Computer Science ›› 2019, Vol. 46 ›› Issue (8): 194-200.doi: 10.11896/j.issn.1002-137X.2019.08.032

• Information Security • Previous Articles     Next Articles

Efficient Access Control Scheme for Internet of Things Search Technology

ZHANG Yuan-yuan, QIN Ling   

  1. (School of Computer Science and Technology,Nanjing Tech University,Nanjing 211816,China)
  • Received:2018-07-17 Online:2019-08-15 Published:2019-08-15

Abstract: Internet of Things search technology is widely used in daily life,however,due to the openness of the Internet of Things search engine and the incomplete credibility of the search center,information stored in the search background has serious security issues.This paper proposed a secure and efficient attribute-based access control scheme for suppor-ting ciphertext search to solve this problem.In terms of data protection,in order to ensure the security of user attribute information and data,access policy partial hiding and attribute authority decentralization are used.Besides,ciphertext fixed length is used to improve algorithm efficiency and save storage space.At the same time,this paper proposed an attribute revocation scheme that supports policy comparison,which can reduce the computational complexity in the traditional revocation scheme and improve the efficiency of re-encryption.In the ciphertext search,the super peer is introduced and the hybrid index is used to improve the retrieval efficiency.The analysis results show that the solution effectively solves the security problem in the Internet of Things search technology

Key words: Internet of Things search technology, Access strategy partially hidden, Property revocation, Attribute authority, Ciphertext search

CLC Number: 

  • TP393
[1] WANG J H,LIU C Y,FANG B X.A Survey of Research on Data Privacy Protection for Internet of Things Search[J].Journal of Communications,2016,37(9):142-153.(in Chinese) 王佳慧,刘川意,方滨兴.面向物联网搜索的数据隐私保护研究综述[J].通信学报,2016,37(9):142-153.
[2] GORLATYKH A,ZAPECHNIKOV S.Building access tree for attribute-based encryption schemes over multidimensional data objects[C]∥IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering.IEEE,2018:1496-1499.
[3] CANARD S,PHAN D H,TRINH V C.Attribute-based broadcast encryption scheme for lightweight devices[J].IET Information Security,2018,12(1):52-59.
[4] LUAN I,PETKOVIC M,NIKOVA S,et al.Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application[C]∥Information Security Applications,International Workshop.Wisa 2009,2009.
[5] YANG F,YUAN Q,DU S,et al.Reserving relief supplies for earthquake:a multi-attribute decision making of China Red Cross[J].Annals of Operations Research,2016,247(2):759-785.
[6] EWENIKE S,BENKHELIFA E,CHIBELUSHI C.Cloud Based Collaborative Software Development:A Review,Gap Analysis and Future Directions[C]∥IEEE/ACS,International Confe-rence on Computer Systems and Applications.IEEE,2018:901-909.
[7] WANG S,ZHOU J,LIU J K,et al.An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing[J].IEEE Transactions on Information Forensics & Security,2017,11(6):1265-1277.
[8] XU X,ZHANG Q,ZHOU J.NC-MACPABE:Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems[J].Journal of Central South University,2017,24(4):807-818.
[9] GAO W,WANG G,CHEN K,et al.Efficient identity-based threshold decryption scheme from bilinear pairings[J].Frontiers of Computer Science,2018,12(2):1-13.
[10] GUO F,MU Y,SUSILO W,et al.Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices[J].IEEE Transactions on Dependable & Secure Computing,2017,14(2):211-220.
[11] MALLUHI Q M,TRINH V C.A Ciphertext-Policy Attribute-based Encryption Scheme with Optimized Ciphertext Size And Fast Decryption[C]∥ACM on Asia Conference on Computer and Communications Security.ACM,2017:230-240.
[12] ZIRTOL K A,NOROOZI M,ESLAMI Z.Multi-user searchable encryption scheme with general access structure[C]∥International Conference on Knowledge-Based Engineering and Innovation.IEEE,2016:399-404.
[13] MEI Z,ZHU H,CUI Z,et al.Executing multi-dimensional range query efficiently and flexibly over outsourced ciphertexts in the cloud[J].Information Sciences,2018,432(1):79-96.
[14] LIN S,ZHANG R,MA H,et al.Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption[J].IEEE Transactions on Information Forensics & Security,2017,10(10):2119-2130.
[15] WANG N,FU J,BHARGAVA B K,et al.Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing[J].IEEE Transactions on Information Forensics and Security,2018,13(10):2653-2667.
[16] FAN K,WANG X,SUTO K,et al.Secure and Efficient Privacy-Preserving Ciphertext Retrieval in Connected Vehicular Cloud Computing[J].IEEE Network,2018,32(3):52-57.
[17] MA H,ZHANG R,WAN Z,et al.Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing[J].IEEE Transactions on Dependable & Secure Computing,2017,14(6):679-692.
[18] YAN X X,LIU Y,LI Z C,et al.Multi-attribute attribute-based encryption scheme supporting dynamic update of policies[J].Journal of Communications,2017,38(10):94-101.(in Chinese) 闫玺玺,刘媛,李子臣,等.支持策略动态更新的多机构属性基加密方案[J].通信学报,2017,38(10):94-101.
[19] CHI P W,LEI C L.Audit-Free Cloud Storage via Deniable Attribute-based Encryption[J].IEEE Transactions on Cloud Computing,2018,6(2):414-427.
[20] HAN J,YANG Y,LIU J K,et al.Expressive attribute-based keyword search with constant-size ciphertext[J].Soft Computing,2018,22(15):5163-5177.
No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105, 130 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111, 142 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121, 136 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .