File-Centric Multi-Key Aggregate Keyword Searchable Encryption for Industrial Internet of Things

Cloud storage has been used to reduce the cost and support convenient collaborations for industrial Internet of things (IIoT) data management. When data owners share IIoT data with authorized parties for data interaction, secure cloud data searching and file access control are fundamental security requirements. In this paper, first we discuss a new insider attack to the Cui's multi-key aggregate searchable encryption scheme, where the unauthorized inside users can guess the other users private keys. Then, we propose a novel file-centric multi-key aggregate keyword searchable encryption (Fc-MKA-KSE) system for the IIoT data in the file-centric framework. Specifically, we present two formal security models, namely, the security models of the indistinguishable selective-file chosen keyword attack and the indistinguishable selective-file keyword guessing attack, which can satisfy the security requirements. Our experimental results show that the proposed scheme achieves computational efficiency.

[1]  Jin Li,et al.  TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage , 2014, ACISP.

[2]  Rajasekhar Mungara,et al.  A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .

[3]  Xiaojiang Du,et al.  Security in wireless sensor networks , 2008, IEEE Wireless Communications.

[4]  David Pointcheval,et al.  Dynamic Threshold Public-Key Encryption , 2008, CRYPTO.

[5]  Aggelos Kiayias,et al.  Edinburgh Research Explorer Efficient Encrypted Keyword Search for Multi-user Data Sharing , 2016 .

[6]  Naranker Dulay,et al.  Shared and Searchable Encrypted Data for Untrusted Servers , 2008 .

[7]  Refik Molva,et al.  Multi-user Searchable Encryption in the Cloud , 2015, ISC.

[8]  Mohsen Guizani,et al.  Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.

[9]  Zoe L. Jiang,et al.  Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage , 2016, ACISP.

[10]  Lifei Wei,et al.  An Efficient and Secure Delegated Multi-authentication Protocol for Mobile Data Owners in Cloud , 2015, WASA.

[11]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[12]  Qiang Tang,et al.  Nothing is for Free: Security in Searching Shared and Encrypted Data , 2014, IEEE Transactions on Information Forensics and Security.

[13]  Nickolai Zeldovich,et al.  Multi-Key Searchable Encryption , 2013, IACR Cryptol. ePrint Arch..

[14]  Wu He,et al.  Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.

[15]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[16]  Yiwei Thomas Hou,et al.  Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud , 2016, IEEE Transactions on Parallel and Distributed Systems.

[17]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[18]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[19]  Kyung-Ah Shim,et al.  EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks , 2013, Ad Hoc Networks.

[20]  Ming Li,et al.  Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking , 2013, IEEE Transactions on Parallel and Distributed Systems.

[21]  Peilin Hong,et al.  Distributed access control with adaptive privacy preserving property for wireless sensor networks , 2014, Secur. Commun. Networks.

[22]  Mohsen Guizani,et al.  Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks , 2008, IEEE Transactions on Vehicular Technology.

[23]  Mianxiong Dong,et al.  Securing distributed storage for Social Internet of Things using regenerating code and Blom key agreement , 2015, Peer Peer Netw. Appl..

[24]  G. P. Oornima,et al.  Key-Aggregate Searchable Encryption ( KASE ) For Group Data Sharing via Cloud Storage , 2016 .

[25]  Dan Boneh,et al.  Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.

[26]  Laurence T. Yang,et al.  Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme , 2018, IEEE Transactions on Cloud Computing.

[27]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[28]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.