Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things


The development of Internet of things (IoT) makes data exchange more frequently, and the cloud computing can provide stable storage and efficient computation for data users. To ensure the security and functionality of data, the efficiency of decryption and keyword search should be taken into consideration in resource-constrained IoT scenarios. In order to solve the above problems, a flexible keyword search scheme in IoT is proposed over encrypted data with outsourced decryption. First, the attribute-based encryption technology is applied, by which only users whose attributes meet the access control structure can access the sharing data. Second, the reciprocal mapping of Lagrange polynomials technology is employed to implement keyword search in a large number of ciphertext data. Third, the decryption of ciphertext is outsourced to improve the efficiency of decryption on the client side. The security and performance analysis indicates that the proposed scheme is secure and efficient.

This is a preview of subscription content, log in to check access.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7


  1. 1.

    Jhaveri RH, Patel NM, Zhong Y, Sangaiah AK (2018) Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial iot. IEEE Access 6:20085–20103

    Article  Google Scholar 

  2. 2.

    Shen J, Wang C, Li T, Chen X, Huang X, Zhan ZH (2018) Secure data uploading scheme for a smart home system. Inform Sci 453:186–197

    Article  Google Scholar 

  3. 3.

    Wu A, Zheng D, Zhang Y, Yng M (2018) Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing. Sensors 18(7):1–17.

    Article  Google Scholar 

  4. 4.

    Zhang Y, Wu A, Zheng D (2018) Efficient and privacy-aware attribute-based data sharing in mobile cloud computing. J Ambient Intell Humaniz Comput 9(4):1039–1048

    Article  Google Scholar 

  5. 5.

    Chen X, Li J, Weng J, Ma J, Lou W (2016) Verifiable computation over large database with incremental updates. IEEE Trans Comput 65(10):3184–3195

    MathSciNet  Article  MATH  Google Scholar 

  6. 6.

    Li J, Liu Z, Chen X, Xhafa F, Tan X, Wong DS (2015) L-encdb: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl-Based Syst 79:18–26

    Article  Google Scholar 

  7. 7.

    Zhang Y, Zheng D, Deng RH (2018) Security and privacy in smart health: e policy-hiding attribute-based access control. IEEE Internet Things J 5(3):2130–2145

    Article  Google Scholar 

  8. 8.

    Wang J, Chen X, Huang X, You I, Xiang Y (2015) Verifiable auditing for outsourced database in cloud computing. IEEE Trans Comput 64(11):3293–3303

    MathSciNet  Article  MATH  Google Scholar 

  9. 9.

    Zhang Y, Yang M, Zheng D, Lang P, Wu A, Chen C (2018) Efficient and secure big data storage system with leakage resilience in cloud computing. Soft Comput 22(23):7763–7772

    Article  MATH  Google Scholar 

  10. 10.

    Zhang Y, Zheng D, Guo R, Lan Q (2018) Fine-grained access control systems suitable for resource-constrained users in cloud computing. Comput Inf 37(2):327–348

    Google Scholar 

  11. 11.

    Zhang Y, Deng RH, Han G, Zheng D (2018) Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things. J Netw Comput Appl 123:89–100

    Article  Google Scholar 

  12. 12.

    Li H, Liu D, Dai Y, Luan TH, Shen XS (2015) Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans Emerging Topics Comput 3(1):127–138

    Article  Google Scholar 

  13. 13.

    Wang J, Chen X, Li J, Zhao J, Shen J (2017) Towards achieving flexible and verifiable search for outsourced database in cloud computing. Futur Gener Comput Syst 67:266–275

    Article  Google Scholar 

  14. 14.

    Zhang Y, Deng RH, Jiangang S, Kan Y, Dong Z (2018) Tkse: trustworthy keyword search over encrypted data with two-side verifiability via blockchain. IEEE Access 6:31077–31087

    Article  Google Scholar 

  15. 15.

    Li R, Zheng D, Zhang Y, Su H, Yang M, Lang P (2017) Attribute-based encryption with multi-keyword search. In: IEEE 2nd international conference on data science in cyberspace, pp 172–177

  16. 16.

    Li P, Li T, Ye H, Li J, Chen X, Xiang Y (2018) Privacy-preserving machine learning with multiple data providers. Futur Gener Comput Syst 87:341–350

    Article  Google Scholar 

  17. 17.

    Zhang Y, Lang P, Dong Z, Yang M, Guo R (2018) A secure and privacy-aware smart health system with secret key leakage resilience. Secur Commun Netw 2018:1–13.

    Google Scholar 

  18. 18.

    Wang C, Shen J, Liu Q, Ren Y, Li T (2018) A novel security scheme based on instant encrypted transmission for internet of things. Secur Commun Netw 2018(2):1–7

    Article  Google Scholar 

  19. 19.

    Zhang Y, Deng RH, Ximeng L, Dong Z (2018) Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf Sci 462:262–277

    MathSciNet  Article  Google Scholar 

  20. 20.

    Zheng D, Wu A, Hui Y, Lang Q (2018) Efficient and privacy-preserving medical data sharing in Internet of Things with limited computing power. IEEE Access 6:28019–28027

    Article  Google Scholar 

  21. 21.

    Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 457–473

  22. 22.

    Ning J, Dong X, Gao Z, Wei L, Lin X (2015) White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. IEEE Trans Inf Forensics Secur 10(6):1274–1288

    Article  Google Scholar 

  23. 23.

    Ning J, Gao Z, Dong X, Wei L (2018) White-box traceable CP-ABE for cloud storage service: how to catch people leaking their access credentials effectively. IEEE Trans Dependable Secure Comput 15(5):883–897

    Article  Google Scholar 

  24. 24.

    Ning J, Gao Z, Dong X, Wei L, Lin X (2014) Large universe ciphertext-policy attribute-based encryption with white-box traceability. European Symposium on Research in Computer Security 15(5):55–72

    Google Scholar 

  25. 25.

    Li J, Chen X, Chow SSM, Huang Q, Wong DS, Liu Z (2018) Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl 112:89–96

    Article  Google Scholar 

  26. 26.

    Li H, Liu D, Dai Y, Luan TH, Yu S (2018) Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Transactions on Emerging Topics in Computing 6(1):97–109

    Article  Google Scholar 

  27. 27.

    Sun W, Yu S, Lou W, Hou YT, Li H (2014) Protecting your right: attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In: 2014 Proceedings IEEE INFOCOM, pp 226–234

  28. 28.

    Zheng Q, Xu S, Ateniese G (2014) Vabks: Verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM, pp 522–530

  29. 29.

    Li J, Zhang Y, Chen X, Xiang Y, Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1–12

    Article  Google Scholar 

  30. 30.

    Zhang Y, Zheng D, Li Q, Li J, Li H (2016) Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing. Secur Commun Netw 9(16):3688–3702

    Article  Google Scholar 

  31. 31.

    Li J, Li J, Chen X, Jia C, Lou W (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425–437

    MathSciNet  Article  MATH  Google Scholar 

  32. 32.

    Zhang Y, Deng R H, Liu X, Zheng D (2018) Outsourcing service fair payment based on blockchain and its applications in cloud computing, IEEE transactions on services computing.

  33. 33.

    Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210

    Article  Google Scholar 

  34. 34.

    Zhang Y, Chen X, Li J, Wong D S, Li H, You I (2017) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inform Sci 379:42–61

    Article  Google Scholar 

  35. 35.

    Green M, Hohenberger S, Waters B (2014). In: Usenix conference on security, pp 34–34

  36. 36.

    Ning J, Gao Z, Dong X, Ma K Liang H, Wei L (2018) Auditable σ-time outsourced attribute-based encryption for access control in cloud computing. IEEE Trans Inf Forensics Secur 13(1):94–105

    Article  Google Scholar 

  37. 37.

    Menezes A (2009) An introduction to pairing-based cryptography. Recent trends in cryptography 477:47–65

    MathSciNet  Article  MATH  Google Scholar 

  38. 38.

    Haoxing L, Fenghua L, Chenggen S, Mang S, Xin L (2015) Public key encryption with multi-keywords search. Journal of Xidian University 42(5):20–25

    Google Scholar 

  39. 39.

    Gentry C (2006) Practical identity-based encryption without random oracles. Lect Notes Comput Sci 4004:445–464

    MathSciNet  Article  MATH  Google Scholar 

  40. 40.

    Dan B, Boyen X (2004) Efficient selective-ID secure identity-based encryption without random oracles. Springer, Berlin, pp 223–238

    Google Scholar 

  41. 41.

    Zhang B, Zhang F (2011) An efficient public key encryption with conjunctive-subset keywords search. J Netw Comput Appl 34(1):262–267

    Article  Google Scholar 

Download references


This work is supported by National Key R&D Program of China (No. 2017YFB0802000), National Natural Science Foundation of China (No. 61772418, 61472472, 61402366), Natural Science Basic Research Plan in Shaanxi Province of China (No. 2018JZ6001, 2015JQ6236), and the Youth Innovation Team of Shaanxi Universities. Yinghui Zhang is supported by New Star Team of Xi’an University of Posts and Telecommunications (No. 2016-02).

Author information



Corresponding author

Correspondence to Yinghui Zhang.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Zhang, Y., Wu, A., Zhang, T. et al. Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things. Ann. Telecommun. 74, 413–421 (2019).

Download citation


  • Internet of things
  • Attribute-based encryption
  • Keyword search
  • Outsourced decryption