A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks
Wireless sensor networks (WSN) generally utilize cloud computing to store and process sensing data in real time, namely, cloud-assisted WSN. However, the cloud-assisted WSN faces new security challenges, particularly outsourced data confidentiality. Data Encryption is a fundamental approach but it l...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-06-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/19/11/2583 |
_version_ | 1811301953290895360 |
---|---|
author | Binrui Zhu Willy Susilo Jing Qin Fuchun Guo Zhen Zhao Jixin Ma |
author_facet | Binrui Zhu Willy Susilo Jing Qin Fuchun Guo Zhen Zhao Jixin Ma |
author_sort | Binrui Zhu |
collection | DOAJ |
description | Wireless sensor networks (WSN) generally utilize cloud computing to store and process sensing data in real time, namely, cloud-assisted WSN. However, the cloud-assisted WSN faces new security challenges, particularly outsourced data confidentiality. Data Encryption is a fundamental approach but it limits target data retrieval in massive encrypted data. Public key encryption with keyword search (PEKS) enables a data receiver to retrieve encrypted data containing some specific keyword in cloud-assisted WSN. However, the traditional PEKS schemes suffer from an inherent problem, namely, the keyword guessing attack (KGA). KGA includes off-line KGA and on-line KGA. To date, the existing literature on PEKS cannot simultaneously resist both off-line KGA and on-line KGA performed by an external adversary and an internal adversary. In this work, we propose a secure and efficient data sharing and searching scheme to address the aforementioned problem such that our scheme is secure against both off-line KGA and on-line KGA performed by external and internal adversaries. We would like to stress that our scheme simultaneously achieves document encryption/decryption and keyword search functions. We also prove our scheme achieves keyword security and document security. Furthermore, our scheme is more efficient than previous schemes by eliminating the pairing computation. |
first_indexed | 2024-04-13T07:19:21Z |
format | Article |
id | doaj.art-bb61c1245f314a05b42fbfbe3f82a0d1 |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-04-13T07:19:21Z |
publishDate | 2019-06-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-bb61c1245f314a05b42fbfbe3f82a0d12022-12-22T02:56:40ZengMDPI AGSensors1424-82202019-06-011911258310.3390/s19112583s19112583A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor NetworksBinrui Zhu0Willy Susilo1Jing Qin2Fuchun Guo3Zhen Zhao4Jixin Ma5School of Mathematics, Shandong University, Jinan 250100, ChinaSchool of Computing and Information Technology, University of Wollongong, Wollongong 2522, AustraliaSchool of Mathematics, Shandong University, Jinan 250100, ChinaSchool of Computing and Information Technology, University of Wollongong, Wollongong 2522, AustraliaSchool of Computing and Information Technology, University of Wollongong, Wollongong 2522, AustraliaCentre for Computer and Computational Science at School of Computing and Mathematical Sciences, University of Greenwich, London SE10 9LS, UKWireless sensor networks (WSN) generally utilize cloud computing to store and process sensing data in real time, namely, cloud-assisted WSN. However, the cloud-assisted WSN faces new security challenges, particularly outsourced data confidentiality. Data Encryption is a fundamental approach but it limits target data retrieval in massive encrypted data. Public key encryption with keyword search (PEKS) enables a data receiver to retrieve encrypted data containing some specific keyword in cloud-assisted WSN. However, the traditional PEKS schemes suffer from an inherent problem, namely, the keyword guessing attack (KGA). KGA includes off-line KGA and on-line KGA. To date, the existing literature on PEKS cannot simultaneously resist both off-line KGA and on-line KGA performed by an external adversary and an internal adversary. In this work, we propose a secure and efficient data sharing and searching scheme to address the aforementioned problem such that our scheme is secure against both off-line KGA and on-line KGA performed by external and internal adversaries. We would like to stress that our scheme simultaneously achieves document encryption/decryption and keyword search functions. We also prove our scheme achieves keyword security and document security. Furthermore, our scheme is more efficient than previous schemes by eliminating the pairing computation.https://www.mdpi.com/1424-8220/19/11/2583wireless sensor networkscloud computingInternet of Thingspublic key encryption with keyword searchoff-line keyword guessing attackon-line keyword guessing attack |
spellingShingle | Binrui Zhu Willy Susilo Jing Qin Fuchun Guo Zhen Zhao Jixin Ma A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks Sensors wireless sensor networks cloud computing Internet of Things public key encryption with keyword search off-line keyword guessing attack on-line keyword guessing attack |
title | A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks |
title_full | A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks |
title_fullStr | A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks |
title_full_unstemmed | A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks |
title_short | A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks |
title_sort | secure and efficient data sharing and searching scheme in wireless sensor networks |
topic | wireless sensor networks cloud computing Internet of Things public key encryption with keyword search off-line keyword guessing attack on-line keyword guessing attack |
url | https://www.mdpi.com/1424-8220/19/11/2583 |
work_keys_str_mv | AT binruizhu asecureandefficientdatasharingandsearchingschemeinwirelesssensornetworks AT willysusilo asecureandefficientdatasharingandsearchingschemeinwirelesssensornetworks AT jingqin asecureandefficientdatasharingandsearchingschemeinwirelesssensornetworks AT fuchunguo asecureandefficientdatasharingandsearchingschemeinwirelesssensornetworks AT zhenzhao asecureandefficientdatasharingandsearchingschemeinwirelesssensornetworks AT jixinma asecureandefficientdatasharingandsearchingschemeinwirelesssensornetworks AT binruizhu secureandefficientdatasharingandsearchingschemeinwirelesssensornetworks AT willysusilo secureandefficientdatasharingandsearchingschemeinwirelesssensornetworks AT jingqin secureandefficientdatasharingandsearchingschemeinwirelesssensornetworks AT fuchunguo secureandefficientdatasharingandsearchingschemeinwirelesssensornetworks AT zhenzhao secureandefficientdatasharingandsearchingschemeinwirelesssensornetworks AT jixinma secureandefficientdatasharingandsearchingschemeinwirelesssensornetworks |