Reliable Data Sharing by Certificateless Encryption Supporting Keyword Search Against Vulnerable KGC in Industrial Internet of Things
Outsourcing Industrial Internet of Things (IIoT) data on the cloud extends the diversity of data analysis for decision making with minimized costs in communications and storage. However, it is adverse to the confidentiality of IIoT data from the owner as access control is performed by honest-but-cur...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on industrial informatics 2022-06, Vol.18 (6), p.3661-3669 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 3669 |
---|---|
container_issue | 6 |
container_start_page | 3661 |
container_title | IEEE transactions on industrial informatics |
container_volume | 18 |
creator | Karati, Arijit Fan, Chun-I Zhuang, Er-Shuo |
description | Outsourcing Industrial Internet of Things (IIoT) data on the cloud extends the diversity of data analysis for decision making with minimized costs in communications and storage. However, it is adverse to the confidentiality of IIoT data from the owner as access control is performed by honest-but-curious platforms. Although the encryption strategy guarantees data security, it hinders deliverance due to its inbred all-or-nothing decryption. Certificateless encryption supporting keyword search eliminates the overhead of certificates and privileges to retrieve the required data through encrypted keyword search. However, most of the prior works are precarious against a malicious key generation center, which exposes data protected by users' private keys. We design a certificateless secure data sharing by uniting the functionalities of encryption and access control on search. Our technique resists in/outside keyword guessing attacks and sustains on-demand user revocation. Besides, it achieves Girault's Level-3 security in the standard model. Nonetheless, empirical performance analysis under a suitable scenario exhibits its feasibility compared to the other related schemes. |
doi_str_mv | 10.1109/TII.2021.3112986 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2631958506</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9541032</ieee_id><sourcerecordid>2631958506</sourcerecordid><originalsourceid>FETCH-LOGICAL-c291t-77a9600d9bf3198879ddef96f0c6d263c69a1c095d42692536d7be7e078f325b3</originalsourceid><addsrcrecordid>eNo9kF1LwzAUhoso-HkveBPwuvMkWdLmcsyvsYHgprclbU-3SE1rkiL7Af5vMze8OgfO874HniS5pjCiFNTdajYbMWB0xCllKpdHyRlVY5oCCDiOuxA05Qz4aXLu_QcAz4Crs-TnFVujyxbJvQ6aLDfaGbsm5ZZM0QXTmEoHbNF78mArt-2D6SxZDn3fxWsE57j97lxNlqhdtSGTtTbWB_I-tBbdX-_8aUqMJTNbDz44o9u4BnQWA-kastrEFn-ZnDS69Xh1mBfJ2-PDavqcLl6eZtPJIq2YoiHNMq0kQK3KhlOV55mqa2yUbKCSNZO8kkrTCpSox0wqJrissxIzhCxvOBMlv0hu9729674G9KH46AZn48sixqkSuQAZKdhTleu8d9gUvTOf2m0LCsVOdhFlFzvZxUF2jNzsIwYR_3ElxhQ447-ptXvN</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2631958506</pqid></control><display><type>article</type><title>Reliable Data Sharing by Certificateless Encryption Supporting Keyword Search Against Vulnerable KGC in Industrial Internet of Things</title><source>IEEE Electronic Library (IEL)</source><creator>Karati, Arijit ; Fan, Chun-I ; Zhuang, Er-Shuo</creator><creatorcontrib>Karati, Arijit ; Fan, Chun-I ; Zhuang, Er-Shuo</creatorcontrib><description>Outsourcing Industrial Internet of Things (IIoT) data on the cloud extends the diversity of data analysis for decision making with minimized costs in communications and storage. However, it is adverse to the confidentiality of IIoT data from the owner as access control is performed by honest-but-curious platforms. Although the encryption strategy guarantees data security, it hinders deliverance due to its inbred all-or-nothing decryption. Certificateless encryption supporting keyword search eliminates the overhead of certificates and privileges to retrieve the required data through encrypted keyword search. However, most of the prior works are precarious against a malicious key generation center, which exposes data protected by users' private keys. We design a certificateless secure data sharing by uniting the functionalities of encryption and access control on search. Our technique resists in/outside keyword guessing attacks and sustains on-demand user revocation. Besides, it achieves Girault's Level-3 security in the standard model. Nonetheless, empirical performance analysis under a suitable scenario exhibits its feasibility compared to the other related schemes.</description><identifier>ISSN: 1551-3203</identifier><identifier>EISSN: 1941-0050</identifier><identifier>DOI: 10.1109/TII.2021.3112986</identifier><identifier>CODEN: ITIICH</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Access control ; Certificateless encryption (CLE) ; Cloud computing ; Cost analysis ; Cryptography ; Data analysis ; Data retrieval ; Decision analysis ; Decision making ; Empirical analysis ; Encryption ; Industrial applications ; Industrial Internet of Things ; Industrial Internet of Things (IIoT) ; Information sharing ; Internet of Things ; Keyword search ; Keywords ; Level-3 trust ; privacy preserving keyword search ; Read only memory ; Searching ; Security</subject><ispartof>IEEE transactions on industrial informatics, 2022-06, Vol.18 (6), p.3661-3669</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c291t-77a9600d9bf3198879ddef96f0c6d263c69a1c095d42692536d7be7e078f325b3</citedby><cites>FETCH-LOGICAL-c291t-77a9600d9bf3198879ddef96f0c6d263c69a1c095d42692536d7be7e078f325b3</cites><orcidid>0000-0001-5605-7354 ; 0000-0002-7512-1291</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9541032$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9541032$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Karati, Arijit</creatorcontrib><creatorcontrib>Fan, Chun-I</creatorcontrib><creatorcontrib>Zhuang, Er-Shuo</creatorcontrib><title>Reliable Data Sharing by Certificateless Encryption Supporting Keyword Search Against Vulnerable KGC in Industrial Internet of Things</title><title>IEEE transactions on industrial informatics</title><addtitle>TII</addtitle><description>Outsourcing Industrial Internet of Things (IIoT) data on the cloud extends the diversity of data analysis for decision making with minimized costs in communications and storage. However, it is adverse to the confidentiality of IIoT data from the owner as access control is performed by honest-but-curious platforms. Although the encryption strategy guarantees data security, it hinders deliverance due to its inbred all-or-nothing decryption. Certificateless encryption supporting keyword search eliminates the overhead of certificates and privileges to retrieve the required data through encrypted keyword search. However, most of the prior works are precarious against a malicious key generation center, which exposes data protected by users' private keys. We design a certificateless secure data sharing by uniting the functionalities of encryption and access control on search. Our technique resists in/outside keyword guessing attacks and sustains on-demand user revocation. Besides, it achieves Girault's Level-3 security in the standard model. Nonetheless, empirical performance analysis under a suitable scenario exhibits its feasibility compared to the other related schemes.</description><subject>Access control</subject><subject>Certificateless encryption (CLE)</subject><subject>Cloud computing</subject><subject>Cost analysis</subject><subject>Cryptography</subject><subject>Data analysis</subject><subject>Data retrieval</subject><subject>Decision analysis</subject><subject>Decision making</subject><subject>Empirical analysis</subject><subject>Encryption</subject><subject>Industrial applications</subject><subject>Industrial Internet of Things</subject><subject>Industrial Internet of Things (IIoT)</subject><subject>Information sharing</subject><subject>Internet of Things</subject><subject>Keyword search</subject><subject>Keywords</subject><subject>Level-3 trust</subject><subject>privacy preserving keyword search</subject><subject>Read only memory</subject><subject>Searching</subject><subject>Security</subject><issn>1551-3203</issn><issn>1941-0050</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kF1LwzAUhoso-HkveBPwuvMkWdLmcsyvsYHgprclbU-3SE1rkiL7Af5vMze8OgfO874HniS5pjCiFNTdajYbMWB0xCllKpdHyRlVY5oCCDiOuxA05Qz4aXLu_QcAz4Crs-TnFVujyxbJvQ6aLDfaGbsm5ZZM0QXTmEoHbNF78mArt-2D6SxZDn3fxWsE57j97lxNlqhdtSGTtTbWB_I-tBbdX-_8aUqMJTNbDz44o9u4BnQWA-kastrEFn-ZnDS69Xh1mBfJ2-PDavqcLl6eZtPJIq2YoiHNMq0kQK3KhlOV55mqa2yUbKCSNZO8kkrTCpSox0wqJrissxIzhCxvOBMlv0hu9729674G9KH46AZn48sixqkSuQAZKdhTleu8d9gUvTOf2m0LCsVOdhFlFzvZxUF2jNzsIwYR_3ElxhQ447-ptXvN</recordid><startdate>20220601</startdate><enddate>20220601</enddate><creator>Karati, Arijit</creator><creator>Fan, Chun-I</creator><creator>Zhuang, Er-Shuo</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-5605-7354</orcidid><orcidid>https://orcid.org/0000-0002-7512-1291</orcidid></search><sort><creationdate>20220601</creationdate><title>Reliable Data Sharing by Certificateless Encryption Supporting Keyword Search Against Vulnerable KGC in Industrial Internet of Things</title><author>Karati, Arijit ; Fan, Chun-I ; Zhuang, Er-Shuo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c291t-77a9600d9bf3198879ddef96f0c6d263c69a1c095d42692536d7be7e078f325b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Access control</topic><topic>Certificateless encryption (CLE)</topic><topic>Cloud computing</topic><topic>Cost analysis</topic><topic>Cryptography</topic><topic>Data analysis</topic><topic>Data retrieval</topic><topic>Decision analysis</topic><topic>Decision making</topic><topic>Empirical analysis</topic><topic>Encryption</topic><topic>Industrial applications</topic><topic>Industrial Internet of Things</topic><topic>Industrial Internet of Things (IIoT)</topic><topic>Information sharing</topic><topic>Internet of Things</topic><topic>Keyword search</topic><topic>Keywords</topic><topic>Level-3 trust</topic><topic>privacy preserving keyword search</topic><topic>Read only memory</topic><topic>Searching</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Karati, Arijit</creatorcontrib><creatorcontrib>Fan, Chun-I</creatorcontrib><creatorcontrib>Zhuang, Er-Shuo</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on industrial informatics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Karati, Arijit</au><au>Fan, Chun-I</au><au>Zhuang, Er-Shuo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Reliable Data Sharing by Certificateless Encryption Supporting Keyword Search Against Vulnerable KGC in Industrial Internet of Things</atitle><jtitle>IEEE transactions on industrial informatics</jtitle><stitle>TII</stitle><date>2022-06-01</date><risdate>2022</risdate><volume>18</volume><issue>6</issue><spage>3661</spage><epage>3669</epage><pages>3661-3669</pages><issn>1551-3203</issn><eissn>1941-0050</eissn><coden>ITIICH</coden><abstract>Outsourcing Industrial Internet of Things (IIoT) data on the cloud extends the diversity of data analysis for decision making with minimized costs in communications and storage. However, it is adverse to the confidentiality of IIoT data from the owner as access control is performed by honest-but-curious platforms. Although the encryption strategy guarantees data security, it hinders deliverance due to its inbred all-or-nothing decryption. Certificateless encryption supporting keyword search eliminates the overhead of certificates and privileges to retrieve the required data through encrypted keyword search. However, most of the prior works are precarious against a malicious key generation center, which exposes data protected by users' private keys. We design a certificateless secure data sharing by uniting the functionalities of encryption and access control on search. Our technique resists in/outside keyword guessing attacks and sustains on-demand user revocation. Besides, it achieves Girault's Level-3 security in the standard model. Nonetheless, empirical performance analysis under a suitable scenario exhibits its feasibility compared to the other related schemes.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/TII.2021.3112986</doi><tpages>9</tpages><orcidid>https://orcid.org/0000-0001-5605-7354</orcidid><orcidid>https://orcid.org/0000-0002-7512-1291</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1551-3203 |
ispartof | IEEE transactions on industrial informatics, 2022-06, Vol.18 (6), p.3661-3669 |
issn | 1551-3203 1941-0050 |
language | eng |
recordid | cdi_proquest_journals_2631958506 |
source | IEEE Electronic Library (IEL) |
subjects | Access control Certificateless encryption (CLE) Cloud computing Cost analysis Cryptography Data analysis Data retrieval Decision analysis Decision making Empirical analysis Encryption Industrial applications Industrial Internet of Things Industrial Internet of Things (IIoT) Information sharing Internet of Things Keyword search Keywords Level-3 trust privacy preserving keyword search Read only memory Searching Security |
title | Reliable Data Sharing by Certificateless Encryption Supporting Keyword Search Against Vulnerable KGC in Industrial Internet of Things |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T05%3A27%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Reliable%20Data%20Sharing%20by%20Certificateless%20Encryption%20Supporting%20Keyword%20Search%20Against%20Vulnerable%20KGC%20in%20Industrial%20Internet%20of%20Things&rft.jtitle=IEEE%20transactions%20on%20industrial%20informatics&rft.au=Karati,%20Arijit&rft.date=2022-06-01&rft.volume=18&rft.issue=6&rft.spage=3661&rft.epage=3669&rft.pages=3661-3669&rft.issn=1551-3203&rft.eissn=1941-0050&rft.coden=ITIICH&rft_id=info:doi/10.1109/TII.2021.3112986&rft_dat=%3Cproquest_RIE%3E2631958506%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2631958506&rft_id=info:pmid/&rft_ieee_id=9541032&rfr_iscdi=true |