Research on the Ranked Searchable Encryption Scheme Based on an Access Tree in IoTs
With the continuous development of the Internet of things (IoTs), data security and privacy protection in the IoTs are becoming increasingly important. Aiming at the hugeness, redundancy, and heterogeneity of data in the IoTs, this paper proposes a ranked searchable encryption scheme based on an acc...
Guardado en:
Autores principales: | , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Hindawi-Wiley
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/7d004472877d4bb7bcbd07a786438dd0 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:7d004472877d4bb7bcbd07a786438dd0 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:7d004472877d4bb7bcbd07a786438dd02021-11-08T02:35:41ZResearch on the Ranked Searchable Encryption Scheme Based on an Access Tree in IoTs1530-867710.1155/2021/3265934https://doaj.org/article/7d004472877d4bb7bcbd07a786438dd02021-01-01T00:00:00Zhttp://dx.doi.org/10.1155/2021/3265934https://doaj.org/toc/1530-8677With the continuous development of the Internet of things (IoTs), data security and privacy protection in the IoTs are becoming increasingly important. Aiming at the hugeness, redundancy, and heterogeneity of data in the IoTs, this paper proposes a ranked searchable encryption scheme based on an access tree. First, this solution introduces parameters such as the word position and word span into the calculation of the relevance score of keywords to build a more accurate document index. Secondly, this solution builds a semantic relationship graph based on mutual information to expand the query semantics, effectively improving the accuracy and recall rate during retrieval. Thirdly, the solution uses an access tree control structure to control user authority and realizes fine-grained access management to data by data owners in the IoTs. Finally, the safety analysis of this scheme and the efficiency comparison with other existing schemes are given.Yan-Yan YangBei GongZhi-Juan JiaYa-Ge ChengYu-Chu HeHindawi-WileyarticleTechnologyTTelecommunicationTK5101-6720ENWireless Communications and Mobile Computing, Vol 2021 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Technology T Telecommunication TK5101-6720 |
spellingShingle |
Technology T Telecommunication TK5101-6720 Yan-Yan Yang Bei Gong Zhi-Juan Jia Ya-Ge Cheng Yu-Chu He Research on the Ranked Searchable Encryption Scheme Based on an Access Tree in IoTs |
description |
With the continuous development of the Internet of things (IoTs), data security and privacy protection in the IoTs are becoming increasingly important. Aiming at the hugeness, redundancy, and heterogeneity of data in the IoTs, this paper proposes a ranked searchable encryption scheme based on an access tree. First, this solution introduces parameters such as the word position and word span into the calculation of the relevance score of keywords to build a more accurate document index. Secondly, this solution builds a semantic relationship graph based on mutual information to expand the query semantics, effectively improving the accuracy and recall rate during retrieval. Thirdly, the solution uses an access tree control structure to control user authority and realizes fine-grained access management to data by data owners in the IoTs. Finally, the safety analysis of this scheme and the efficiency comparison with other existing schemes are given. |
format |
article |
author |
Yan-Yan Yang Bei Gong Zhi-Juan Jia Ya-Ge Cheng Yu-Chu He |
author_facet |
Yan-Yan Yang Bei Gong Zhi-Juan Jia Ya-Ge Cheng Yu-Chu He |
author_sort |
Yan-Yan Yang |
title |
Research on the Ranked Searchable Encryption Scheme Based on an Access Tree in IoTs |
title_short |
Research on the Ranked Searchable Encryption Scheme Based on an Access Tree in IoTs |
title_full |
Research on the Ranked Searchable Encryption Scheme Based on an Access Tree in IoTs |
title_fullStr |
Research on the Ranked Searchable Encryption Scheme Based on an Access Tree in IoTs |
title_full_unstemmed |
Research on the Ranked Searchable Encryption Scheme Based on an Access Tree in IoTs |
title_sort |
research on the ranked searchable encryption scheme based on an access tree in iots |
publisher |
Hindawi-Wiley |
publishDate |
2021 |
url |
https://doaj.org/article/7d004472877d4bb7bcbd07a786438dd0 |
work_keys_str_mv |
AT yanyanyang researchontherankedsearchableencryptionschemebasedonanaccesstreeiniots AT beigong researchontherankedsearchableencryptionschemebasedonanaccesstreeiniots AT zhijuanjia researchontherankedsearchableencryptionschemebasedonanaccesstreeiniots AT yagecheng researchontherankedsearchableencryptionschemebasedonanaccesstreeiniots AT yuchuhe researchontherankedsearchableencryptionschemebasedonanaccesstreeiniots |
_version_ |
1718443199624642560 |