2020
DOI: 10.1002/ett.3905
|View full text |Cite
|
Sign up to set email alerts
|

Provable secure lightweight attribute‐based keyword search for cloud‐based Internet of Things networks

Abstract: As more data from Internet of Things (IoT) devices is outsourced to cloud service providers, the need for secure and efficient fine‐grained access control and data retrieving mechanisms will be increasingly pressing. Attribute‐based keyword search (ABKS) is a promising tool to provide the required infrastructures. However, most of the existing ABKS schemes suffer from expensive computational overhead on the user side. This feature makes such schemes unsuitable for IoT applications as IoT devices usually have l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 38 publications
0
3
0
Order By: Relevance
“…The security aspects of the proposed SC-ABSE scheme are established on the basis of the following theorems. The security proofs of theorems 1 and 2 are comparable to the scheme in [ 61 ].…”
Section: Security Analysismentioning
confidence: 97%
“…The security aspects of the proposed SC-ABSE scheme are established on the basis of the following theorems. The security proofs of theorems 1 and 2 are comparable to the scheme in [ 61 ].…”
Section: Security Analysismentioning
confidence: 97%
“…As a remedy for this problem, Green et al [17] proposed the frst content-based outsourcing decryption scheme, and the decryption process is safely transferred to the cloud server. From then on, large numbers of outsourcing schemes have been proposed to achieve lightweight, Ali and Sadeghi [18] proposed an attribute-based keyword search scheme in cloud computing and outsourced some encryption and decryption work to cloud servers. In 2021, Meng et al [19] proposed an attribute-based dynamic keyword search encryption in fog computing and outsourced part of the encryption and decryption work to fog nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Nowadays, IoT is used to solve many different challenges in human life, such as automotive, healthcare, retail, logistics smart cities, manufacturing, advanced environment monitoring, media, and entertainment industry by providing many applications and services. Moreover, the number of IoT devices is increasing significantly, so that by 2025 the number of these devices is expected to be more than 4 trillion 1 . As the number of IoT devices increases, a large amount of data is generated by IoT nodes needing process and storage 2 .…”
Section: Introductionmentioning
confidence: 99%