Secure Range Search Over Encrypted Uncertain IoT Outsourced Data

Internet of Things (IoT) is an increasingly popular technological trend. The operation of IoT needs a strong data-handling capacity, where most of the data are sensor data. Limitations associated with measurement, delays in data updating, and/or the need to preserve the privacy of data can result in the sensor data being uncertain. Thus, one key challenge is “how do we ensure the privacy of data collected from IoT devices, particularly uncertain data, that are being outsourced to the cloud for analysis, storage and archival?”. Searchable encryption scheme is a promising technique that allows the searching over encrypted (uncertain) data stored offshore. In this paper, we propose a secure range search for encrypted data from IoT devices. Specifically, we use homomorphic and order-preserving encryption to encrypt data published by the data owners. We then use the ${k}$ -dimensional tree to build the data index. Our scheme is designed to ensure the privacy of the dataset, without affecting the efficiency of keyword search on the (encrypted) dataset. We also demonstrate that our scheme can preserve both data and query privacy, as well as evaluating its performance to demonstrate efficiency.

[1]  Wei Guo,et al.  A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid , 2019, IEEE Transactions on Industrial Informatics.

[2]  Laks V. S. Lakshmanan,et al.  ProbView: a flexible probabilistic database system , 1997, TODS.

[3]  Hector Garcia-Molina,et al.  The Management of Probabilistic Data , 1992, IEEE Trans. Knowl. Data Eng..

[4]  Hans-Peter Kriegel,et al.  Probabilistic Similarity Join on Uncertain Data , 2006, DASFAA.

[5]  Fabrizio Angiulli,et al.  Indexing Uncertain Data in General Metric Spaces , 2012, IEEE Transactions on Knowledge and Data Engineering.

[6]  Jianmin Wang,et al.  Effectively Indexing the Uncertain Space , 2010, IEEE Transactions on Knowledge and Data Engineering.

[7]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[8]  Yufei Tao,et al.  Range search on multidimensional uncertain data , 2007, TODS.

[9]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[10]  Eu-Jin Goh,et al.  Secure Indexes , 2003, IACR Cryptol. ePrint Arch..

[11]  Florian Kerschbaum,et al.  Optimal Average-Complexity Ideal-Security Order-Preserving Encryption , 2014, CCS.

[12]  Cong Wang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[13]  Xue Chen,et al.  Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption , 2020, IEEE Transactions on Services Computing.

[14]  Tao Jiang,et al.  A Lightweight Authenticated Communication Scheme for Smart Grid , 2016, IEEE Sensors Journal.

[15]  Heng Tao Shen,et al.  Effectively Indexing the Multidimensional Uncertain Objects , 2014, IEEE Transactions on Knowledge and Data Engineering.

[16]  Rafail Ostrovsky,et al.  Public Key Encryption That Allows PIR Queries , 2007, CRYPTO.

[17]  Nickolai Zeldovich,et al.  An Ideal-Security Protocol for Order-Preserving Encoding , 2013, 2013 IEEE Symposium on Security and Privacy.

[18]  Susanne E. Hambrusch,et al.  Indexing Uncertain Categorical Data , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[19]  Kim-Kwang Raymond Choo,et al.  Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds , 2016, Journal of Medical Systems.

[20]  Nathan Chenette,et al.  Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..

[21]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[22]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[23]  Michael Mitzenmacher,et al.  Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.

[24]  Cheng Guo,et al.  Key-Aggregate Authentication Cryptosystem for Data Sharing in Dynamic Cloud Storage , 2017, 2017 14th International Symposium on Pervasive Systems, Algorithms and Networks & 2017 11th International Conference on Frontier of Computer Science and Technology & 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC).

[25]  Paul Rad,et al.  Cloud of Things in Smart Agriculture: Intelligent Irrigation Monitoring by Thermal Imaging , 2017, IEEE Cloud Computing.

[26]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[27]  Jon Louis Bentley,et al.  Multidimensional binary search trees used for associative searching , 1975, CACM.

[28]  Dario Fiore,et al.  Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data , 2015, CCS.