• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Ali, Mohammad (Ali, Mohammad.) [1] | Sadeghi, Mohammad-Reza (Sadeghi, Mohammad-Reza.) [2] | Liu, Ximeng (Liu, Ximeng.) [3] (Scholars:刘西蒙) | Miao, Yinbin (Miao, Yinbin.) [4] | Vasilakos, Athanasios V. (Vasilakos, Athanasios V..) [5]

Indexed by:

EI SCIE

Abstract:

Attribute-based encryption (ABE) and attribute-based keyword search (ABKS) facilitate fine-grained access and search control for cloud-assisted Industrial Internet of Things (IIoT). However, existing schemes suffer from the following drawbacks: (1) their computational overhead in data outsourcing and retrieval is exceptionally high; (2) they obtain wrong search results if one or more of the queried keywords are wrongly selected; (3) in most existing ABKS, the untrustworthiness of the cloud server is not taken into account, and the correctness of the search results is not verified; (4) existing verifiable ABKS schemes do not support search results verification without the main data, and verifiers have to first download the search results and then check their correctness. In this paper, we design a verifiable online/offline multi-keyword search (VMKS) scheme providing high-level solutions to the aforementioned problems. We use the healthcare setting as a case study, and we demonstrate how our VMKS can be deployed in cloud-assisted Healthcare IIoT (HealthIIoT). We prove the security of our VMKS in the standard model and under the hardness assumption of the decisional bilinear Diffie-Hellman (DBDH) problem. Empirical results demonstrate that our VMKS speeds up encryption and verification processes by more than 70% and 90%, respectively. Moreover, our scheme reduces the communication overhead in the verification phase by more than 80%.

Keyword:

Attribute-based keyword search Industrial Internet of Things Online/offline encryption Outsourced decryption Outsourced encryption Verifiable search results

Community:

  • [ 1 ] [Ali, Mohammad]Amirkabir Univ Technol, Dept Math & Comp Sci, Tehran, Iran
  • [ 2 ] [Sadeghi, Mohammad-Reza]Amirkabir Univ Technol, Dept Math & Comp Sci, Tehran, Iran
  • [ 3 ] [Liu, Ximeng]Fuzhou Univ, Coll Comp & Data Sci, Fuzhou 350116, Fujian, Peoples R China
  • [ 4 ] [Vasilakos, Athanasios V.]Fuzhou Univ, Coll Comp & Data Sci, Fuzhou 350116, Fujian, Peoples R China
  • [ 5 ] [Liu, Ximeng]Key Lab Informat Secur Network Syst, Fuzhou 350116, Fujian, Peoples R China
  • [ 6 ] [Miao, Yinbin]Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
  • [ 7 ] [Miao, Yinbin]State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
  • [ 8 ] [Vasilakos, Athanasios V.]Univ Agder, Ctr AI Res, Grimstad, Norway

Reprint 's Address:

Show more details

Version:

Related Keywords:

Source :

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS

ISSN: 2214-2126

Year: 2022

Volume: 65

5 . 6

JCR@2022

3 . 8 0 0

JCR@2023

ESI Discipline: COMPUTER SCIENCE;

ESI HC Threshold:61

JCR Journal Grade:2

CAS Journal Grade:3

Cited Count:

WoS CC Cited Count: 23

SCOPUS Cited Count: 25

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 2

Online/Total:150/10044689
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1