Skip to main content

Efficient Ciphertext Retrieval in Internet of Things Based on Fog Consumption Computing System

  • Conference paper
  • First Online:
Proceedings of the World Conference on Intelligent and 3-D Technologies (WCI3DT 2022)

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 323))

  • 585 Accesses

Abstract

In this paper, so as to improve the privacy protection and retrieval efficiency of Internet of things data, an efficient retrieval scheme for ciphertext of the Internet of things based on the fog computing system is proposed. First of all, a fog computing system between the cloud server and the user is added. The fog computing system is used to manage IoT devices and their data and is responsible for processing user search requests, and it achieves the purpose of reducing the time delay between cloud services and users; secondly, a multi-keyword-based ciphertext retrieval scheme is adopted, on the one hand, using multiple keywords to enhance the accuracy of retrieval, and on the other hand, using ciphertext. Retrieval can realize the protection of data privacy; finally, the range tree is used to build an index, and the range retrieval method is used to improve the user retrieval efficiency while realizing the user's personalized retrieval; theoretical analysis and simulation show that on the premise of ensuring user privacy, the proposed scheme greatly lifts the efficiency and accuracy of scheme search and realizes the personalized retrieval of users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Wang, N., Fu, J., Bhargava, B.K., Zeng, J.: Efficient retrieval over documents encrypted by attributes in cloud computing. IEEE Trans. Inf. Forens. Secu. 13(10), 2653–2667

    Google Scholar 

  2. Kim, H., Shin, J., Song, Y., Chang, J.: Privacy-preserving association rule mining algorithm for encrypted data in cloud computing. In: 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), Milan, Italy, pp. 487–489 (2019)

    Google Scholar 

  3. Hsiao, H.C., Hung, M.H., Chen, C.C., Lin, Y.C.: Cloud computing, internet of things (IoT), edge computing, and big data infrastructure, in industry 4.1: intelligent manufacturing with zero defects, IEEE, pp. 129–167 (2022). https://doi.org/10.1002/9781119739920.ch4

  4. Ding, Y., Li, K., Liu, C., Li, K.: A potential game theoretic approach to computation offloading strategy optimization in end-edge-cloud computing. IEEE Trans. Parallel Distrib. Syst. 33(6), 1503–1519 (2022). https://doi.org/10.1109/TPDS.2021.3112604

  5. Singh, S., Singh, N.: Internet of Things (IoT): security challenges, business opportunities and reference architecture for E-commerce. In: 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), Noida, pp. 1577–1581

    Google Scholar 

  6. Lu, H., He, X., Du, M., Ruan, X., Sun, Y., Wang, K.: Edge QoE: computation offloading with deep reinforcement learning for internet of things. IEEE Internet Things J. 7(10), 9255–9265

    Google Scholar 

  7. Hu, L., Nooshabadi, S., Ahmadi, M.: Massively parallel KD-tree construction and nearest neighbor search algorithms. In: 2015 IEEE International Symposium on Circuits and Systems (ISCAS), Lisbon, pp. 2752–2755 (2015)

    Google Scholar 

  8. Bhatti, M.A., Riaz, R., Rizvi, S., et al.: Outlier detection in indoor localization and internet of things (IoT) using machine learning. J. Commun. Netw. 22(3), 236–243 (2020)

    Google Scholar 

  9. Cao, N., Wang, C., Li, M., et al.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)

    Article  Google Scholar 

  10. Fu, Z.J., Ren, K., Shu, J.G., Sun, X.M., et al.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27, 9

    Google Scholar 

  11. Mishra, S.K., Puthal, D., Rodrigues, J.J.P., Sahoo, C.B., Dutkiewicz, E.: Sustainable service allocation using a metaheuristic technique in a fog server for industrial applications. IEEE Trans. Industr. Inf. 14(10), 4497–4506 (2018)

    Google Scholar 

  12. Sun, L., Jiang, X., Ren, H., Guo, Y.: Edge-cloud computing and artificial intelligence in internet of medical things: architecture, technology and application. IEEE Access 8, 101079–101092 (2020)

    Google Scholar 

  13. Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2016)

    Google Scholar 

  14. Chen, C., et al.: An efficient privacy-preserving ranked keyword search method. IEEE Trans. Parallel Distrib. Syst. 27(4), 951–963 (2016)

    Google Scholar 

  15. Zhang, Z., Su, W., and Zhou, K.: Airborne radar sub array partitioning method based on artificial bee colony algorithm. In: 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), pp. 484–489. Chengdu, China, (2019)

    Google Scholar 

  16. Rizk, D., Rizk, R., and Hsu, S.: Applied layered-security model to IoMT. In: 2019 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 227–227. Shenzhen, China (2019)

    Google Scholar 

  17. Jonathan, K., Suong, H., Nguyen, et al.: Using active queue management to assist IoT application flows in home broadband networks. IEEE Internet of Things J. 4(5) (2017)

    Google Scholar 

  18. Wong, W.K., Cheung, D.W., Kao, B., et al.: Secure kNN computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, pp. 139–152. ACM Press, New York (2009)

    Google Scholar 

  19. Sun, W., Wang, B., Cao, N., et al.: Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 71–82. ACM Press, New York (2013)

    Google Scholar 

  20. He, S., Cheng, B., Wang, H., Huang, Y., Chen, J.: Proactive personalized services through fog-cloud computing in large-scale IoT-based healthcare application. China Commun. 14(11), 1–16 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bo Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, B., Li, J. (2023). Efficient Ciphertext Retrieval in Internet of Things Based on Fog Consumption Computing System. In: Kountchev, R., Nakamatsu, K., Wang, W., Kountcheva, R. (eds) Proceedings of the World Conference on Intelligent and 3-D Technologies (WCI3DT 2022). Smart Innovation, Systems and Technologies, vol 323. Springer, Singapore. https://doi.org/10.1007/978-981-19-7184-6_14

Download citation

Publish with us

Policies and ethics