Reliable Data Sharing by Certificateless Encryption Supporting Keyword Search Against Vulnerable KGC in Industrial Internet of Things

Outsourcing Industrial Internet of Things (IIoT) data on the cloud extends the diversity of data analysis for decision making with minimized costs in communications and storage. However, it is adverse to the confidentiality of IIoT data from the owner as access control is performed by honest-but-cur...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on industrial informatics 2022-06, Vol.18 (6), p.3661-3669
Hauptverfasser: Karati, Arijit, Fan, Chun-I, Zhuang, Er-Shuo
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 3669
container_issue 6
container_start_page 3661
container_title IEEE transactions on industrial informatics
container_volume 18
creator Karati, Arijit
Fan, Chun-I
Zhuang, Er-Shuo
description Outsourcing Industrial Internet of Things (IIoT) data on the cloud extends the diversity of data analysis for decision making with minimized costs in communications and storage. However, it is adverse to the confidentiality of IIoT data from the owner as access control is performed by honest-but-curious platforms. Although the encryption strategy guarantees data security, it hinders deliverance due to its inbred all-or-nothing decryption. Certificateless encryption supporting keyword search eliminates the overhead of certificates and privileges to retrieve the required data through encrypted keyword search. However, most of the prior works are precarious against a malicious key generation center, which exposes data protected by users' private keys. We design a certificateless secure data sharing by uniting the functionalities of encryption and access control on search. Our technique resists in/outside keyword guessing attacks and sustains on-demand user revocation. Besides, it achieves Girault's Level-3 security in the standard model. Nonetheless, empirical performance analysis under a suitable scenario exhibits its feasibility compared to the other related schemes.
doi_str_mv 10.1109/TII.2021.3112986
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2631958506</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9541032</ieee_id><sourcerecordid>2631958506</sourcerecordid><originalsourceid>FETCH-LOGICAL-c291t-77a9600d9bf3198879ddef96f0c6d263c69a1c095d42692536d7be7e078f325b3</originalsourceid><addsrcrecordid>eNo9kF1LwzAUhoso-HkveBPwuvMkWdLmcsyvsYHgprclbU-3SE1rkiL7Af5vMze8OgfO874HniS5pjCiFNTdajYbMWB0xCllKpdHyRlVY5oCCDiOuxA05Qz4aXLu_QcAz4Crs-TnFVujyxbJvQ6aLDfaGbsm5ZZM0QXTmEoHbNF78mArt-2D6SxZDn3fxWsE57j97lxNlqhdtSGTtTbWB_I-tBbdX-_8aUqMJTNbDz44o9u4BnQWA-kastrEFn-ZnDS69Xh1mBfJ2-PDavqcLl6eZtPJIq2YoiHNMq0kQK3KhlOV55mqa2yUbKCSNZO8kkrTCpSox0wqJrissxIzhCxvOBMlv0hu9729674G9KH46AZn48sixqkSuQAZKdhTleu8d9gUvTOf2m0LCsVOdhFlFzvZxUF2jNzsIwYR_3ElxhQ447-ptXvN</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2631958506</pqid></control><display><type>article</type><title>Reliable Data Sharing by Certificateless Encryption Supporting Keyword Search Against Vulnerable KGC in Industrial Internet of Things</title><source>IEEE Electronic Library (IEL)</source><creator>Karati, Arijit ; Fan, Chun-I ; Zhuang, Er-Shuo</creator><creatorcontrib>Karati, Arijit ; Fan, Chun-I ; Zhuang, Er-Shuo</creatorcontrib><description>Outsourcing Industrial Internet of Things (IIoT) data on the cloud extends the diversity of data analysis for decision making with minimized costs in communications and storage. However, it is adverse to the confidentiality of IIoT data from the owner as access control is performed by honest-but-curious platforms. Although the encryption strategy guarantees data security, it hinders deliverance due to its inbred all-or-nothing decryption. Certificateless encryption supporting keyword search eliminates the overhead of certificates and privileges to retrieve the required data through encrypted keyword search. However, most of the prior works are precarious against a malicious key generation center, which exposes data protected by users' private keys. We design a certificateless secure data sharing by uniting the functionalities of encryption and access control on search. Our technique resists in/outside keyword guessing attacks and sustains on-demand user revocation. Besides, it achieves Girault's Level-3 security in the standard model. Nonetheless, empirical performance analysis under a suitable scenario exhibits its feasibility compared to the other related schemes.</description><identifier>ISSN: 1551-3203</identifier><identifier>EISSN: 1941-0050</identifier><identifier>DOI: 10.1109/TII.2021.3112986</identifier><identifier>CODEN: ITIICH</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Access control ; Certificateless encryption (CLE) ; Cloud computing ; Cost analysis ; Cryptography ; Data analysis ; Data retrieval ; Decision analysis ; Decision making ; Empirical analysis ; Encryption ; Industrial applications ; Industrial Internet of Things ; Industrial Internet of Things (IIoT) ; Information sharing ; Internet of Things ; Keyword search ; Keywords ; Level-3 trust ; privacy preserving keyword search ; Read only memory ; Searching ; Security</subject><ispartof>IEEE transactions on industrial informatics, 2022-06, Vol.18 (6), p.3661-3669</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c291t-77a9600d9bf3198879ddef96f0c6d263c69a1c095d42692536d7be7e078f325b3</citedby><cites>FETCH-LOGICAL-c291t-77a9600d9bf3198879ddef96f0c6d263c69a1c095d42692536d7be7e078f325b3</cites><orcidid>0000-0001-5605-7354 ; 0000-0002-7512-1291</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9541032$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9541032$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Karati, Arijit</creatorcontrib><creatorcontrib>Fan, Chun-I</creatorcontrib><creatorcontrib>Zhuang, Er-Shuo</creatorcontrib><title>Reliable Data Sharing by Certificateless Encryption Supporting Keyword Search Against Vulnerable KGC in Industrial Internet of Things</title><title>IEEE transactions on industrial informatics</title><addtitle>TII</addtitle><description>Outsourcing Industrial Internet of Things (IIoT) data on the cloud extends the diversity of data analysis for decision making with minimized costs in communications and storage. However, it is adverse to the confidentiality of IIoT data from the owner as access control is performed by honest-but-curious platforms. Although the encryption strategy guarantees data security, it hinders deliverance due to its inbred all-or-nothing decryption. Certificateless encryption supporting keyword search eliminates the overhead of certificates and privileges to retrieve the required data through encrypted keyword search. However, most of the prior works are precarious against a malicious key generation center, which exposes data protected by users' private keys. We design a certificateless secure data sharing by uniting the functionalities of encryption and access control on search. Our technique resists in/outside keyword guessing attacks and sustains on-demand user revocation. Besides, it achieves Girault's Level-3 security in the standard model. Nonetheless, empirical performance analysis under a suitable scenario exhibits its feasibility compared to the other related schemes.</description><subject>Access control</subject><subject>Certificateless encryption (CLE)</subject><subject>Cloud computing</subject><subject>Cost analysis</subject><subject>Cryptography</subject><subject>Data analysis</subject><subject>Data retrieval</subject><subject>Decision analysis</subject><subject>Decision making</subject><subject>Empirical analysis</subject><subject>Encryption</subject><subject>Industrial applications</subject><subject>Industrial Internet of Things</subject><subject>Industrial Internet of Things (IIoT)</subject><subject>Information sharing</subject><subject>Internet of Things</subject><subject>Keyword search</subject><subject>Keywords</subject><subject>Level-3 trust</subject><subject>privacy preserving keyword search</subject><subject>Read only memory</subject><subject>Searching</subject><subject>Security</subject><issn>1551-3203</issn><issn>1941-0050</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kF1LwzAUhoso-HkveBPwuvMkWdLmcsyvsYHgprclbU-3SE1rkiL7Af5vMze8OgfO874HniS5pjCiFNTdajYbMWB0xCllKpdHyRlVY5oCCDiOuxA05Qz4aXLu_QcAz4Crs-TnFVujyxbJvQ6aLDfaGbsm5ZZM0QXTmEoHbNF78mArt-2D6SxZDn3fxWsE57j97lxNlqhdtSGTtTbWB_I-tBbdX-_8aUqMJTNbDz44o9u4BnQWA-kastrEFn-ZnDS69Xh1mBfJ2-PDavqcLl6eZtPJIq2YoiHNMq0kQK3KhlOV55mqa2yUbKCSNZO8kkrTCpSox0wqJrissxIzhCxvOBMlv0hu9729674G9KH46AZn48sixqkSuQAZKdhTleu8d9gUvTOf2m0LCsVOdhFlFzvZxUF2jNzsIwYR_3ElxhQ447-ptXvN</recordid><startdate>20220601</startdate><enddate>20220601</enddate><creator>Karati, Arijit</creator><creator>Fan, Chun-I</creator><creator>Zhuang, Er-Shuo</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-5605-7354</orcidid><orcidid>https://orcid.org/0000-0002-7512-1291</orcidid></search><sort><creationdate>20220601</creationdate><title>Reliable Data Sharing by Certificateless Encryption Supporting Keyword Search Against Vulnerable KGC in Industrial Internet of Things</title><author>Karati, Arijit ; Fan, Chun-I ; Zhuang, Er-Shuo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c291t-77a9600d9bf3198879ddef96f0c6d263c69a1c095d42692536d7be7e078f325b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Access control</topic><topic>Certificateless encryption (CLE)</topic><topic>Cloud computing</topic><topic>Cost analysis</topic><topic>Cryptography</topic><topic>Data analysis</topic><topic>Data retrieval</topic><topic>Decision analysis</topic><topic>Decision making</topic><topic>Empirical analysis</topic><topic>Encryption</topic><topic>Industrial applications</topic><topic>Industrial Internet of Things</topic><topic>Industrial Internet of Things (IIoT)</topic><topic>Information sharing</topic><topic>Internet of Things</topic><topic>Keyword search</topic><topic>Keywords</topic><topic>Level-3 trust</topic><topic>privacy preserving keyword search</topic><topic>Read only memory</topic><topic>Searching</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Karati, Arijit</creatorcontrib><creatorcontrib>Fan, Chun-I</creatorcontrib><creatorcontrib>Zhuang, Er-Shuo</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on industrial informatics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Karati, Arijit</au><au>Fan, Chun-I</au><au>Zhuang, Er-Shuo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Reliable Data Sharing by Certificateless Encryption Supporting Keyword Search Against Vulnerable KGC in Industrial Internet of Things</atitle><jtitle>IEEE transactions on industrial informatics</jtitle><stitle>TII</stitle><date>2022-06-01</date><risdate>2022</risdate><volume>18</volume><issue>6</issue><spage>3661</spage><epage>3669</epage><pages>3661-3669</pages><issn>1551-3203</issn><eissn>1941-0050</eissn><coden>ITIICH</coden><abstract>Outsourcing Industrial Internet of Things (IIoT) data on the cloud extends the diversity of data analysis for decision making with minimized costs in communications and storage. However, it is adverse to the confidentiality of IIoT data from the owner as access control is performed by honest-but-curious platforms. Although the encryption strategy guarantees data security, it hinders deliverance due to its inbred all-or-nothing decryption. Certificateless encryption supporting keyword search eliminates the overhead of certificates and privileges to retrieve the required data through encrypted keyword search. However, most of the prior works are precarious against a malicious key generation center, which exposes data protected by users' private keys. We design a certificateless secure data sharing by uniting the functionalities of encryption and access control on search. Our technique resists in/outside keyword guessing attacks and sustains on-demand user revocation. Besides, it achieves Girault's Level-3 security in the standard model. Nonetheless, empirical performance analysis under a suitable scenario exhibits its feasibility compared to the other related schemes.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/TII.2021.3112986</doi><tpages>9</tpages><orcidid>https://orcid.org/0000-0001-5605-7354</orcidid><orcidid>https://orcid.org/0000-0002-7512-1291</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1551-3203
ispartof IEEE transactions on industrial informatics, 2022-06, Vol.18 (6), p.3661-3669
issn 1551-3203
1941-0050
language eng
recordid cdi_proquest_journals_2631958506
source IEEE Electronic Library (IEL)
subjects Access control
Certificateless encryption (CLE)
Cloud computing
Cost analysis
Cryptography
Data analysis
Data retrieval
Decision analysis
Decision making
Empirical analysis
Encryption
Industrial applications
Industrial Internet of Things
Industrial Internet of Things (IIoT)
Information sharing
Internet of Things
Keyword search
Keywords
Level-3 trust
privacy preserving keyword search
Read only memory
Searching
Security
title Reliable Data Sharing by Certificateless Encryption Supporting Keyword Search Against Vulnerable KGC in Industrial Internet of Things
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T05%3A27%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Reliable%20Data%20Sharing%20by%20Certificateless%20Encryption%20Supporting%20Keyword%20Search%20Against%20Vulnerable%20KGC%20in%20Industrial%20Internet%20of%20Things&rft.jtitle=IEEE%20transactions%20on%20industrial%20informatics&rft.au=Karati,%20Arijit&rft.date=2022-06-01&rft.volume=18&rft.issue=6&rft.spage=3661&rft.epage=3669&rft.pages=3661-3669&rft.issn=1551-3203&rft.eissn=1941-0050&rft.coden=ITIICH&rft_id=info:doi/10.1109/TII.2021.3112986&rft_dat=%3Cproquest_RIE%3E2631958506%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2631958506&rft_id=info:pmid/&rft_ieee_id=9541032&rfr_iscdi=true