Affiliation:
1. Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China
Abstract
The blockchain-based searchable symmetric encryption (SSE) scheme allows the retrieval and verification of outsourced data on cloud servers in sixth generation (6G) networks while ensuring the privacy of data. However, existing schemes are challenging to comprehensively meet the requirements of 6G-based intelligent application systems for low latency, high security, and high reliability. To address these limitations, we present VSSE, a novel blockchain-based SSE scheme designed for 6G-based intelligent application systems. Our scheme constructs a state chain structure to resist file injection attacks, thereby ensuring forward privacy. Moreover, we execute the search and verification operations separately on the cloud server and blockchain, while introducing a bitmap index structure and message authentication code (MAC) technology to achieve efficient searching and dynamic verification. Notably, VSSE also includes access control functionality, permitting only authorized users to access relevant files. The combination of remarkable efficiency and strong security establishes our VSSE as an ideal solution suitable for implementation in G-based intelligent application systems.
Funder
National Natural Science Foundation of China
National Key Research and Development Project of China
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference40 articles.
1. Towards 6G Wireless Communication Networks: Vision, Enabling Technologies, and New Paradigm Shifts;You;Sci. China Inf. Sci.,2021
2. Toward Data Security in 6G Networks: A Public-Key Searchable Encryption Approach;Shi;IEEE Netw.,2022
3. Song, D.X., Wagner, D., and Perrig, A. (2000, January 14–17). Practical techniques for searches on encrypted data. Proceedings of the IEEE Symposium Security and Privacy, Berkeley, CA, USA.
4. Secure indexes;Goh;IACR Cryptol. ePrint Arch.,2003
5. Searchable symmetric encryption: Improved definitions and efficient constructions;Curtmola;J. Comput. Secur.,2011
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献