Delegated Key-Policy Attribute-Based Set Intersection over Outsourced Encrypted Data Sets for CloudIoT

نویسندگان

چکیده

Private set intersection (PSI) is a fundamental cryptographic primitive, allowing two parties to calculate the of their data sets without exposing additional private information. In cloud-based IoT system, IoT-enabled devices would like outsource in encrypted form cloud. this scenario, how delegate computation over outsourced cloud and achieve fine-grained access control for PSI divulging any information are still open problems. With that mind, work, we combine key-policy attribute-based encryption (KP-ABE) introduce such novel concept, called delegated (KP-ABSI), solve problem. Then propose first concrete KP-ABSI scheme analyze its efficiency.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

O-PSI: Delegated Private Set Intersection on Outsourced Datasets

Private set intersection (PSI) has a wide range of applications such as privacy-preserving data mining. With the advent of cloud computing it is now desirable to take advantage of the storage and computation capabilities of the cloud to outsource datasets and delegate PSI computation. In this paper we design OPSI, a protocol for delegated private set intersection on outsourced datasets based on...

متن کامل

Efficient Delegated Private Set Intersection on Outsourced Private Datasets

Private set intersection (PSI) is an essential cryptographic protocol that has many real world applications. As cloud computing power and popularity have been swiftly growing, it is now desirable to leverage the cloud to store private datasets and delegate PSI computation to it. Although a set of efficient PSI protocols have been designed, none support outsourcing of the datasets and the comput...

متن کامل

On the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets (Extended Version)

In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private set intersection (PSI) protocols have been introduced to address this issue. By applying these protocols, two parties can compute the intersection between their sets without disclosing any information about compone...

متن کامل

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

A Survey on Keyword Based Search over Outsourced Encrypted Data

To ensure security, encryption techniques play a major role when data are outsourced to the cloud. Problem of retrieving the data from the cloud servers is considered. Many searching techniques are used for retrieving the data. This study focused on a set of keyword based search algorithms. It provides secure data retrieval with high efficiency. It concludes Ranked Searchable Symmetric Encrypti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2021

ISSN: ['1939-0122', '1939-0114']

DOI: https://doi.org/10.1155/2021/5595243