7. Conclusion
Cloud of Things is likely to be more popular and possibly resulting in other trends such as Cloud of Battlefield Things and Cloud of Military Things. Therefore, it is important for any organization, public or private, seeking to deploy Cloud of Things and related architecture to be assured of the security of the system and privacy of data outsourced to the cloud.
In this paper, we sought to contribute to one of many Cloud of Things security and privacy challenges. Specifically, we defined a searchable encryption protocol, its security model, and security requirements. We then proved the security of the protocol, as well as demonstrating the utility of the protocol in comparison to four other related protocols in the literature.
Future research includes collaborating with a Cloud of Things provider to implement a prototype of the proposed protocol, with the aims of evaluating and refining the protocol to make it more scalable and applicable for real-world deployment.