دانلود رایگان مقاله انگلیسی پروتکل رمزنگاری موثر و امن برای اینترنت اشیای ابری - الزویر 2018

عنوان فارسی
پروتکل رمزنگاری موثر و امن برای اینترنت اشیای ابری
عنوان انگلیسی
Efficient and secure searchable encryption protocol for cloud-based Internet of Things
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
10
سال انتشار
2018
نشریه
الزویر - Elsevier
فرمت مقاله انگلیسی
PDF
کد محصول
E6823
رشته های مرتبط با این مقاله
کامپیوتر، فناوری اطلاعات
گرایش های مرتبط با این مقاله
رایانش ابری، امنیت اطلاعات، اینترنت و شبکه های گسترده
مجله
مجله محاسبات موازی و توزیع شده - Journal of Parallel and Distributed Computing
دانشگاه
State Key Lab of Software Engineering - Computer School - Wuhan University - China
کلمات کلیدی
اینترنت اشیا، ابر اشیا، رمزگذاری قابل جستجو، حریم خصوصی، انعطاف پذیری تزریق فایل، کلمه کلیدی تخمین زننده انعطاف پذیری حمله
چکیده

abstract


Internet of things (IoT) applications comprising thousands or millions of intelligent devices or things is fast becoming a norm in our inter-connected world, and the significant amount of data generated from IoT applications is often stored in the cloud. However, searching encrypted data (i.e. Searchable Encryption—SE) in the cloud remains an ongoing challenge. Existing SE protocols include searchable symmetric encryption (SSE) and public-key encryption with keyword search (PEKS). Limitations of SSE include complex and expensive key management and distribution, while PEKS suffer from inefficiency and are vulnerable to insider keyword guessing attacks (KGA). Besides, most protocols are insecure against file-injection attacks carried out by a malicious server. Thus, in this paper, we propose an efficient and secure searchable encryption protocol using the trapdoor permutation function (TPF). The protocol is designed for cloud-based IoT (also referred to as Cloud of Things – CoT) deployment, such as Cloud of Battlefield Things and Cloud of Military Things. Compared with other existing SE protocols, our proposed SE protocol incurs lower computation cost at the expense of a slightly higher storage cost (which is less of an issue, considering the decreasing costs of storage). We also prove that our protocol achieves inside KGA resilience, forward privacy, and file-injection attack resilience.

نتیجه گیری

7. Conclusion


Cloud of Things is likely to be more popular and possibly resulting in other trends such as Cloud of Battlefield Things and Cloud of Military Things. Therefore, it is important for any organization, public or private, seeking to deploy Cloud of Things and related architecture to be assured of the security of the system and privacy of data outsourced to the cloud.


In this paper, we sought to contribute to one of many Cloud of Things security and privacy challenges. Specifically, we defined a searchable encryption protocol, its security model, and security requirements. We then proved the security of the protocol, as well as demonstrating the utility of the protocol in comparison to four other related protocols in the literature.


Future research includes collaborating with a Cloud of Things provider to implement a prototype of the proposed protocol, with the aims of evaluating and refining the protocol to make it more scalable and applicable for real-world deployment.


بدون دیدگاه