TY - JOUR
T1 - Achieving fuzzy matching data sharing for secure cloud-edge communication
AU - Zhang, Chuan
AU - Zhao, Mingyang
AU - Xu, Yuhua
AU - Wu, Tong
AU - Li, Yanwei
AU - Zhu, Liehuang
AU - Wang, Haotian
N1 - Publisher Copyright:
© 2013 China Institute of Communications.
PY - 2022/7/1
Y1 - 2022/7/1
N2 - In this paper, we propose a novel fuzzy matching data sharing scheme named FADS for cloud-edge communications. FADS allows users to specify their access policies, and enables receivers to obtain the data transmitted by the senders if and only if the two sides meet their defined certain policies simultaneously. Specifically, we first formalize the definition and security models of fuzzy matching data sharing in cloud-edge environments. Then, we construct a concrete instantiation by pairing-based cryptosystem and the privacy-preserving set intersection on attribute sets from both sides to construct a concurrent matching over the policies. If the matching succeeds, the data can be decrypted. Otherwise, nothing will be revealed. In addition, FADS allows users to dynamically specify the policy for each time, which is an urgent demand in practice. A thorough security analysis demonstrates that FADS is of provable security under indistinguishable chosen ciphertext attack (IND-CCA) in random oracle model against probabilistic polynomial-time (PPT) adversary, and the desirable security properties of privacy and authenticity are achieved. Extensive experiments provide evidence that FADS is with acceptable efficiency.
AB - In this paper, we propose a novel fuzzy matching data sharing scheme named FADS for cloud-edge communications. FADS allows users to specify their access policies, and enables receivers to obtain the data transmitted by the senders if and only if the two sides meet their defined certain policies simultaneously. Specifically, we first formalize the definition and security models of fuzzy matching data sharing in cloud-edge environments. Then, we construct a concrete instantiation by pairing-based cryptosystem and the privacy-preserving set intersection on attribute sets from both sides to construct a concurrent matching over the policies. If the matching succeeds, the data can be decrypted. Otherwise, nothing will be revealed. In addition, FADS allows users to dynamically specify the policy for each time, which is an urgent demand in practice. A thorough security analysis demonstrates that FADS is of provable security under indistinguishable chosen ciphertext attack (IND-CCA) in random oracle model against probabilistic polynomial-time (PPT) adversary, and the desirable security properties of privacy and authenticity are achieved. Extensive experiments provide evidence that FADS is with acceptable efficiency.
KW - cloud-edge communication
KW - data sharing
KW - fuzzy-matching
KW - privacy-preserving set intersection
UR - http://www.scopus.com/inward/record.url?scp=85135341986&partnerID=8YFLogxK
U2 - 10.23919/JCC.2022.07.020
DO - 10.23919/JCC.2022.07.020
M3 - Article
AN - SCOPUS:85135341986
SN - 1673-5447
VL - 19
SP - 257
EP - 276
JO - China Communications
JF - China Communications
IS - 7
ER -