Secret Sharing-Based IoT Text Data Outsourcing: A Secure and Efficient Scheme
Secret Sharing has been recently used as an alternative approach to solve privacy-preserving issues in cloud-based data outsourcing, for overcoming the challenges faced when encryption-based methods are adopted. In this work we revisit secret sharing-based text data outsourcing schemes and focus on...
Gespeichert in:
Veröffentlicht in: | IEEE access 2021, Vol.9, p.76908-76920 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 76920 |
---|---|
container_issue | |
container_start_page | 76908 |
container_title | IEEE access |
container_volume | 9 |
creator | Tang, Zhaohui |
description | Secret Sharing has been recently used as an alternative approach to solve privacy-preserving issues in cloud-based data outsourcing, for overcoming the challenges faced when encryption-based methods are adopted. In this work we revisit secret sharing-based text data outsourcing schemes and focus on their applications into an Internet-of-Things (IoT) system with resource constrained IoT devices as clients. We propose a new method which is secure against common attacks to secret sharing-based text data outsourcing schemes. Compared with the existing works under the same assumption that the cloud servers are possibly colluded, our scheme is more efficient and supports multiplication based operations. |
doi_str_mv | 10.1109/ACCESS.2021.3075282 |
format | Article |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_proquest_journals_2536030852</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9411867</ieee_id><doaj_id>oai_doaj_org_article_be74412bae304287a3adc6fe54caa93b</doaj_id><sourcerecordid>2536030852</sourcerecordid><originalsourceid>FETCH-LOGICAL-c474t-bf93992d1f1986710dd82a67c35a33afa99c74874535802f755ac48b57733e933</originalsourceid><addsrcrecordid>eNpNkcFOwzAMhisEEgh4Ai6ROHckcdIk3MYYMAnEYeMcuakDnWCFtJPg7ckoQuTiyPH3O_ZfFGeCT4Tg7mI6m82Xy4nkUkyAGy2t3CuOpKhcCRqq_X_3w-K079c8H5tT2hwVD0sKiQa2fMHUbp7LK-ypYYtuxVb0ObBrHJA9boe-26aQ3y_ZlGVim4jhpmHzGNvQ0ibz4YXe6KQ4iPja0-lvPC6ebuar2V15_3i7mE3vy6CMGso6OnBONiIKZysjeNNYiZUJoBEAIzoXjLJGadCWy2i0xqBsrY0BIAdwXCxG3abDtX9P7RumL99h638SXXr2mIY2vJKvySglZI0EXElrELAJVSStAqKDOmudj1rvqfvYUj_4dR52k7_vZV4ZB261zFUwVoXU9X2i-NdVcL-zwY82-J0N_teGTJ2NVEtEf4RTQuSx4RvsL4C1</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2536030852</pqid></control><display><type>article</type><title>Secret Sharing-Based IoT Text Data Outsourcing: A Secure and Efficient Scheme</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Tang, Zhaohui</creator><creatorcontrib>Tang, Zhaohui</creatorcontrib><description>Secret Sharing has been recently used as an alternative approach to solve privacy-preserving issues in cloud-based data outsourcing, for overcoming the challenges faced when encryption-based methods are adopted. In this work we revisit secret sharing-based text data outsourcing schemes and focus on their applications into an Internet-of-Things (IoT) system with resource constrained IoT devices as clients. We propose a new method which is secure against common attacks to secret sharing-based text data outsourcing schemes. Compared with the existing works under the same assumption that the cloud servers are possibly colluded, our scheme is more efficient and supports multiplication based operations.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2021.3075282</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Cryptography ; Data models ; Data outsourcing ; Encryption ; Internet of Things ; Internet-of-Things (IoT) ; Multiplication ; Outsourcing ; privacy-preserving ; secret sharing ; Servers</subject><ispartof>IEEE access, 2021, Vol.9, p.76908-76920</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c474t-bf93992d1f1986710dd82a67c35a33afa99c74874535802f755ac48b57733e933</citedby><cites>FETCH-LOGICAL-c474t-bf93992d1f1986710dd82a67c35a33afa99c74874535802f755ac48b57733e933</cites><orcidid>0000-0003-4415-7707</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9411867$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,864,2100,4022,27632,27922,27923,27924,54932</link.rule.ids></links><search><creatorcontrib>Tang, Zhaohui</creatorcontrib><title>Secret Sharing-Based IoT Text Data Outsourcing: A Secure and Efficient Scheme</title><title>IEEE access</title><addtitle>Access</addtitle><description>Secret Sharing has been recently used as an alternative approach to solve privacy-preserving issues in cloud-based data outsourcing, for overcoming the challenges faced when encryption-based methods are adopted. In this work we revisit secret sharing-based text data outsourcing schemes and focus on their applications into an Internet-of-Things (IoT) system with resource constrained IoT devices as clients. We propose a new method which is secure against common attacks to secret sharing-based text data outsourcing schemes. Compared with the existing works under the same assumption that the cloud servers are possibly colluded, our scheme is more efficient and supports multiplication based operations.</description><subject>Cryptography</subject><subject>Data models</subject><subject>Data outsourcing</subject><subject>Encryption</subject><subject>Internet of Things</subject><subject>Internet-of-Things (IoT)</subject><subject>Multiplication</subject><subject>Outsourcing</subject><subject>privacy-preserving</subject><subject>secret sharing</subject><subject>Servers</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNkcFOwzAMhisEEgh4Ai6ROHckcdIk3MYYMAnEYeMcuakDnWCFtJPg7ckoQuTiyPH3O_ZfFGeCT4Tg7mI6m82Xy4nkUkyAGy2t3CuOpKhcCRqq_X_3w-K079c8H5tT2hwVD0sKiQa2fMHUbp7LK-ypYYtuxVb0ObBrHJA9boe-26aQ3y_ZlGVim4jhpmHzGNvQ0ibz4YXe6KQ4iPja0-lvPC6ebuar2V15_3i7mE3vy6CMGso6OnBONiIKZysjeNNYiZUJoBEAIzoXjLJGadCWy2i0xqBsrY0BIAdwXCxG3abDtX9P7RumL99h638SXXr2mIY2vJKvySglZI0EXElrELAJVSStAqKDOmudj1rvqfvYUj_4dR52k7_vZV4ZB261zFUwVoXU9X2i-NdVcL-zwY82-J0N_teGTJ2NVEtEf4RTQuSx4RvsL4C1</recordid><startdate>2021</startdate><enddate>2021</enddate><creator>Tang, Zhaohui</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0003-4415-7707</orcidid></search><sort><creationdate>2021</creationdate><title>Secret Sharing-Based IoT Text Data Outsourcing: A Secure and Efficient Scheme</title><author>Tang, Zhaohui</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c474t-bf93992d1f1986710dd82a67c35a33afa99c74874535802f755ac48b57733e933</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Cryptography</topic><topic>Data models</topic><topic>Data outsourcing</topic><topic>Encryption</topic><topic>Internet of Things</topic><topic>Internet-of-Things (IoT)</topic><topic>Multiplication</topic><topic>Outsourcing</topic><topic>privacy-preserving</topic><topic>secret sharing</topic><topic>Servers</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Tang, Zhaohui</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Tang, Zhaohui</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secret Sharing-Based IoT Text Data Outsourcing: A Secure and Efficient Scheme</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2021</date><risdate>2021</risdate><volume>9</volume><spage>76908</spage><epage>76920</epage><pages>76908-76920</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Secret Sharing has been recently used as an alternative approach to solve privacy-preserving issues in cloud-based data outsourcing, for overcoming the challenges faced when encryption-based methods are adopted. In this work we revisit secret sharing-based text data outsourcing schemes and focus on their applications into an Internet-of-Things (IoT) system with resource constrained IoT devices as clients. We propose a new method which is secure against common attacks to secret sharing-based text data outsourcing schemes. Compared with the existing works under the same assumption that the cloud servers are possibly colluded, our scheme is more efficient and supports multiplication based operations.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2021.3075282</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0003-4415-7707</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2021, Vol.9, p.76908-76920 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_proquest_journals_2536030852 |
source | IEEE Open Access Journals; DOAJ Directory of Open Access Journals; EZB-FREE-00999 freely available EZB journals |
subjects | Cryptography Data models Data outsourcing Encryption Internet of Things Internet-of-Things (IoT) Multiplication Outsourcing privacy-preserving secret sharing Servers |
title | Secret Sharing-Based IoT Text Data Outsourcing: A Secure and Efficient Scheme |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T01%3A14%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secret%20Sharing-Based%20IoT%20Text%20Data%20Outsourcing:%20A%20Secure%20and%20Efficient%20Scheme&rft.jtitle=IEEE%20access&rft.au=Tang,%20Zhaohui&rft.date=2021&rft.volume=9&rft.spage=76908&rft.epage=76920&rft.pages=76908-76920&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2021.3075282&rft_dat=%3Cproquest_ieee_%3E2536030852%3C/proquest_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2536030852&rft_id=info:pmid/&rft_ieee_id=9411867&rft_doaj_id=oai_doaj_org_article_be74412bae304287a3adc6fe54caa93b&rfr_iscdi=true |