Verifiable Data Search with Fine-Grained Authorization in Edge Computing
نویسندگان
چکیده
In the research of searchable encryption, fine-grained data authorization is a convenient way to manage search rights for users. Recently, Liu et al. proposed scheme with verification, which can control and verify results. this paper, we first present forgery attack against al.’s then propose novel verifiable in edge environment. Based on key aggregate mechanism Merkle hash tree, our not only achieves file-oriented permission management but also implements correctness completeness verification addition, assistance server, resource-constrained users easily perform tasks verification. Finally, prove secure based decision l -bilinear Diffie–Hellman exponent problem. The performance analysis experiment results demonstrate that has lower computation, communication, storage costs contrast existing schemes.
منابع مشابه
A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment
In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At p...
متن کاملCP-ABE with Fine-Grained Access Control and Verifiable Delegation in Cloud Computing
With the growing status of cloud computing, firms and data owners begins to outsource their primary data to the general public cloud for decreased management price and ease of access. Encryption helps to shield user data confidentiality, it makes tricky to perform the comfy undeniable textual content search over the encrypted data Attribute-Based Encryption (ABE) is a shows potential cryptograp...
متن کاملFine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing
Attribute-based encryption (ABE) can be used for implementing fine-grained data sharing in cloud computing. However, most of the existing ABE schemes cannot realize attribute extension and provable security simultaneously. In this paper, we propose a fine-grained attribute-based data sharing system based on a hybrid encryption mechanism. A rigorous security proof indicates that the proposed sch...
متن کاملDynamic and Fine-Grained Authentication and Authorization Architecture for Grid Computing
The Globus Toolkit makes it very easy and comfortable for grid users to develop and deploy grid service. As for the security mechanism, however, only static authentication and coarse-grained authorization mechanism is provided in current Globus Toolkit. In this paper we address the limitations of current security mechanism in the Globus Toolkit and propose a new architecture which provides fine...
متن کاملFine-grained Full-text Search
Most conventional text retrieval methods are designed to search for documents. However, users often do not require documents themselves, but are searching for specific information that may come from a large collection of texts quickly. To satisfy this need, we have developed a model and two methods for fine-grained searching. The unit of search in this model is called an atom, and it can be a s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2022
ISSN: ['1939-0122', '1939-0114']
DOI: https://doi.org/10.1155/2022/4252466