使用基于完全同态的 SE (FHSE) 方案进行物联网数据加密和基于短语搜索的高效处理

IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pervasive and Mobile Computing Pub Date : 2024-06-06 DOI:10.1016/j.pmcj.2024.101952
S. Hamsanandhini, P. Balasubramanie
{"title":"使用基于完全同态的 SE (FHSE) 方案进行物联网数据加密和基于短语搜索的高效处理","authors":"S. Hamsanandhini,&nbsp;P. Balasubramanie","doi":"10.1016/j.pmcj.2024.101952","DOIUrl":null,"url":null,"abstract":"<div><p>In this study, the Efficient Multikeyword Fully Homomorphic Search Encryption (EMK-FHSE) model is proposed to improve cloud storage security for sensitive data. When fully homomorphic encryption (FHE) and search encryption (SE) technologies are coupled, Fully Homomorphic Search Encryption (FHSE) is a strategy that realizes the shared information's controlled privacy and search security. As more and more encrypted data is kept on cloud servers (CSs), a single-keyword SE approach may cause multiple keyword index duplication concerns, making it challenging for CSs to search for the encrypted information. To reduce these problems, a novel efficiency bottleneck has been developed. An Adaptive Privacy-Preserving Fuzzy Multi-Keyword Search (APPFMK) approach is presented to address the difficulties of low search effectiveness in a single-keyword searching strategy and the high processing cost of the existing multi-keyword schemes. Cloud servers (CS) hold enormous volumes of encrypted data, and the necessary encrypted index is transmitted to the closest edge node (EN) to enable multi-keyword searches and supported decryption. According to security research, the EMK-FHSE multi-keyword index is safe in distinguishability under chosen keyword attacks. The results section compares the proposed model's search, storage, trapdoor, calculation, storage and validation times to those of several other models. The proposed model could achieve the following values: 60.81 kb for storage, 10.92 for the trapdoor, 6.85 ms for search, 0.44 ms for computation cost by changing the keyword in a trapdoor, 156.31 ms for computation cost by changing the keyword in a dictionary, 0.44 kb for storage cost by changing the keyword in a trapdoor, 1.81 kb for storage cost by changing the keyword in a dictionary and 0.016seconds for verification time, respectively.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0000,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"IoT data encryption and phrase search-based efficient processing using a Fully Homomorphic-based SE (FHSE) scheme\",\"authors\":\"S. Hamsanandhini,&nbsp;P. Balasubramanie\",\"doi\":\"10.1016/j.pmcj.2024.101952\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>In this study, the Efficient Multikeyword Fully Homomorphic Search Encryption (EMK-FHSE) model is proposed to improve cloud storage security for sensitive data. When fully homomorphic encryption (FHE) and search encryption (SE) technologies are coupled, Fully Homomorphic Search Encryption (FHSE) is a strategy that realizes the shared information's controlled privacy and search security. As more and more encrypted data is kept on cloud servers (CSs), a single-keyword SE approach may cause multiple keyword index duplication concerns, making it challenging for CSs to search for the encrypted information. To reduce these problems, a novel efficiency bottleneck has been developed. An Adaptive Privacy-Preserving Fuzzy Multi-Keyword Search (APPFMK) approach is presented to address the difficulties of low search effectiveness in a single-keyword searching strategy and the high processing cost of the existing multi-keyword schemes. Cloud servers (CS) hold enormous volumes of encrypted data, and the necessary encrypted index is transmitted to the closest edge node (EN) to enable multi-keyword searches and supported decryption. According to security research, the EMK-FHSE multi-keyword index is safe in distinguishability under chosen keyword attacks. The results section compares the proposed model's search, storage, trapdoor, calculation, storage and validation times to those of several other models. The proposed model could achieve the following values: 60.81 kb for storage, 10.92 for the trapdoor, 6.85 ms for search, 0.44 ms for computation cost by changing the keyword in a trapdoor, 156.31 ms for computation cost by changing the keyword in a dictionary, 0.44 kb for storage cost by changing the keyword in a trapdoor, 1.81 kb for storage cost by changing the keyword in a dictionary and 0.016seconds for verification time, respectively.</p></div>\",\"PeriodicalId\":49005,\"journal\":{\"name\":\"Pervasive and Mobile Computing\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":3.0000,\"publicationDate\":\"2024-06-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Pervasive and Mobile Computing\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1574119224000762\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Pervasive and Mobile Computing","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1574119224000762","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

本研究提出了高效多词全同态搜索加密(EMK-FHSE)模型,以提高敏感数据的云存储安全性。全同态加密(FHE)和搜索加密(SE)技术结合后,全同态搜索加密(FHSE)是一种实现共享信息隐私可控和搜索安全的策略。随着越来越多的加密数据被保存在云服务器(CS)上,单关键词 SE 方法可能会引起多个关键词索引重复的问题,使 CS 在搜索加密信息时面临挑战。为了减少这些问题,我们开发了一种新的效率瓶颈。本文提出了一种自适应隐私保护模糊多关键词搜索(APPFMK)方法,以解决单关键词搜索策略搜索效率低和现有多关键词方案处理成本高的难题。云服务器(CS)拥有海量加密数据,必要的加密索引被传输到最近的边缘节点(EN),以实现多关键词搜索并支持解密。根据安全研究,EMK-FHSE 多关键词索引在所选关键词攻击下的可区分性是安全的。结果部分比较了拟议模型与其他几个模型的搜索、存储、陷阱门、计算、存储和验证时间。建议的模型可以达到以下值:存储时间为 60.81 kb,陷阱门时间为 10.92,搜索时间为 6.85 ms,改变陷阱门关键词的计算成本为 0.44 ms,改变字典关键词的计算成本为 156.31 ms,改变陷阱门关键词的存储成本为 0.44 kb,改变字典关键词的存储成本为 1.81 kb,验证时间为 0.016 秒。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
IoT data encryption and phrase search-based efficient processing using a Fully Homomorphic-based SE (FHSE) scheme

In this study, the Efficient Multikeyword Fully Homomorphic Search Encryption (EMK-FHSE) model is proposed to improve cloud storage security for sensitive data. When fully homomorphic encryption (FHE) and search encryption (SE) technologies are coupled, Fully Homomorphic Search Encryption (FHSE) is a strategy that realizes the shared information's controlled privacy and search security. As more and more encrypted data is kept on cloud servers (CSs), a single-keyword SE approach may cause multiple keyword index duplication concerns, making it challenging for CSs to search for the encrypted information. To reduce these problems, a novel efficiency bottleneck has been developed. An Adaptive Privacy-Preserving Fuzzy Multi-Keyword Search (APPFMK) approach is presented to address the difficulties of low search effectiveness in a single-keyword searching strategy and the high processing cost of the existing multi-keyword schemes. Cloud servers (CS) hold enormous volumes of encrypted data, and the necessary encrypted index is transmitted to the closest edge node (EN) to enable multi-keyword searches and supported decryption. According to security research, the EMK-FHSE multi-keyword index is safe in distinguishability under chosen keyword attacks. The results section compares the proposed model's search, storage, trapdoor, calculation, storage and validation times to those of several other models. The proposed model could achieve the following values: 60.81 kb for storage, 10.92 for the trapdoor, 6.85 ms for search, 0.44 ms for computation cost by changing the keyword in a trapdoor, 156.31 ms for computation cost by changing the keyword in a dictionary, 0.44 kb for storage cost by changing the keyword in a trapdoor, 1.81 kb for storage cost by changing the keyword in a dictionary and 0.016seconds for verification time, respectively.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Pervasive and Mobile Computing
Pervasive and Mobile Computing COMPUTER SCIENCE, INFORMATION SYSTEMS-TELECOMMUNICATIONS
CiteScore
7.70
自引率
2.30%
发文量
80
审稿时长
68 days
期刊介绍: As envisioned by Mark Weiser as early as 1991, pervasive computing systems and services have truly become integral parts of our daily lives. Tremendous developments in a multitude of technologies ranging from personalized and embedded smart devices (e.g., smartphones, sensors, wearables, IoTs, etc.) to ubiquitous connectivity, via a variety of wireless mobile communications and cognitive networking infrastructures, to advanced computing techniques (including edge, fog and cloud) and user-friendly middleware services and platforms have significantly contributed to the unprecedented advances in pervasive and mobile computing. Cutting-edge applications and paradigms have evolved, such as cyber-physical systems and smart environments (e.g., smart city, smart energy, smart transportation, smart healthcare, etc.) that also involve human in the loop through social interactions and participatory and/or mobile crowd sensing, for example. The goal of pervasive computing systems is to improve human experience and quality of life, without explicit awareness of the underlying communications and computing technologies. The Pervasive and Mobile Computing Journal (PMC) is a high-impact, peer-reviewed technical journal that publishes high-quality scientific articles spanning theory and practice, and covering all aspects of pervasive and mobile computing and systems.
期刊最新文献
A controllability method on the social Internet of Things (SIoT) network INLEC: An involutive and low energy lightweight block cipher for internet of things Pressure distribution based 2D in-bed keypoint prediction under interfered scenes Blockchain-enhanced efficient and anonymous certificateless signature scheme and its application Can smartphones serve as an instrument for driver behavior of intelligent transportation systems research? A systematic review: Challenges, motivations, and recommendations
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1