• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Ali, Mohammad (Ali, Mohammad.) [1] | Sadeghi, Mohammad-Reza (Sadeghi, Mohammad-Reza.) [2] | Liu, Ximeng (Liu, Ximeng.) [3] | Miao, Yinbin (Miao, Yinbin.) [4] | Vasilakos, Athanasios V. (Vasilakos, Athanasios V..) [5]

Indexed by:

EI

Abstract:

Attribute-based encryption (ABE) and attribute-based keyword search (ABKS) facilitate fine-grained access and search control for cloud-assisted Industrial Internet of Things (IIoT). However, existing schemes suffer from the following drawbacks: (1) their computational overhead in data outsourcing and retrieval is exceptionally high; (2) they obtain wrong search results if one or more of the queried keywords are wrongly selected; (3) in most existing ABKS, the untrustworthiness of the cloud server is not taken into account, and the correctness of the search results is not verified; (4) existing verifiable ABKS schemes do not support search results verification without the main data, and verifiers have to first download the search results and then check their correctness. In this paper, we design a verifiable online/offline multi-keyword search (VMKS) scheme providing high-level solutions to the aforementioned problems. We use the healthcare setting as a case study, and we demonstrate how our VMKS can be deployed in cloud-assisted Healthcare IIoT (HealthIIoT). We prove the security of our VMKS in the standard model and under the hardness assumption of the decisional bilinear Diffie-Hellman (DBDH) problem. Empirical results demonstrate that our VMKS speeds up encryption and verification processes by more than 70% and 90%, respectively. Moreover, our scheme reduces the communication overhead in the verification phase by more than 80%. © 2022 Elsevier Ltd

Keyword:

Access control Cryptography Health care Internet of things Search engines

Community:

  • [ 1 ] [Ali, Mohammad]Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran
  • [ 2 ] [Sadeghi, Mohammad-Reza]Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran
  • [ 3 ] [Liu, Ximeng]College of Computer and Data Science, Fuzhou University, Fuzhou; Fujian Province; 350116, China
  • [ 4 ] [Liu, Ximeng]Key Laboratory of Information Security of Network Systems, Fujian Province, Fuzhou; 350116, China
  • [ 5 ] [Miao, Yinbin]School of Cyber Engineering, Xidian University, Xi'an; 710071, China
  • [ 6 ] [Miao, Yinbin]State Key Laboratory of Cryptology, P.O. Box 5159, Beijing; 100878, China
  • [ 7 ] [Vasilakos, Athanasios V.]College of Computer and Data Science, Fuzhou University, Fuzhou; Fujian Province; 350116, China
  • [ 8 ] [Vasilakos, Athanasios V.]Center for AI Research, University of Agder, Grimstad, Norway

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

Journal of Information Security and Applications

ISSN: 2214-2134

Year: 2022

Volume: 65

5 . 6

JCR@2022

3 . 8 0 0

JCR@2023

ESI HC Threshold:61

JCR Journal Grade:2

CAS Journal Grade:3

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 20

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Affiliated Colleges:

Online/Total:118/10053855
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1