Planned intervention: On Wednesday June 26th 05:30 UTC Zenodo will be unavailable for 10-20 minutes to perform a storage cluster upgrade.
Published February 25, 2020 | Version v1
Software Open

Do not tell me what I cannot do! (The constrained device shouted under the cover of the fog): Implementing Symmetric Searchable Encryption on Constrained Devices

  • 1. Tampere University
  • 2. University of Westminster

Description

Symmetric Searchable Encryption (SSE) allows the outsourcing of encrypted data to possible untrusted third
party services while simultaneously giving the opportunity to users to search over the encrypted data in a
secure and privacy-preserving way. Currently, the majority of SSE schemes have been designed to fit a typical
cloud service scenario where users (clients) encrypt their data locally and upload them securely to a remote
location. While this scenario fits squarely the cloud paradigm, it cannot apply to the emerging field of Internet
of Things (IoT). This is due to the fact that the performance of most of the existing SSE schemes has been
tested using powerful machines and not the constrained devices used in IoT services. The focus of this paper
is to prove that SSE schemes can, under certain circumstances, work on constrained devices and eventually
be adopted by IoT services. To this end, we designed and implemented a forward private dynamic SSE
scheme that can run smoothly on resource-constrained devices. To do so, we adopted a fog node scenario
where edge (constrained) devices sense data, encrypt them locally and use the capabilities of fog nodes to
store sensed data in a remote location (the cloud). Consequently, end users can search for specific keywords
over the stored ciphertexts without revealing anything about their content. Our scheme achieves efficient
computational operations and supports the multi-client model. The performance of the scheme is evaluated by
conducting extensive experiments. Finally, the security of the scheme is proven through a theoretical analysis
that considers the existence of a malicious adversary.

Files

README.md

Files (731.2 kB)

Name Size Download all
md5:d8aa7aab62a2fdb6f9f5cdd181a397e9
4.1 kB Download
md5:a619cc5dc243fae3d2e1dfaee9b37d99
4.6 kB Download
md5:d51753f627490696071c6567041fbc1e
2.3 kB Download
md5:fac2e2cc2073e2915e7d161cdfa35fc9
1.1 kB Download
md5:8ece653d8e621bf4ef82da32ee1864f4
8.1 kB Download
md5:16bdce21b3d1230705a65ac095f9aa4e
2.7 kB Download
md5:3aa5f0b994620d116e742c3ad2d0596b
150 Bytes Download
md5:835608f8c611daa88ce24a10dd8c92e5
16 Bytes Download
md5:041441ab0ebb448b5dd7db520830cb4b
9.6 kB Download
md5:8715503979460ba62652b52225eca8c9
1.5 kB Download
md5:ea8af25664a9fd73feda1c3da425dbec
101 Bytes Download
md5:e8e524cc2762b55454108507fa9ae7e9
3.3 kB Preview Download
md5:3eb2f3530c1106996afefb99fda62d95
5.0 kB Download
md5:a84db7fb604c7b03234984761202dee0
9.4 kB Download
md5:8e73a6a32fcb212ad35270a2217ffe30
5.9 kB Download
md5:5b2b7f442706c25d94c70c02906ae726
3.0 kB Download
md5:9a09b1557cc1512a2934422f5742fa6e
1.3 kB Download
md5:c36ef699e38027e327a6b8492c5c65be
669.0 kB Download

Additional details

Funding

ASCLEPIOS – Advanced Secure Cloud Encrypted Platform for Internationally Orchestrated Solutions in Healthcare 826093
European Commission
CYBELE – FOSTERING PRECISION AGRICULTURE AND LIVESTOCK FARMING THROUGH SECURE ACCESS TO LARGE-SCALE HPC-ENABLED VIRTUAL INDUSTRIAL EXPERIMENTATION ENVIRONMENT EMPOWERING SCALABLE BIG DATA ANALYTICS 825355
European Commission