Open Access
ARTICLE
IoT Services: Realizing Private Real-Time Detection via Authenticated Conjunctive Searchable Encryption
Chungen Xu1,*, Lin Mei1, Jinxue Cheng2, Yu Zhao1, Cong Zuo3
1 School of Science, Nanjing University of Science and Technology, Nanjing, 210094, China
2 China Mobile (Hangzhou) Information Technology Co., Ltd., Hangzhou, 310011, China
3 Faculty of Information Technology, Monash University, Clayton, 3168, Australia
* Corresponding Author: Chungen Xu. Email:
Journal of Cyber Security 2021, 3(1), 55-67. https://doi.org/10.32604/jcs.2021.017217
Received 24 January 2021; Accepted 06 April 2021; Issue published 30 April 2021
Abstract
With the rapid development of wireless communication technology,
the Internet of Things is playing an increasingly important role in our everyday.
The amount of data generated by sensor devices is increasing as a large number
of connectable devices are deployed in many fields, including the medical,
agricultural, and industrial areas. Uploading data to the cloud solves the problem
of data overhead but results in privacy issues. Therefore, the question of how to
manage the privacy of uploading data and make it available to be interconnected
between devices is a crucial issue. In this paper, we propose a scheme that
supports real-time authentication with conjunctive keyword detection (RA-CKD),
this scheme can realize the interconnection of encrypted data between devices
while ensuring some measure of privacy for both encrypted data and detection
tokens. Through authentication technology, connected devices can both
authenticate each other’s identity and prevent malicious adversaries from
interfering with device interconnection. Finally, we prove that our scheme can
resist inside keyword guessing attack through rigorous security reduction. The
experiment shows that the efficiency of RA-CKD is good enough to be practical.
Keywords
Cite This Article
C. Xu, L. Mei, J. Cheng, Y. Zhao and C. Zuo, "Iot services: realizing private real-time detection via authenticated conjunctive searchable encryption,"
Journal of Cyber Security, vol. 3, no.1, pp. 55–67, 2021.