Enhancing Security and Efficiency: A Fine-Grained Searchable Scheme for Encryption of Big Data in Cloud-Based Smart Grids
-
Published:2024-05-13
Issue:10
Volume:12
Page:1512
-
ISSN:2227-7390
-
Container-title:Mathematics
-
language:en
-
Short-container-title:Mathematics
Author:
Wen Jing1, Li Haifeng23ORCID, Liu Liangliang4, Lan Caihui1ORCID
Affiliation:
1. School of Information Engineering, Lanzhou City University, Lanzhou 730070, China 2. School of Computer and Information Science, Qinghai University of Science and Technology, Xining 810016, China 3. Department of Computer Technology and Applications, Qinghai University, Xining 810016, China 4. School of Statistics and Information, Shanghai University of International Business and Economics, Shanghai 201620, China
Abstract
The smart grid, as a crucial part of modern energy systems, handles extensive and diverse data, including inputs from various sensors, metering devices, and user interactions. Outsourcing data storage to remote cloud servers presents an economical solution for enhancing data management within the smart grid ecosystem. However, ensuring data privacy before transmitting it to the cloud is a critical consideration. Therefore, it is common practice to encrypt the data before uploading them to the cloud. While encryption provides data confidentiality, it may also introduce potential issues such as limiting data owners’ ability to query their data. The searchable attribute-based encryption (SABE) not only enables fine-grained access control in a dynamic large-scale environment but also allows for data searches on the ciphertext domain, making it an effective tool for cloud data sharing. Although SABE has become a research hotspot, existing schemes often have limitations in terms of computing efficiency on the client side, weak security of the ciphertext and the trapdoor. To address these issues, we propose an efficient server-aided ciphertext-policy searchable attribute-based encryption scheme (SA-CP-SABE). In SA-CP-SABE, the user’s data access authority is consistent with the search authority. During the search process, calculations are performed not only to determine whether the ciphertext matches the keyword in the trapdoor, but also to assist subsequent user ciphertext decryption by reducing computational complexity. Our scheme has been proven under the random oracle model to achieve the indistinguishability of the ciphertext and the trapdoor and to resist keyword-guessing attacks. Finally, the performance analysis and simulation of the proposed scheme are provided, and the results show that it performs with high efficiency.
Funder
“Kunlun Elite” Talent Recruitment Research Project New Faculty (Ph.D.) Extended Research and Cultivation Program
Reference28 articles.
1. Mell, P., and Grance, T. (2024, May 07). The NIST Definition of Cloud Computing, Available online: http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf. 2. A survey on security challenges in cloud computing: Issues, threats, and solutions;Tabrizchi;J. Supercomput.,2020 3. Cramer, R. (2005). Advances in Cryptology—EUROCRYPT 2005, Springer. 4. Goyal, V., Pandey, O., Sahai, A., and Waters, B. (November, January 30). Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications Security, OCT 2006, Alexandria, VA, USA. 5. Bethencourt, J., Sahai, A., and Waters, B. (2007, January 20–23). Ciphertext-Policy Attribute-Based Encryption. Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP ’07), Oakland, CA, USA.
|
|