Multi-sensor network tracking research utilizing searchable encryption algorithm in the cloud computing environment
Presently, the focus of target detection is shifting towards the integration of information acquired from multiple sensors. When faced with a vast amount of data from various sensors, ensuring data security during transmission and storage in the cloud becomes a primary concern. Data files can be enc...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
PeerJ Inc.
2023-06-01
|
Series: | PeerJ Computer Science |
Subjects: | |
Online Access: | https://peerj.com/articles/cs-1433.pdf |
_version_ | 1797797535327191040 |
---|---|
author | Xiaoling Sun Shanshan Li |
author_facet | Xiaoling Sun Shanshan Li |
author_sort | Xiaoling Sun |
collection | DOAJ |
description | Presently, the focus of target detection is shifting towards the integration of information acquired from multiple sensors. When faced with a vast amount of data from various sensors, ensuring data security during transmission and storage in the cloud becomes a primary concern. Data files can be encrypted and stored in the cloud. When using data, the required data files can be returned through ciphertext retrieval, and then searchable encryption technology can be developed. However, the existing searchable encryption algorithms mainly ignore the data explosion problem in a cloud computing environment. The issue of authorised access under cloud computing has yet to be solved uniformly, resulting in a waste of computing power by data users when processing more and more data. Furthermore, to save computing resources, ECS (encrypted cloud storage) may only return a fragment of results in response to a search query, lacking a practical and universal verification mechanism. Therefore, this article proposes a lightweight, fine-grained searchable encryption scheme tailored to the cloud edge computing environment. We generate ciphertext and search trap gates for terminal devices based on bilinear pairs and introduce access policies to restrict ciphertext search permissions, which improves the efficiency of ciphertext generation and retrieval. This scheme allows for encryption and trapdoor calculation generation on auxiliary terminal devices, with complex calculations carried out on edge devices. The resulting method ensures secure data access, fast search in multi-sensor network tracking, and accelerates computing speed while maintaining data security. Ultimately, experimental comparisons and analyses demonstrate that the proposed method improves data retrieval efficiency by approximately 62%, reduces the storage overhead of the public key, ciphertext index, and verifiable searchable ciphertext by half, and effectively mitigates delays in data transmission and computation processes. |
first_indexed | 2024-03-13T03:49:49Z |
format | Article |
id | doaj.art-6283fb5e235245cea053c1f613b69cb6 |
institution | Directory Open Access Journal |
issn | 2376-5992 |
language | English |
last_indexed | 2024-03-13T03:49:49Z |
publishDate | 2023-06-01 |
publisher | PeerJ Inc. |
record_format | Article |
series | PeerJ Computer Science |
spelling | doaj.art-6283fb5e235245cea053c1f613b69cb62023-06-22T15:05:09ZengPeerJ Inc.PeerJ Computer Science2376-59922023-06-019e143310.7717/peerj-cs.1433Multi-sensor network tracking research utilizing searchable encryption algorithm in the cloud computing environmentXiaoling Sun0Shanshan Li1School of Information Engineering, Institute of Disaster Prevention, Langfang, Hebei, ChinaSchool of Information Engineering, Institute of Disaster Prevention, Langfang, Hebei, ChinaPresently, the focus of target detection is shifting towards the integration of information acquired from multiple sensors. When faced with a vast amount of data from various sensors, ensuring data security during transmission and storage in the cloud becomes a primary concern. Data files can be encrypted and stored in the cloud. When using data, the required data files can be returned through ciphertext retrieval, and then searchable encryption technology can be developed. However, the existing searchable encryption algorithms mainly ignore the data explosion problem in a cloud computing environment. The issue of authorised access under cloud computing has yet to be solved uniformly, resulting in a waste of computing power by data users when processing more and more data. Furthermore, to save computing resources, ECS (encrypted cloud storage) may only return a fragment of results in response to a search query, lacking a practical and universal verification mechanism. Therefore, this article proposes a lightweight, fine-grained searchable encryption scheme tailored to the cloud edge computing environment. We generate ciphertext and search trap gates for terminal devices based on bilinear pairs and introduce access policies to restrict ciphertext search permissions, which improves the efficiency of ciphertext generation and retrieval. This scheme allows for encryption and trapdoor calculation generation on auxiliary terminal devices, with complex calculations carried out on edge devices. The resulting method ensures secure data access, fast search in multi-sensor network tracking, and accelerates computing speed while maintaining data security. Ultimately, experimental comparisons and analyses demonstrate that the proposed method improves data retrieval efficiency by approximately 62%, reduces the storage overhead of the public key, ciphertext index, and verifiable searchable ciphertext by half, and effectively mitigates delays in data transmission and computation processes.https://peerj.com/articles/cs-1433.pdfSearchable encryption algorithmCloud computingNetworking trackingEdge computingVerifiability |
spellingShingle | Xiaoling Sun Shanshan Li Multi-sensor network tracking research utilizing searchable encryption algorithm in the cloud computing environment PeerJ Computer Science Searchable encryption algorithm Cloud computing Networking tracking Edge computing Verifiability |
title | Multi-sensor network tracking research utilizing searchable encryption algorithm in the cloud computing environment |
title_full | Multi-sensor network tracking research utilizing searchable encryption algorithm in the cloud computing environment |
title_fullStr | Multi-sensor network tracking research utilizing searchable encryption algorithm in the cloud computing environment |
title_full_unstemmed | Multi-sensor network tracking research utilizing searchable encryption algorithm in the cloud computing environment |
title_short | Multi-sensor network tracking research utilizing searchable encryption algorithm in the cloud computing environment |
title_sort | multi sensor network tracking research utilizing searchable encryption algorithm in the cloud computing environment |
topic | Searchable encryption algorithm Cloud computing Networking tracking Edge computing Verifiability |
url | https://peerj.com/articles/cs-1433.pdf |
work_keys_str_mv | AT xiaolingsun multisensornetworktrackingresearchutilizingsearchableencryptionalgorithminthecloudcomputingenvironment AT shanshanli multisensornetworktrackingresearchutilizingsearchableencryptionalgorithminthecloudcomputingenvironment |