Table of Content

Open Access iconOpen Access

ARTICLE

crossmark

IoT Services: Realizing Private Real-Time Detection via Authenticated Conjunctive Searchable Encryption

Chungen Xu1,*, Lin Mei1, Jinxue Cheng2, Yu Zhao1, Cong Zuo3

1 School of Science, Nanjing University of Science and Technology, Nanjing, 210094, China
2 China Mobile (Hangzhou) Information Technology Co., Ltd., Hangzhou, 310011, China
3 Faculty of Information Technology, Monash University, Clayton, 3168, Australia

* Corresponding Author: Chungen Xu. Email: email

Journal of Cyber Security 2021, 3(1), 55-67. https://doi.org/10.32604/jcs.2021.017217

Abstract

With the rapid development of wireless communication technology, the Internet of Things is playing an increasingly important role in our everyday. The amount of data generated by sensor devices is increasing as a large number of connectable devices are deployed in many fields, including the medical, agricultural, and industrial areas. Uploading data to the cloud solves the problem of data overhead but results in privacy issues. Therefore, the question of how to manage the privacy of uploading data and make it available to be interconnected between devices is a crucial issue. In this paper, we propose a scheme that supports real-time authentication with conjunctive keyword detection (RA-CKD), this scheme can realize the interconnection of encrypted data between devices while ensuring some measure of privacy for both encrypted data and detection tokens. Through authentication technology, connected devices can both authenticate each other’s identity and prevent malicious adversaries from interfering with device interconnection. Finally, we prove that our scheme can resist inside keyword guessing attack through rigorous security reduction. The experiment shows that the efficiency of RA-CKD is good enough to be practical.

Keywords


Cite This Article

C. Xu, L. Mei, J. Cheng, Y. Zhao and C. Zuo, "Iot services: realizing private real-time detection via authenticated conjunctive searchable encryption," Journal of Cyber Security, vol. 3, no.1, pp. 55–67, 2021.



cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1586

    View

  • 1198

    Download

  • 0

    Like

Share Link