Skip to main content

2024 | OriginalPaper | Buchkapitel

Blockchain-Based Searchable Encryption Access Control Mechanism for the Internet of Things

verfasst von : Mengyuan Li, Shaoyong Guo, Wengjing Li, Ao Xiong, Dong Wang, Da Li, Feng Qi

Erschienen in: Proceedings of the 13th International Conference on Computer Engineering and Networks

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the rapid development of the Internet of Things, numerous security and trust risks, including a single point of failure for authorities, data tampering, unauthorized users decrypting data, and challenges with searching encrypted data, have emerged on the centralized Internet of Things data sharing platform. As a novel technology, blockchain offers the benefits of decentralization, tamper-proofing, and trusted data sharing. Therefore, this article suggests a blockchain-based searchable encryption access control method. Users can simply search the necessary data using keywords provided they comply with the access rules. To ensure the privacy of the data, the cloud will not get any privacy-related information. The simulation demonstrate that our study has a lower time overhead than the current investigations. Data encryption takes 33% less time than standard access control methods, decryption takes 5% less time, and searching takes 75% less time.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat D’orazio, C.J., Choo, K.-K.R.: Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps. Futur. Gener. Comput. Syst. 79, 247–261 (2018) D’orazio, C.J., Choo, K.-K.R.: Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps. Futur. Gener. Comput. Syst. 79, 247–261 (2018)
2.
Zurück zum Zitat Brown, A.J., Glisson, W.B., Andel, T.R., et al.: Cloud forecasting: Legal visibility issues in saturated environments. Comput. Law Secur. Rev. 34(6), 1278–1290 (2018)CrossRef Brown, A.J., Glisson, W.B., Andel, T.R., et al.: Cloud forecasting: Legal visibility issues in saturated environments. Comput. Law Secur. Rev. 34(6), 1278–1290 (2018)CrossRef
3.
Zurück zum Zitat Li, H., Jing, T.: A lightweight fine-grained searchable encryption scheme in fog-based healthcare IoT networks. Wirel. Commun. Mob. Comput. 2019, 1–15 (2019)CrossRef Li, H., Jing, T.: A lightweight fine-grained searchable encryption scheme in fog-based healthcare IoT networks. Wirel. Commun. Mob. Comput. 2019, 1–15 (2019)CrossRef
4.
Zurück zum Zitat Ahsan, M.A.M., Ali, I., Imran, M., et al.: A fog-centric secure cloud storage scheme. IEEE Trans. Sustain. Comput. 7(2), 250–262 (2022)CrossRef Ahsan, M.A.M., Ali, I., Imran, M., et al.: A fog-centric secure cloud storage scheme. IEEE Trans. Sustain. Comput. 7(2), 250–262 (2022)CrossRef
5.
Zurück zum Zitat Yin, H., Zhang, J., Xiong, Y., et al.: CP-ABSE: a ciphertext-policy attribute-based searchable encryption scheme. IEEE Access 7, 5682–5694 (2019)CrossRef Yin, H., Zhang, J., Xiong, Y., et al.: CP-ABSE: a ciphertext-policy attribute-based searchable encryption scheme. IEEE Access 7, 5682–5694 (2019)CrossRef
6.
Zurück zum Zitat Mamta, Gupta, B.B., Li, K.-C., et al.: Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE/CAA J. Autom. Sin. 8(12), 1877–1890 (2021) Mamta, Gupta, B.B., Li, K.-C., et al.: Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE/CAA J. Autom. Sin. 8(12), 1877–1890 (2021)
7.
Zurück zum Zitat Wang, H., Li, Y., Susilo, W., et al.: A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing. Comput. Stand. Interfaces 82 (2022) Wang, H., Li, Y., Susilo, W., et al.: A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing. Comput. Stand. Interfaces 82 (2022)
9.
Zurück zum Zitat Zubaydi, H.D., Varga, P., Molnar, S.: Leveraging blockchain technology for ensuring security and privacy aspects in internet of things: a systematic literature review. Sensors (Basel) 23(2) (2023) Zubaydi, H.D., Varga, P., Molnar, S.: Leveraging blockchain technology for ensuring security and privacy aspects in internet of things: a systematic literature review. Sensors (Basel) 23(2) (2023)
10.
Zurück zum Zitat Wei, X., Yan, Y., Guo, S., et al.: Secure data sharing: blockchain-enabled data access control framework for IoT. IEEE Internet Things J. 9(11), 8143–8153 (2022)CrossRef Wei, X., Yan, Y., Guo, S., et al.: Secure data sharing: blockchain-enabled data access control framework for IoT. IEEE Internet Things J. 9(11), 8143–8153 (2022)CrossRef
12.
Zurück zum Zitat Zhang, L., Ye, Y., Mu, Y.: Multiauthority access control with anonymous authentication for personal health record. IEEE Internet Things J. 8(1), 156–167 (2021)CrossRef Zhang, L., Ye, Y., Mu, Y.: Multiauthority access control with anonymous authentication for personal health record. IEEE Internet Things J. 8(1), 156–167 (2021)CrossRef
13.
Zurück zum Zitat De, S.J., Ruj, S.: Efficient decentralized attribute based access control for mobile clouds. IEEE Trans. Cloud Comput. 8(1), 124–137 (2020)CrossRef De, S.J., Ruj, S.: Efficient decentralized attribute based access control for mobile clouds. IEEE Trans. Cloud Comput. 8(1), 124–137 (2020)CrossRef
14.
Zurück zum Zitat Rouselakis, Y., Waters, B.: Effificient statically-secure large-universe multi-authority attribute-based encryption. In: International Conference on Financial Cryptography and Data Security, pp. 315–332. Springer, Berlin (2015) Rouselakis, Y., Waters, B.: Effificient statically-secure large-universe multi-authority attribute-based encryption. In: International Conference on Financial Cryptography and Data Security, pp. 315–332. Springer, Berlin (2015)
15.
Zurück zum Zitat Chen, R., Mu, Y., Yang, G., et al.: Server-aided public key encryption with keyword search. IEEE Trans. Inf. Forensics Secur. 11(12), 2833–2842 (2016)CrossRef Chen, R., Mu, Y., Yang, G., et al.: Server-aided public key encryption with keyword search. IEEE Trans. Inf. Forensics Secur. 11(12), 2833–2842 (2016)CrossRef
Metadaten
Titel
Blockchain-Based Searchable Encryption Access Control Mechanism for the Internet of Things
verfasst von
Mengyuan Li
Shaoyong Guo
Wengjing Li
Ao Xiong
Dong Wang
Da Li
Feng Qi
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-9247-8_26