31.
Zurück zum Zitat Tang, Q. (2011). Towards public key encryption scheme supporting equality test with fine-grained authorization. In Australasian conference on information security and privacy (pp 389–406). Springer. Tang, Q. (2011). Towards public key encryption scheme supporting equality test with fine-grained authorization. In Australasian conference on information security and privacy (pp 389–406). Springer.
32.
Zurück zum Zitat Tang, Q. (2012). Public key encryption supporting plaintext equality test and user-specified authorization. Security and Communication Networks, 5(12), 1351–1362.CrossRef Tang, Q. (2012). Public key encryption supporting plaintext equality test and user-specified authorization. Security and Communication Networks, 5(12), 1351–1362.CrossRef
33.
Zurück zum Zitat Ma, S., Zhang, M., Huang, Q., & Yang, B. (2014). Public key encryption with delegated equality test in a multi-user setting. The Computer Journal, 54, 986–1002. Ma, S., Zhang, M., Huang, Q., & Yang, B. (2014). Public key encryption with delegated equality test in a multi-user setting. The Computer Journal, 54, 986–1002.
34.
Zurück zum Zitat Ma, S., Huang, Q., Zhang, M., & Yang, B. (2015). Efficient public key encryption with equality test supporting flexible authorization. IEEE Transactions on Information Forensics and Security, 10(3), 458–470.CrossRef Ma, S., Huang, Q., Zhang, M., & Yang, B. (2015). Efficient public key encryption with equality test supporting flexible authorization. IEEE Transactions on Information Forensics and Security, 10(3), 458–470.CrossRef
35.
Zurück zum Zitat Lee, H. T., Ling, S., Seo, J. H., & Wang, H. (2016). Semi-generic construction of public key encryption and identity-based encryption with equality test. Information Sciences, 373, 419–440.CrossRef Lee, H. T., Ling, S., Seo, J. H., & Wang, H. (2016). Semi-generic construction of public key encryption and identity-based encryption with equality test. Information Sciences, 373, 419–440.CrossRef
36.
Zurück zum Zitat Wu, L., Zhang, Y., Choo, K.-K. R., & He, D. (2017). Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Generation Computer Systems, 73, 22–31.CrossRef Wu, L., Zhang, Y., Choo, K.-K. R., & He, D. (2017). Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Generation Computer Systems, 73, 22–31.CrossRef
38.
Zurück zum Zitat Boneh, D., & Franklin, M.. (2001). Identity-based encryption from the weil pairing. In Annual international cryptology conference (pp. 213–229). Springer. Boneh, D., & Franklin, M.. (2001). Identity-based encryption from the weil pairing. In Annual international cryptology conference (pp. 213–229). Springer.
39.
Zurück zum Zitat Lynn, B. (2013). The stanford pairing based crypto library. Privacy Preservation Scheme for Multicast Communications in Smart Buildings of the Smart Grid, 324. Lynn, B. (2013). The stanford pairing based crypto library. Privacy Preservation Scheme for Multicast Communications in Smart Buildings of the Smart Grid, 324.
Metadaten
Titel
PKE-ET-HS: Public Key Encryption with Equality Test for Heterogeneous Systems in IoT
verfasst von
Rashad Elhabob
Yanan Zhao
Alzubair Hassan
Hu Xiong
Publikationsdatum
29.01.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07190-9

Weitere Artikel der Ausgabe 1/2020

Wireless Personal Communications 1/2020 Zur Ausgabe

Neuer Inhalt