• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Liu, Tong (Liu, Tong.) [1] | Miao, Yinbin (Miao, Yinbin.) [2] | Choo, Kim-Kwang Raymond (Choo, Kim-Kwang Raymond.) [3] | Li, Hongwei (Li, Hongwei.) [4] | Liu, Ximeng (Liu, Ximeng.) [5] | Meng, Xiangdong (Meng, Xiangdong.) [6] | Deng, Robert H. (Deng, Robert H..) [7]

Indexed by:

EI

Abstract:

Internet of Things (IoT) devices and systems are becoming increasingly commonplace, and as such systems scale up, so do the computational and storage requirements. Hence, one recent trend is to outsource data from IoT devices to remote systems. To facilitate both ciphertext retrieval and data confidentiality in the outsourced data, a number of searchable encryption (SE) approaches have been proposed in the literature. However, due to limited keyword space, a number of SE schemes are vulnerable to keyword guessing attacks (KGAs). In addition, existing SE approaches generally do not consider the hierarchical structure in which users at different levels require varying access privileges. Furthermore, existing SE schemes seldom provide time-controlled access control. Therefore, in this article, we propose a time-controlled hierarchical multikeyword search by using a double-server architecture to mitigate KGA. In our approach, we also build a public key tree to support different access permissions for hierarchical users. Formal security analysis shows that our scheme is secure, and extensive experiments demonstrate that our scheme is practical. © 2014 IEEE.

Keyword:

Access control Cryptography Digital storage Internet of things

Community:

  • [ 1 ] [Liu, Tong]Xidian University, School of Cyber Engineering, Xi'an; 710071, China
  • [ 2 ] [Liu, Tong]Guilin University of Electronic Technology, Guangxi Key Laboratory of Trusted Software, Guilin; 541004, China
  • [ 3 ] [Miao, Yinbin]Xidian University, School of Cyber Engineering, Xi'an; 710071, China
  • [ 4 ] [Miao, Yinbin]Guilin University of Electronic Technology, Guangxi Key Laboratory of Trusted Software, Guilin; 541004, China
  • [ 5 ] [Choo, Kim-Kwang Raymond]The University of Texas at San Antonio, Department of Information Systems and Cyber Security, San Antonio; TX; 78249, United States
  • [ 6 ] [Li, Hongwei]University of Electronic Science and Technology of China, Department of Computer Science and Engineering, Chengdu; 610051, China
  • [ 7 ] [Liu, Ximeng]Fuzhou University, Key Laboratory of Information Security of Network Systems, College of Mathematics and Computer Science, Fuzhou; 350108, China
  • [ 8 ] [Meng, Xiangdong]Henan Key Laboratory of Network Cryptography Technology, Zhengzhou; 450001, China
  • [ 9 ] [Meng, Xiangdong]State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou; 450001, China
  • [ 10 ] [Deng, Robert H.]Singapore Management University, School of Information Systems, 178902, Singapore

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Internet of Things Journal

Year: 2022

Issue: 13

Volume: 9

Page: 11017-11029

1 0 . 6

JCR@2022

8 . 2 0 0

JCR@2023

ESI HC Threshold:61

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 7

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Affiliated Colleges:

Online/Total:269/9684529
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1