Vis enkel innførsel

dc.contributor.authorZhou, Rang
dc.contributor.authorZhang, Xiaosong
dc.contributor.authorWang, Xiaofeng
dc.contributor.authorYang, Guowu
dc.contributor.authorWang, Hao
dc.contributor.authorWu, Yulei
dc.date.accessioned2019-11-06T14:10:29Z
dc.date.available2019-11-06T14:10:29Z
dc.date.created2019-04-20T22:04:06Z
dc.date.issued2019
dc.identifier.citationInformation Sciences. 2019, 491 251-264.nb_NO
dc.identifier.issn0020-0255
dc.identifier.urihttp://hdl.handle.net/11250/2626976
dc.description.abstractFog computing, as an assisted method for cloud computing, collects Internet of Things (IoT) data to multiple fog nodes on the edge of IoT and outsources them to the cloud for data search, and it reduces the computation cost on IoT nodes and provides fine-grained search right management. However, to provide privacy-preserving IoT data search, the existing searchable encryptions are very inefficient as the computation cost is too high for the resource-constrained IoT ends. Moreover, to provide dynamic search right management, the users need to be online all the time in the existing schemes, which is impractical. In this paper, we first present a new fog-assisted privacy-preserving IoT data search framework, where the data from each IoT device is collected by a fog node, stored in a determined document and outsourced to the cloud, the users search the data through the fog nodes, and the fine-grained search right management is maintained at document level. Under this framework, two searchable encryption schemes are proposed, i.e., Credible Fog Nodes assisted Searchable Encryption (CFN-SE) and Semi-trusted Fog Nodes assisted Searchable Encryption (STFN-SE). In CFN-SE scheme, the indexes and trapdoors are generated by the fog nodes, which greatly reduce the computation costs at the IoT devices and user ends, and fog nodes are used to support offline users’ key update. In STFN-SE scheme, the semi-trusted fog nodes are used to provide storage of encrypted key update information to assist offline users’ search right update. In both schemes, no re-encryption of the keywords is needed in search right updates. The performance evaluations of our schemes demonstrate the feasibility and high efficiency of our system.nb_NO
dc.language.isoengnb_NO
dc.publisherElseviernb_NO
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/deed.no*
dc.titlePrivacy-preserving data search with fine-grained dynamic search right management in fog-assisted Internet of Thingsnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber251-264nb_NO
dc.source.volume491nb_NO
dc.source.journalInformation Sciencesnb_NO
dc.identifier.doi10.1016/j.ins.2019.04.003
dc.identifier.cristin1693260
dc.description.localcode© 2019. This is the authors’ accepted and refereed manuscript to the article. Locked until 2.4.2021 due to copyright restrictions. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/nb_NO
cristin.unitcode194,63,10,0
cristin.unitnameInstitutt for datateknologi og informatikk
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode2


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal