Privacy-Preserving Spatial Keyword Search With Lightweight Access Control in Cloud Environments
As cloud computing continues to gain popularity, various applications have been deployed under Industrial Internet of Things (IIoT) scenarios. In order to alleviate the heavy burden of local storage and processing, a substantial amount of data is entrusted to the cloud server, but attendant security...
Saved in:
Published in: | IEEE internet of things journal Vol. 11; no. 7; p. 1 |
---|---|
Main Authors: | , , |
Format: | Journal Article |
Language: | English |
Published: |
Piscataway
IEEE
01-04-2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | As cloud computing continues to gain popularity, various applications have been deployed under Industrial Internet of Things (IIoT) scenarios. In order to alleviate the heavy burden of local storage and processing, a substantial amount of data is entrusted to the cloud server, but attendant security risks like privacy leakages begin to appear. In addition, another vital security issue, access control, has come to attention. Many existing spatial keyword similarity search schemes are unable to implement access control. To solve these issues, we propose a novel scheme Privacy-preserving Spatial Keyword Similarity Search with lightweight Access control (PSKSSA) scheme. Specifically, we design an efficient Access Control IR-tree (ACIR-tree) that achieves sub-linear query efficiency. Access control is implemented through role-based polynomial technology, which is integrated into the ACIR-tree and the query vector, so that spatial keywords and access control information are uniformly encoded into a vector. Meanwhile, privacy is protected by Enhanced Asymmetric Scalar-Product-Preserving Encryption (EASPE), which guarantees indistinguishability against the chosen-plaintext attack (IND-CPA) model. The most similar k results are found by the cloud server while implementing access control for data users. Through formal analysis and extensive experiments, it has proved that the proposed scheme is safe and effective, with good scalability. |
---|---|
ISSN: | 2327-4662 2327-4662 |
DOI: | 10.1109/JIOT.2023.3333359 |