Research on the Ranked Searchable Encryption Scheme Based on an Access Tree in IoTs

With the continuous development of the Internet of things (IoTs), data security and privacy protection in the IoTs are becoming increasingly important. Aiming at the hugeness, redundancy, and heterogeneity of data in the IoTs, this paper proposes a ranked searchable encryption scheme based on an acc...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Yan-Yan Yang, Bei Gong, Zhi-Juan Jia, Ya-Ge Cheng, Yu-Chu He
Formato: article
Lenguaje:EN
Publicado: Hindawi-Wiley 2021
Materias:
T
Acceso en línea:https://doaj.org/article/7d004472877d4bb7bcbd07a786438dd0
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:7d004472877d4bb7bcbd07a786438dd0
record_format dspace
spelling oai:doaj.org-article:7d004472877d4bb7bcbd07a786438dd02021-11-08T02:35:41ZResearch on the Ranked Searchable Encryption Scheme Based on an Access Tree in IoTs1530-867710.1155/2021/3265934https://doaj.org/article/7d004472877d4bb7bcbd07a786438dd02021-01-01T00:00:00Zhttp://dx.doi.org/10.1155/2021/3265934https://doaj.org/toc/1530-8677With the continuous development of the Internet of things (IoTs), data security and privacy protection in the IoTs are becoming increasingly important. Aiming at the hugeness, redundancy, and heterogeneity of data in the IoTs, this paper proposes a ranked searchable encryption scheme based on an access tree. First, this solution introduces parameters such as the word position and word span into the calculation of the relevance score of keywords to build a more accurate document index. Secondly, this solution builds a semantic relationship graph based on mutual information to expand the query semantics, effectively improving the accuracy and recall rate during retrieval. Thirdly, the solution uses an access tree control structure to control user authority and realizes fine-grained access management to data by data owners in the IoTs. Finally, the safety analysis of this scheme and the efficiency comparison with other existing schemes are given.Yan-Yan YangBei GongZhi-Juan JiaYa-Ge ChengYu-Chu HeHindawi-WileyarticleTechnologyTTelecommunicationTK5101-6720ENWireless Communications and Mobile Computing, Vol 2021 (2021)
institution DOAJ
collection DOAJ
language EN
topic Technology
T
Telecommunication
TK5101-6720
spellingShingle Technology
T
Telecommunication
TK5101-6720
Yan-Yan Yang
Bei Gong
Zhi-Juan Jia
Ya-Ge Cheng
Yu-Chu He
Research on the Ranked Searchable Encryption Scheme Based on an Access Tree in IoTs
description With the continuous development of the Internet of things (IoTs), data security and privacy protection in the IoTs are becoming increasingly important. Aiming at the hugeness, redundancy, and heterogeneity of data in the IoTs, this paper proposes a ranked searchable encryption scheme based on an access tree. First, this solution introduces parameters such as the word position and word span into the calculation of the relevance score of keywords to build a more accurate document index. Secondly, this solution builds a semantic relationship graph based on mutual information to expand the query semantics, effectively improving the accuracy and recall rate during retrieval. Thirdly, the solution uses an access tree control structure to control user authority and realizes fine-grained access management to data by data owners in the IoTs. Finally, the safety analysis of this scheme and the efficiency comparison with other existing schemes are given.
format article
author Yan-Yan Yang
Bei Gong
Zhi-Juan Jia
Ya-Ge Cheng
Yu-Chu He
author_facet Yan-Yan Yang
Bei Gong
Zhi-Juan Jia
Ya-Ge Cheng
Yu-Chu He
author_sort Yan-Yan Yang
title Research on the Ranked Searchable Encryption Scheme Based on an Access Tree in IoTs
title_short Research on the Ranked Searchable Encryption Scheme Based on an Access Tree in IoTs
title_full Research on the Ranked Searchable Encryption Scheme Based on an Access Tree in IoTs
title_fullStr Research on the Ranked Searchable Encryption Scheme Based on an Access Tree in IoTs
title_full_unstemmed Research on the Ranked Searchable Encryption Scheme Based on an Access Tree in IoTs
title_sort research on the ranked searchable encryption scheme based on an access tree in iots
publisher Hindawi-Wiley
publishDate 2021
url https://doaj.org/article/7d004472877d4bb7bcbd07a786438dd0
work_keys_str_mv AT yanyanyang researchontherankedsearchableencryptionschemebasedonanaccesstreeiniots
AT beigong researchontherankedsearchableencryptionschemebasedonanaccesstreeiniots
AT zhijuanjia researchontherankedsearchableencryptionschemebasedonanaccesstreeiniots
AT yagecheng researchontherankedsearchableencryptionschemebasedonanaccesstreeiniots
AT yuchuhe researchontherankedsearchableencryptionschemebasedonanaccesstreeiniots
_version_ 1718443199624642560