A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic Networks

Security is a crucial issue in distributed applications of multihop wireless opportunistic network due to the features of exposed on the fly communication, relaxed end-to-end connectivity, and vague destinations literately. In this paper, we focus on problems of user privacy leakage and end-to-end confidentiality invasion in content-based or interest-centric wireless opportunistic network. And we propose a public-encryption-with-fuzzy-keyword-search- (PEFKS-) and ciphertext-policy-attribute-based-encryption- (CP-ABE-) based distributed security scheme by refining and compromising two-pairing-based encryption, searchable encryption, and attribute-based encryption. Our scheme enables opportunistic forwarding according to fuzzy interests preserving full privacy of users and ensures end-to-end confidentiality with a fine-grained access control strategy in an interest-centric scenario of large-scale wireless opportunistic networks. Finally, we analyze and evaluate the scheme in terms of security and performance.

[1]  Refik Molva,et al.  Privacy and confidentiality in context-based and epidemic forwarding , 2010, Comput. Commun..

[2]  Refik Molva,et al.  Privacy-Preserving Content-Based Publish/Subscribe Networks , 2009, SEC.

[3]  Peter N. Yianilos,et al.  Learning String-Edit Distance , 1996, IEEE Trans. Pattern Anal. Mach. Intell..

[4]  Guoliang Li,et al.  Efficient interactive fuzzy keyword search , 2009, WWW '09.

[5]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[6]  Gerrit Bleumer,et al.  Random Oracle Model , 2005, Encyclopedia of Cryptography and Security.

[7]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[8]  Refik Molva,et al.  Privacy in Content-Based Opportunistic Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.

[9]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[10]  Xiao-Feng Wang,et al.  Attribute-Based Encryption Schemes: Attribute-Based Encryption Schemes , 2011 .

[11]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[12]  Su Jin,et al.  Attribute-Based Encryption Schemes , 2011 .

[13]  Liehuang Zhu,et al.  Fuzzy keyword search on encrypted cloud storage data with small index , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.

[14]  Cong Wang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[15]  Pan Hui,et al.  Pocket Switched Networking: Challenges, Feasibility and Implementation Issues , 2005, WAC.

[16]  Minho Shin,et al.  AnonySense: A system for anonymous opportunistic sensing , 2011, Pervasive Mob. Comput..

[17]  Sajal K. Das,et al.  A trust-based framework for data forwarding in opportunistic networks , 2013, Ad Hoc Networks.

[18]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[19]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[20]  Bao Li,et al.  Random Oracle Model: Random Oracle Model , 2012 .

[21]  Alessandro Puiatti,et al.  Probabilistic Routing Protocol for Intermittently Connected Mobile Ad hoc Network (PROPICMAN) , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[22]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.