Next Article in Journal
Current Ratio and Stability Issues of Electronically Enhanced Current Transformer Stimulated by Stray Inter-Winding Capacitance and Secondary-Side Disturbance Voltage
Previous Article in Journal
Multimodal Finger Pulse Wave Sensing: Comparison of Forcecardiography and Photoplethysmography Sensors
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

A Review of Functional Encryption in IoT Applications

1
School of Computing, Mathematics and Engineering, Charles Sturt University, Wagga Wagga 2650, Australia
2
Center of Excellence in Cybercrime and Digital Forensics, Naif Arab University for Security Sciences, Riyadh 14812, Saudi Arabia
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(19), 7567; https://doi.org/10.3390/s22197567
Submission received: 26 July 2022 / Revised: 24 September 2022 / Accepted: 26 September 2022 / Published: 6 October 2022
(This article belongs to the Section Internet of Things)

Abstract

:
The Internet of Things (IoT) represents a growing aspect of how entities, including humans and organizations, are likely to connect with others in their public and private interactions. The exponential rise in the number of IoT devices, resulting from ever-growing IoT applications, also gives rise to new opportunities for exploiting potential security vulnerabilities. In contrast to conventional cryptosystems, frameworks that incorporate fine-grained access control offer better opportunities for protecting valuable assets, especially when the connectivity level is dense. Functional encryption is an exciting new paradigm of public-key encryption that supports fine-grained access control, generalizing a range of existing fine-grained access control mechanisms. This survey reviews the recent applications of functional encryption and the major cryptographic primitives that it covers, identifying areas where the adoption of these primitives has had the greatest impact. We first provide an overview of different application areas where these access control schemes have been applied. Then, an in-depth survey of how the schemes are used in a multitude of applications related to IoT is given, rendering a potential vision of security and integrity that this growing field promises. Towards the end, we identify some research trends and state the open challenges that current developments face for a secure IoT realization.

1. Introduction

1.1. Background

The last decade has seen an explosion in digital technologies, essentially transforming the way we produce, store and transmit information. Our lives are dependent on the use of services brought about through this change, whether it be as simple a task as opening the garage door or transferring highly personal information including medical records and financial transactions. One of the drivers behind the recent data revolution is the Internet of Things (IoT) [1], which revolves around the idea of connecting a multitude of devices. These devices, ranging from small sensors to advanced electronic gadgets, communicate and exchange information with either each other or central entities to form a network. Through the use of smart terminals equipped with sensors and actuators, and the integration of technologies and promising solutions, the IoT constitutes a network of distributed intelligence, realizing the vision of a smart connected world. The variety of applications wherein IoT has made a difference is vast, ranging from massive IoT applications to time- and information-critical IoT networks. The range of IoT applications is visually depicted in Figure 1. The positives of this modern digital transformation also resulted in some negatives, among which the security and privacy of information appears to be of the highest concern. Apart from the standard security concerns involved in generic broadcast-natured wireless systems, IoT comes with its own additional challenges. These challenges stem from its unique characteristics including the range of communication, desired capabilities of self-organization and the availability of limited resources. The IoT also often connects to the cloud for added storage and computation capabilities, which brings upon additional challenges in maintaining desired security and privacy.
Researchers from the industry and academia alike are interested in analyzing and developing ways to achieve the highest possible degree of information security, whether it be identity protection, data integrity and security, or simply ensuring users that both their day-to-day and sensitive information is in safe hands. Traditional approaches to data integrity and security are highly dependent on public-key cryptography [2,3], which has been driving the research efforts in the cryptographic community for a long time. In these conventional cryptosystems, the decryption process eventually recovers the underlying plaintext if the decryption process is successful, which means that all the information contained in the plaintext is revealed. However, there are many applications where only a partial exposure of the contained information is needed. For example, a financial organization may want to filter transactions above a certain amount in which case decrypting the exact value of all transaction records is not needed. Rather, a simple decision on the transaction amount determining whether it is above or below the desired threshold is needed. Similarly, access rights in broadcast transmissions need to determine the level of access that a user is granted instead of revealing the complete content of the transmission. These rights can be determined based on, among other things, a user’s identity, affiliation, attributes and organizational standing. This is specifically needed to hold under circumstances where the encryptor does not necessarily know the identity or attributes of the decryptor, but rather all that is needed are the required attributes to determine the access structure. Such a structure for data access drastically changes the way that information access can be determined since it fundamentally alters the way in which data are distributed among receivers and also affects the steps taken to ensure the security and integrity of these data. This fine-grained access control provides a method of controlling certain forms of data access, and compared to generalized data access control, it uses more distinctive and variable methods for allowing access. Fine-gained access control provides the ability to centrally store data, maintain confidentiality and precision, improve security and improve the information access for authorized users.
Functional encryption (FE) [4] is a public-key encryption scheme with different decryption keys allowing a user to learn specific functions of the encrypted data. The control that FE offers over which functions are allowed to be computed on the data and by which user immensely benefits the data owner in multiple ways. For example, if suspicious activity is observed within an organization, a scan of system logs might help understand the origin of this activity. However, sharing the complete logs with an external security expert may not be feasible as it gives them access to the entire network data. In such a situation, a function can be generated for the expert to only look at the transmission-control protocol (TCP) port, giving the external expert the corresponding key, and restricting their access only to the desired information. Since its introduction, functional encryption has attracted a lot of interest, and its known results are broadly categorized as either focusing on feasibility results for general functionalities, or concrete, efficient realizations for restricted functionalities of practical interest [5]. In this work, we review the recent applications of functional encryption and the major cryptographic primitives that it covers. We identify the areas in which the adoption of these primitives has had the greatest impact, especially in the realm of IoT. Our work provides a review of these applications without strictly going into the mathematical details associated with each area of application. This essentially helps readers understand the domains and guides them towards further exploration in the desired directions.

1.2. Related Works

A number of studies have recently been presented in the literature which have surveyed the different aspects of fine-grained access control schemes, including attribute and identity-based encryption, although the applications of FE have not been considered on the larger scale. Lee et al. [6] presented a study on attribute-based encryption (ABE) schemes for access control in cloud environments. The study is broken down based on two different access policy structures and two encryption schemes, namely ABE, key-policy ABE (KP-ABE), ciphertext-policy ABE (CP-ABE), hierarchical ABE (HABE), and ABE with non-monotonic access structure. The authors provide a detailed performance and security analysis of the considered schemes and conclude that user accountability is hard to justify in these schemes. Furthermore, due to a pre-defined access structure in these schemes, all the encrypted data need to be regenerated if a new user wants to access data and their attributes are not in the access structure.
Based on the use of mobile devices to access private data hosted in the cloud and the physical limitations of the mobile device to perform complex computations, Moffat et al. [7] analyzed the CP-ABE approaches to data security of the mobile devices in a recent survey. The authors found that the computational demands of CP-ABE encryption and decryption is inefficient on mobile devices due to their physical limitations including the processor and battery power as well as network bandwidth. To overcome these shortcomings, some solutions have been proposed, including managing the efficiency and complexity of encryption-generated computations, delegating encryption to assisting nodes, and efforts to enhance the physical traits of these devices. The authors in [8] surveyed the various varieties of ABE for use in cloud environments, making observations about their use and provision of access privilege. A comparison of different ABE techniques based on their distinctive features such as computation overhead, user revocation, resistance to collusion, and attribute association was also provided.
Zhao et al. [9] provided a comprehensive survey of the applications of identity-based cryptography (IBC) in mobile ad hoc networks (MANETs). The authors observed that although IBC offers properties suitable for use in MANETs including the generation and storage of privacy keys and the elimination of any need to distribute and store partner certificates, IBC requires system parameters to be distributed among all communicating parties before any encryption/decryption could take place, putting the “ad hoc” property out of scope. The authors in [10] provided a review of IBC and a comparison with traditional public-key encryption. After reviewing some important IBE schemes based on bilinear pairing, a computational primitive widely used to build various identity-based cryptographic schemes, a number of real-world applications were identified. Li et al. [11] surveyed identity-based signcryption (IBSC) schemes (Signcryption is the cryptographic primitive that meets both requirements of authenticity and confidentiality of crowdsourced data among users and is ideal for ensuring secure authentic data storage and transmission in industrial crowdsourcing environments), providing a comparison on their security properties and efficiency. Several recommendations to improve the performance of IBSC were made, including the construction of schemes in the standard model, the construction of post-quantum signcryption schemes and efficiency improvements.
Wang et al. [12] provided a survey on the two main techniques of searchable encryption (SE), namely symmetric SE (SSE) and public key encryption with keyword search (PEKS). Different SE schemes are categorized and compared in terms of functionality, efficiency, and security. The work of [13] describes the notion of SE in the context of healthcare applications and characterizes the SE use cases into different healthcare scenarios. The authors provided a comprehensive overview of the four representative SE techniques: SSE, PEKS, attribute-based encryption with keyword search (ABKS), and proxy re-encryption with keyword search (PRES) according to different electronic health records (EHRs) retrieving scenarios and requirements. Furthermore, the categorization and comparison of different SE schemes in terms of their security, efficiency, and functionality is also provided. In a more recent work, the authors in [14] presented a complete taxonomy/classification of the searchable encryption schemes in terms of the type of search, type of index, results retrieved, implementation type, multiplicity of users, and the techniques used. A more recent study in [15] provided the reader with a wide view of the different FE schemes, focusing on their functionalities, limitations, security models, and the involved mathematical assumptions. The authors also presented an overview of “non-standard” FE schemes that go beyond the inner product encryption and schemes with enhanced properties.

1.3. Methodology, Contribution and Organization

1.3.1. Research Methodology

As discussed in Section 1.2, the abundant literature on different aspects of fine-grained access control in general, and related to IoT in particular, has been previously analyzed from various perspectives. This work aimed to complement the previous works by providing a comprehensive review of the different access control approaches combined under the umbrella of functional encryption, as specifically applied to IoT applications. To achieve the desired objectives, we adopted the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology, a framework developed to support systematic reviews and meta-analyses of literature [16]. To approach the problem at hand, we performed a search, in November 2021, in the Scopus database using the available search tool. Furthermore, we performed another search in April 2022 using the same database to include any new works published in early 2022. We chose this database owing to its breadth and relevancy in regard to the literature, as it includes the majority of the related archives and journals. Furthermore, this database is frequently used in a lot of such academic reviews.
The approach which we considered for search through the database looked for terms that comprised of different word combinations describing the problem at hand. The terms “Functional Encryption”; “Attribute based Encryption”, “Identity based Encryption”, “Searchable Encryption” and “Predicate Encryption” were used in combination with terms relating to “Internet of Things” and underlying applications. Once the articles that resulted from the search were extracted, a manual review of all the results was performed through focusing on the title, abstract, keywords and main text of the papers, eliminating any works that were deemed unrelated to the purpose at hand. Any duplicate results were also eliminated at this stage. It should be noted here that any articles that discussed the aforementioned variations of fine-grained access control in mathematical detail but did not address specific IoT applications were also excluded from further analysis. More specifically, the articles considered for further analysis met the criteria as (i) they considered fine-grained access control in one of the variations given above; and (ii) they presented application of access control in an application area of IoT. Further screening was also applied to those records that did not offer full-text availability and were deemed unsuitable for inclusion in the review due to the fact they were not applicable in IoT areas. We summarize the process of search, exclusion, and selection in Figure 2, where it can be seen that although the initial search resulted in a total of 410 articles, the number was reduced to 155 articles after the analysis, filtering, and classification. We also provided a distribution of the works considered in this study according to the publication year in Figure 3.

1.3.2. Contribution

In this work, we surveyed the recent applications of FE along with the commonly occurring cryptographic primitives that it generalizes. More specifically, we looked at the prominent works presented in the literature in recent years covering the applications of these cryptographic primitives to IoT-related domains. Our main contributions can be summarized as follows:
  • We present a comprehensive review of the use of FE and encompassed fine-grain access control mechanisms in IoT applications.
  • We provide a detailed overview of the different application areas where fine-grain access schemes were applied.
  • We provide an in-depth survey of how these schemes are used in a multitude of applications related to IoT. The aim was to provide the reader with a potential vision of fine-grained security and integrity in IoT.
  • We identify some research trends and state some open challenges that current developments face for a secure IoT realization.

1.3.3. Paper Organization

The basics of considered cryptographic primitives and early development works are described in Section 2.1, Section 2.2, Section 2.3, Section 2.4 and Section 2.5, whereas Section 3 gives a brief description of the considered application areas. The different applications that we cover in this work range from IoT and cloud applications to data sharing and classification and machine learning. The presented work is divided into sections pertaining to different techniques, wherein Section 4 considers the applications of ABE; Section 5 describes the work utilizing IBE for the most common application areas; Section 6 presents the works using SE; Section 7 describes the applications of PE; and the applications wherein FE is utilized are given in Section 8. We provide some open challenges and related research trends in Section 9, and finally, some conclusions are drawn in Section 10. A graphical outline of this work is also shown in Figure 4. We also note that there is a significant overlap in the application areas of all these cryptographic techniques, whereas the underlying schemes and targeted benefit drawn upon differ greatly depending on the utilization of these schemes.

2. Review of Functional Encryption and Encompassed Cryptographic Primitives

FE is a strong generalization of several existing cryptographic primitives which addresses fine-grained access control in varying aspects. In this section, we first present these underlying primitives and then provide some details on FE before delving into the application areas of interest. Towards the end of this section, we also described how the following presented cryptography schemes can be constructed from FE.

2.1. Attribute-Based Encryption

Attribute-based encryption (ABE), first proposed by Sahai and Waters [17], is a type of public-key cryptosystem where the secret key of a user and the associated ciphertext are linked to their attributes. As a result, the decryption of a ciphertext is only possible if the set of attributes of the user’s key match the attributes of the ciphertext. The following set of cryptographic primitives are commonly used in ABE schemes.
  • ( M K , E K ) = Setup( λ )—this primitive initializes the cryptographic scheme, where taking λ as the input security parameter, a master key M K and an encryption key E K are generated.
  • C P = Encrypt(M, P , E K )—This primitive encrypts the message/plaintext M under the policy P using the encryption key E K , generating the ciphertext C P .
  • D K = KeyGen( γ , M K )—This primitive generates the decryption key D K taking into account the user attributes contained in γ and the master key M K .
  • M = Decrypt ( C P , D K ) —This primitive outputs the message M taking as input the ciphertext C P and decryption key D K if the decryption is successful. In the case of failure, it outputs ⊥ (the symbol ⊥ is commonly used in the literature to denote a failure to decrypt).
Owing to the fact that attributes are crucial entities in any ABE scheme, two classifications of ABE named CP-ABE and KP-ABE were proposed, which have been widely adopted in the literature.

2.1.1. Cihpertext-Policy ABE

CP-ABE, as first proposed by Bethencourt et al. [18], offers sufficient flexibility since it allows rules that specify which private keys can decrypt which ciphertexts. These private keys are associated with sets of attributes or labels, and when a user encrypts, they encrypt to an access policy which specifies which keys will be able to decrypt. CP-ABE has been deemed more appropriate in the literature for data sharing systems since data owners make and own the decision concerning the access policy. For CP-ABE, since the policy is embedded in the ciphertext itself, the access structure for CP-ABE answers the question: “Who can access the data that I am encrypting?”.
A variety of CP-ABE schemes have been proposed for flexible access control policies. Cheung et al. [19] developed the first CP-ABE scheme under the decisional bilinear Diffie–Hellman (DBDH) assumption and used positive and negative attributes under AND-gate constructions. One drawback of this work was that the size of ciphertext and secret key linearly increased with the number of attributes. Goyal et al. [20] and Liang et al. [21] made further improvements to CP-ABE through a flexible access structure which supported AND, OR and threshold operations. Using non-interactive cryptographic assumption, Waters [22] proposed a new CP-ABE scheme where access the structure is presented using a linear secret sharing scheme, however, it suffered the same problem of linear increase in encryption and decryption overhead with the access structure.

2.1.2. Key-Policy ABE

KP-ABE was originally proposed by Goyal et al. [23] which, based on the decisional bilinear Diffie–Hellman (DBDH) assumption, allowed fine-grained access to monotone structures. In the proposed scheme, the secret key is associated with a pre-accessed structure where the user is only able to decrypt the ciphertext if the attribute set satisfies the access structure in the secret key. For KP-ABE, since the policy is embedded inside the key belonging to the decryptor, the access structure of KP-ABE simply answers the following question: “As a decryptor, what type of data can I access?”.

2.2. Identity-Based Encryption

Public-key cryptography enables the communicating parties to encrypt/decrypt messages and send them through insecure network channels. However, before secure communication can be enabled, users must generate encryption and signature key pairs, be verified by a certificate authority (CA) and receive CA-signed certificates. Furthermore, key management issues including the key storage capacity required to archive all the private keys for distinct users and key certification and validation processes [24,25] result in major drawbacks of the public-key cryptography’s practical implementation. The idea of identity-based cryptography was first proposed by Shamir in 1984 [26], putting forth the notion of using a unique string such as a user’s name, email address or contact number to explicitly compute the user’s private key. This enabled a new paradigm providing a key-certificate-less platform effectively overcoming the issues plaguing public-key cryptography. However, it came to reality only after Boneh and Franklin designed the first secure and practical IBE scheme [27] using bilinear pairing on elliptic curves. In the same year, Cocks proposed an IBE scheme using quadratic residuosity as the underlying primitive [28]. Since then, other primitives including trapdoor subgroups [29,30] have also been proposed. A conventional IBE scheme can be described in the following cryptographic primitives:
  • ( M K , P a r ) = S e t u p ( λ ) —Upon the input of security parameter λ , it outputs public system parameters P a r , and master key M K . The P a r are released to the public while M K is kept secret.
  • P K = E x t r a c t ( M K , P a r , I D ) —Upon the input of M K , P a r and user’s identity string I D , this generates the user’s corresponding private key P K .
  • C P = E n c r y p t ( P a r , I D , M ) —Upon the input of P a r , I D and message M, this outputs the ciphertext C P .
  • M = D e c r y p t ( P a r , I D , C P ) —This outputs the message M taking as input the ciphertext C P alongwith P a r and I D . In the case of decryption failure, it outputs ⊥.

2.3. Searchable Encryption

The diverse set of ciphertexts that are stored in the cloud servers or exchanged for information and analysis among IoT-based sensor entities need to be searched and located efficiently. The inability to access encrypted files limits the flexibility and precision of data retrieval, which might result in insufficient or incorrect search results. A simple solution may be to store the encrypted data on the cloud and a follow a complete decryption protocol every time there is a search query that needs to be completed. However, this may result in increased difficulty and complexity levels for data processing and application. Some cryptographic primitives such as secure multi-party computation (SMC) [31] and fully homomorphic encryption (FHE) [32] were proposed for the restricted handling of encrypted data, however, these primitives are currently inefficient and hard to use in real environments. The work in [33] proposed a first SE scheme based on ciphertext scanning, which enables users to store encrypted data in the cloud, perform keyword searches through the ciphertext domain and selectively retrieve relevant documents from the cloud. The basic scheme of [33] is described as follows: Assume that Alice wants to encrypt a document that contains a sequence of words W 1 , , W l . Alice generates a sequence of pseudorandom values S 1 , , S l using a pseudorandom generator G, where each S i is n m bits long. To encrypt an n bit word W i , Alice takes the pseudorandom bits S i , sets T i S i , F k i ( S i ) and outputs the ciphertext C i W i T i , where denotes a direct sum. Different SE schemes have been proposed in the literature, including the works of Curtmola et al. [34] for optimal search time, Ibrahim et al. [35] with information retrieval system, Chen et al. [36] for security outsourcing of large-scale equation and Sun et al. [37] for the secure sorting of encrypted data.

2.4. Predicate Encryption

PE [38] is deemed a novel cryptographic primitive that provides accurate fine-grained access to encrypted data. In contrast to traditional public-key cryptographic systems, it has been widely adopted in point-to-point communication systems. A cryptographic system such as PE discerns the justification of information being only available to the users with access rights, providing more fine-grained control over the ciphertext. Predicate encryption has an associated attribute space A , a predicate space P and consists of the following algorithms:
  • S e t u p ( λ ) —It takes as input the security parameter λ and outputs a public key P K , and master key M K .
  • K e y G e n ( M K , f ) —It takes as input the M K , and a predicate f P and outputs secret key S K f .
  • E n c r y p t ( P K , I , M ) —It takes as input a public key P K , an attribute I A and a message M, and outputs a ciphertext C P .
  • D e c r y p t ( C P , S K f ) —It takes as input the ciphertext C P and a secret key S K f , and outputs either a message M, or ⊥ in case of failure.
Two different types of PE have been proposed in the literature: asymmetric PE (ASPE) [38,39,40] and symmetric PE (SPE) [41,42,43], where the main difference in the two types lies in the identity of the searcher. In general, SPE is suitable for systems where the searcher is the same entity who has encrypted the data such as cloud storage systems, while in ASPE, the searcher is not necessarily the same entity as the data encryptor, such as email servers or credit card payment systems.

2.5. Functional Encryption

Traditional public-key encryption is deemed insufficient in a lot of emerging applications. For example, a decryption policy pertaining to the ciphertext under consideration needs to be specified, dictating that only the individuals who satisfy the policy can decrypt to obtain the plaintext. It is often necessary to only grant access to a function of the plaintext, depending on the decryptor’s authorization. For example, law enforcement agencies may ask the cloud to search for particular individual’s images, hence the cloud only needs restricted access to decrypt images that only contain the target individual, and nothing else from the images is revealed. Many applications such as spam filters, parental control, or targeted advertising, only require a partial knowledge of the data. Functional encryption adapts these useful applications for the desired data privacy and confidentiality, since only the relevant, processed information is revealed.
As compared to public-key cryptography systems, which contain three algorithms of Setup, Encryption and Decryption, FE systems also include a fourth algorithm called KeyGen. The KeyGen algorithm takes as input the master key m k generated by Setup and a description of some function f, and outputs a key s k [ f ] that is specific to the function f. More precisely, if c is the result of encrypting x with public key p k , then the decryption of c using s k [ f ] outputs f ( x ) . It should be emphasized here that that s k ( f ) does not fully decrypt c, rather it provides only a function f of the full decryption. However, for full decryption, users can use a secret key for some function, say g, where g ( x ) = x for all x. An FE system is secure if an attacker with a set of secret keys s k [ f 1 ] , , s k [ f t ] can learn nothing about the decryption of some ciphertext c other than what is revealed by the keys at the attacker’s disposal (we refer the interested reader to [4,15] for further mathematical details including the security model analysis).
For further illustration, we consider the common example of spam filtering on encrypted mail, as described in [44] and depicted in Figure 5. Here, the email recipient, who has a master secret key s k , gives a spam-filtering service a key s k [ f ] for the functionality f; this f satisfies f ( x ) = 1 whenever message x is marked as spam by a specific spam predicate, otherwise f ( x ) = 0 . A sender encrypts an email message x to the recipient, but the spam filter blocks the message if it is spam. The spam filter does its job through the key s k [ f ] but learns nothing else about the contents of the message.
Based on the seminal work of [17], the tutorial style article by Boneh et al. [44] explains the basic ideas for FE, encompassing previous specializations of public-key encryptions such as IBE and ABE as special cases of FE. Motivating the use of FE through practical examples such as spam filtering on encrypted email, expressive access control and the mining of large datasets, it discusses how FE supports the richest possible families of functions and also provides an insight into the inherent limitations of FE systems. It is notable that FE generalizes several existing cryptographic primitives including IBE and ABE, among others. Under the FE terminology, IBE can be formulated as equality testing functionality, where assuming p k and m k to be output of an FE setup, the encryptor uses the encryption algorithm as E ( p k , ( i d , m ) ) to obtain the ciphertext, while the data being encrypted are the pair ( i d , m ) . A recipient with an identity of i d * can use the secret key s k [ f i d * ] , issued by the authority, where the function f i d * outputs m if i d = i d * , otherwise it produces a ⊥. Under this construction, users can only decrypt messages intended for i d * , otherwise they learn nothing about messages which are encrypted for other identities. Similarly, in the case of a ciphertext-policy ABE system, the policy ϕ specifies the recipient attributes that can decrypt the ciphertext and the encryption function takes into account the pair ( ϕ , m ) to generate the ciphertext. The message m is successfully decrypted if all the specified attributes of the recipient match the ones specified in the policy else a ⊥ is the output.
A brief summary of the advantages and disadvantages of the above discussed primitives is given in Figure 6, providing the reader with an intuitive understanding of these approaches. It should be noted that the details in Figure 6 are not application-specific, and can be used as general guidelines when choosing between different approaches to achieve fine-grained access control and security.

3. Areas of Application

In the modern day and age, the range of applications where the security and integrity of information plays a vital role is virtually unlimited. The amount of data exchanged in these applications is vast, and data integrity is not only important to the users but also to various service providers. The Internet of Things [1,45], enabling the realistic vision of ‘everything smart’ is one of the most common and crucial areas where the security and integrity of data are highly desirable. A variety of modern-day applications rely on numerous IoT devices distributed across every possible surface, equipped with various IoT-based sensors for data collection and further uploading these data to the relevant authorities. Apart from analysis and response, these data also allow control authorities to make intelligent decisions and develop algorithms for improved performance. Even though this realization of IoT seems exciting and able to solve several problems, the characteristics of these IoT sensor devices make the security and privacy of all the involved information very critical.
In the following, we provide an overview of some of those application areas that were considered in this survey, providing the reader with a glimpse of relevant security concerns in these applications. The major application areas covered in this work are shown in Figure 7, whereas Figure 8 details the application areas considered under each cryptographic primitive.
Fog and Cloud Computing—Cloud computing [46] enables the sharing of resources as services for software, infrastructure and platforms for customers. Cloud customers, in general, store their sensitive data in encrypted form. Fog computing [47], as shown in Figure 9, extends cloud computing to the edge of the network, providing newer services such as location awareness, low latency and quality-of-service (QoS) enhancement. However, significant threats exist in cloud- and fog-based computing networks relating to data alteration, unauthorized access and eavesdropping attacks. Furthermore, fog nodes are considered to be more easily compromised and less trustworthy due to their closer deployment to the network edge. These issues raise the most concerns among users who look to utilize fog and cloud resources for data storage and sharing.
Data Search and Sharing—With the recent increase in the amount of data exchanged [48], their transmission and sharing across public networks should be treated carefully. This, in part, can be attributed to the fact that in public networks, participating users are not fully trusted and everyone, including the adversaries, can easily become part of the network. On the other hand, searching is an increasingly important aspect for the retrieval of desired information. Since data are generally stored in encrypted form with cloud service providers, extracting desired information may require the decryption of all the data which are computationally complex and infeasible. Furthermore, traditional public-key encryption with keyword search (PEKS) schemes involve public-key infrastructure (PKI) to authenticate users over the network which is considered a complex and costly task due to the involvement of certificate revocation, storage, distribution and verification.
e-Health Applications—Smart health systems [49], as shown in Figure 10, enable the exchange of sensitive and personal data between doctors and patients. If the doctors have timely access to a patient’s medical information, this can result in better advice and medical services. The privacy of these data can be threatened if these sensitive data are exposed to an open network. Furthermore, since most health sensors and mobile devices have constrained resources, quickly producing and processing ciphertexts can be challenging.
Smart Homes and Cities—Smart homes and cities, as shown in Figure 11, are perceived to facilitate the needs of modern citizens, improving the overall quality of their life. Smart homes [50] are envisioned to connect all appliances and objects together, integrating them in the Internet through smartphones and other mobile devices. However, all these connected devices contain personal information flowing through them, causing concerns among home owners about their privacy. On the other hand, smart cities [51] can address the major problems in most urban areas including traffic congestion, energy and resource management, education, sanitation and healthcare services. However, these technologies heavily rely on some underlying infrastructure, e.g., IoT sensors to achieve the desired purpose. Furthermore, the large amounts of data produced for the purposes of observation and analysis are generally outsourced to a cloud storage service (CSS) for ease of access and enhanced security. As soon as the data land on the cloud, the user’s control is lost and they have to fully trust the CSS. To encounter these problems, it has been often proposed to store encrypted data on the cloud while ensuring fine-grained access control.
Blockchain-Inspired Privacy—Blockchain is a comprehensive technology encompassing data storage, cryptography and distributed systems, among others, providing schemes to develop decentralized trust relationships [52,53]. This allows users to communicate and trade directly in the network instead of relying on third-party intermediaries. The distributed structure ensures that a compromise of one node in the chain does not affect the rest of the system. With the development of blockchain technology, its applications have transitioned from crypto-currencies to real economies. As security vulnerabilities make IoT devices an easy target for distributed denial-of-service attacks, malicious attackers and data breaches, blockchain technology can improve the security and scalability of IoT networks due to its transparency, truthfulness, immutability, and privacy features. On the other hand, in permissioned blockchain networks, each node can be owned by different organizations, without having to build a centralized network and to bring a certain level of trust among untrusting parties.
ML Applications—Modern-day applications heavily rely on machine learning (ML) techniques [54]. In the realm of network privacy and security, these can be used to help detect and prevent malicious activity and finding any security vulnerabilities. In the case of an attack on ML engines, training sets or datasets, the result may range from breaking the ML model to adversely affecting the prediction and classification results. Furthermore, neural networks which play the role of building blocks in ML applications need a well-designed privacy-preserving framework such that users can benefit from ML without revealing their own models and training data. More recent approaches, including federated learning [55], have every user train their model locally and then exchange only model parameters with others, instead of the sensitive training data. Although this protects the local exchanges among users, it requires sophisticated approaches to security and privacy.
Biometric Verification and Applications—Biometric authentication helps in providing services such as access control to verify the individual’s identity based on their biometric traits [56]. These traits such as fingerprints, iris scans and behavioral characteristics are physically linked to an individual and unlike passwords or other identity documents, they cannot be easily forged or manipulated. Standard biometric authentication systems utilize a two-phase process consisting of registration, where users provide their template to the server, and a query phase, where a fresh template is provided for authentication. However, this process is server-centric, suffering from some inherent deficiencies such as users having to fully trust the server to properly handle their templates and the inherent noise of biometric template that may cause issues in the query phase of the process. This inherent noise may also obstruct the system from keeping the identity information in an encrypted form at all stages, providing an opportunity for adversaries to gain access to them.
Social and Mobile Networks—While the current rolling out of 5G networks offers tremendous benefits to end users, information privacy has also raised serious concerns from users and service providers alike [57]. Balancing the trade-off between the strong confidentiality of user data and maintaining a low computation/communication overhead still remains a challenge, especially in big data applications. On the other hand, the amount of personal information stored on and shared through online social networks is immense, calling for an unprecedented level of security and confidentiality [58]. In the majority of these social networks, service providers make profits by generating advertisement revenue, where securing user privacy and generating accurate advertisements simultaneously can be tricky due to the involvement of user data decryption to extract keywords.
Table 1 provides an overview of the representative literature considered in this work for different applications under the considered cryptographic primitives.

4. Attribute-Based Encryption

ABE is a public-key encryption scheme in which the user attributes determine their secret key and the resulting ciphertext. Thus, the decryption of a ciphertext is only possible if the set of attributes of the user key matches the attributes of the ciphertext. A review of the significant literature on ABE in terms of applications for the last decade is provided in Table 2. In the following, we review some works on the application of ABE in the IoT domain.

4.1. ABE for Constrained IoT Sensor Devices

ABE Feasibility for IoT Devices—The work of [59] explores the feasibility of ABE for some well-known IoT platforms and recommends its adoption for secure access control in IoT applications. A comprehensive analysis of the cost of ABE operations on resource-constrained devices is performed, where KP-ABE and CP-ABE are implemented on widely used IoT-enabling devices. The paper provides evidence of ABE feasibility for devices including Intel Galileo Gen 2, Intel Edison and Raspberry Pi Zero. The authors also present a smart healthcare use case to evaluate the proposed feasibility in real-world scenarios. The cryptographic operation performance is evaluated based on the assured security level (the number of bits used as primitives in cryptographic operations), where three security levels equivalent to the security provided by AES symmetric encryption using key lengths of 80, 112 and 128 bits are considered. The authors observe that the considered security level does not significantly impact memory usage, which is instead affected by the number of attributes in the policy. However, considering the execution time and energy consumption, the overall performance penalty is higher when the security level, instead of the number of attributes is increased.
ABE Feasibility for Constrained IoT Devices—Further considering the adaptability of ABE for constrained IoT devices, [60] assessed the feasibility of ABE adoption in constrained devices characterized by limited capabilities in computing, storage and power. Three schemes corresponding to KP-ABE [23]. CP-ABE [18] and a recent KP-ABE for IoT [133] have been implemented and evaluated in terms of encryption/decryption time and energy consumption. The analysis presented by the authors highlights how ABE has a significant effect on the battery life of limited-power devices, which is significantly reduced when the number of employed attributes increases beyond 10. The authors specifically consider low-cost embedded devices with less than 1 MB of RAM and a micro-controller. The analysis shows that KP-ABE schemes are, in general, more efficient than CP-ABE ones, although CP-ABE schemes are considered more usable due to their association of access policy to data. It is also highlighted that instead of considering flat (in a flat policy, the decryption algorithm is always forced to visit all the leaves of the policy tree) policies, shaping the policies in many levels is good practice to improve the performance of CP-ABE schemes.
Lightweight ABE for IoT—Addressing the energy needs of constrained IoT devices, the authors of [61] build their work on the premise that CP-ABE has not been designed taking into consideration the energy efficiency of most IoT devices. The authors propose to extend the basic CP-ABE scheme using effective pre-computation techniques. Although some previously proposed solutions, e.g., ref [134], aim to mitigate this concern by using online semi-trusted proxies to perform cryptographic operations on behalf of the data owner, the proposed scheme in this paper does not need the presence or management of any previously mentioned proxies. Rather, the work relies on the pre-computation techniques, avoiding any substantial changes to the security protocols. The proposed algorithm requires fewer computations, where in particular, there is no need for exponentiations or scalar point multiplications apart from small scalars. However, the memory consumption depends on the number of attributes, limiting the attributes in the access tree for a given device.
Table 2. Significant IoT-related literature for ABE in the last decade.
Table 2. Significant IoT-related literature for ABE in the last decade.
Ref.YearAuthorSignificancePublisher
 [135]2022M. Rasori et al.ABE Survey for IoTIEEE
 [136]2022R. Imam et al.ABE Review for Health ServicesScienceDirect
 [137]2021Y. Zhang et al.Combination of Blockchain and ABE for Access ControlMDPI
 [138]2019S-Y Tan et al.ABE Enhancement for IoTIEEE
 [139]2018P. Kumar P et al.Survey on ABE in Cloud ComputingElsevier
 [64]2017Y. Rahulamathavan et al.Blockchain Enhancement for IoT Based on ABEIEEE
 [59]2016M. Ambrosin et al.ABE Feasibility for IoTIEEE
 [133]2014X. Yao et al.Lightweight ABE for IoTElesevier
 [65]2015M. Singh et al.Secure MQTT for IoTIEEE
 [66]2018S. Belguith et al.Cooperative Signcryption for IoTIEEE
 [68]2019M. Manna et al.ABE for Industrial IoTIEEE
 [69]2017A. Alrawais et al.ABE for Fog SecurityIEEE

4.2. ABE for IoT Applications

Secure User Access at IoT Middleware—The authors in [62] proposed a CP-ABE scheme on the middleware layer in the IoT system architecture for user access control while reducing the complexity on the middleware. The authors aimed to provide data security along with access control on the middleware in IoT architecture, where the middleware only stores the encrypted data that are encrypted using the data owner’s access policy. The proposed system model contains four entities that are part of the access control scheme, the central attribute authority (CAA) which publishes public keys and a unique global identity (GID) to the users; data owners that define the access policy characterizing which subset of data each data user is allowed to access; data users who, with the right attributes, can access the desired information; and middleware, which stores encrypted data and acts as a data access provider to eligible users. Introducing the CAA between the middleware and data owner ensures the privacy of the user’s data. Apart from the inherent benefits of ABE, the scheme also provides resilience against collusion attacks. Since user’s GIDs are associated with their respective attributes, if two users have different GID approach CAA, it will identify that although they have the required set of attributes to fulfill an access policy, the attributes do not belong to the same GID.
Secure ML Engines in IoT Applications—The work in [63] proposed a system to protect machine learning engines in an IoT environment without modifying the internal machine learning architecture. The premise builds on the security risks involved in the scenario where the computation process involves sensitive data in training and testing computations. The proposed scheme adopts the approach of a black box model where the machine learning engines are unchanged, i.e., the input and output of machine learning engines are preserved. To provide a secure access control, each computation request from the client to the server provides encrypted data with the appropriate access control attribute, otherwise the computation request is rejected. The authors proposed secure computation approaches for supervised learning models and predictions, where the scheme uses CP-ABE for key distribution and the key file is included in the device firmware. The provided results compare time and file sizes for both encryption and decryption processes, however, the computation is not performed for data with a size above 400 MB, since CP-ABE needs more allocated memory and processing power for higher data sizes.
Blockchain-Based IoT Ecosystem—The work in [64] used ABE to address the privacy and confidentiality of the data shared in blockchain-based IoT ecosystems. It proposes a restructuring of the blockchain protocol to absorb ABE and provide an end-to-end privacy-preserving blockchain system. The use of blockchains in IoT offers major security advantages including the mitigation of data manipulation attacks, avoiding data tampering and trust building based on node reputation. The authors considered a decentralized ABE thus more than one AA issues credentials for miners and users, avoiding any single point of failure. Similarly to traditional blockchain applications, transactions are verified through AAs using ABE and new blocks are added after mining in a periodic fashion. To guarantee a stronger security, the blockchain protocol specifies the minimum number of miners for transaction verification and AAs will be forced to wait until the number of miners for an attribute surpasses the minimum requirement set by the protocol.
Secure MQTT for IoT—Protocols such as Message Queue Telemetry Transport (MQTT) [140] are widely used in D2D communication in IoT for rapid developments, but lack security features. The authors in [65] proposed secure versions of these protocols where the existing security features are augmented with KP/CP-ABE, based on elliptic curve cryptography (ECC) [141]. The authors studied the suitability of ABE schemes for MQTT from an IoT perspective, and evaluate the performance of these secure protocols in IoT. A new published service ‘Spublish’ is described where the messages are encrypted using ABE, and suitability is provided based on lightweight ECC. The performance is evaluated in terms of the time taken to perform encryption, decryption, key generation and validation against a varying number of attributes with different key sizes. It is shown that a Secure-MQTT-based KP-ABE scheme is suitable for scenarios where the access policies are fixed and known a priori, and the requirement of an interactive public key generator (PKG) is feasible. On the other hand, secure-MQTT based on CP-ABE is more suitable for those deployments where devices can afford higher computing power and storage, and require dynamic access policies.
Cooperative Signcryption for IoT Applications—The paper [66] presented a cooperative privacy preserving attribute-based signcryption scheme (C-ABSC) based on the constant-size attribute-based signcryption technique [142]. The main idea presented by the authors relies on the distribution of the signcrypting operation among different devices, with respect to the selected subsets of a general access predicate. Thus, each device signcrypts its input data and sends them to an untrusted aggregator (e.g., the edge node in a cloud scenario) who is capable of decrypting the received data only if a sufficient number of IoT devices cooperate. The proposed cooperative signcryption scheme does not reveal more information other than the authenticity of the information. The analysis of the proposed scheme further shows that the size of the signcrypted data does not depend on the number of attributes in the access policy.
Attribute-Based Encryption and Routing in ICN—Due to data replication and dissemination, it is often difficult for the data owner to control data access in existing information-centric networking (ICN) implementations. The work of [67] enhances ICN’s ability to support data confidentiality by introducing ABE into ICN and making the approach specific to data attributes. The authors proposed an ABE and searchable data encryption (SDE)-based encryption scheme for content-centric data privacy in ICN, which offers fine-grained access control policies. The scheme facilitates large-scale applications by decoupling publishers and subscribers without any need to share keys, as is customary in symmetric encryption. Under the proposed approach, user privacy is preserved by encrypting subscription interests while routers can still forward encrypted data to subscribers.
ABE for Industrial IoT—The authors in [68] proposed an ABE scheme suitable for industrial IoT applications, fABElous, aiming to minimize the encryption overhead in communication. It should be noted that the computation power for the execution of ABE is generally not a major concern, as it was shown to be suitable for IoT sensor devices [60], however, the overhead generated by ABE can be heavy for the communication protocol as it generates roughly 1 kB overhead per message. In the setting under consideration, a wireless sensor and actuator network (WSAN) is examined where sensors and actuators exchange encrypted information. Under the given threat model, an eavesdropper is unable to gain any information as they lack the symmetric key and the ABE decryption key. Similarly, if compromised, the architecture proposes that the sensors periodically refresh their symmetric keys, minimizing the information retrieved by an attacker. Although fABElous has a huge overhead as compared to no security, it has less communication overhead when compared to naive CP-ABE. Furthermore, as the number of data exchange executions increases, the overhead becomes lower and lower, and in its best-case scenario, fABElous has less than 50 % of naive CP-ABE.

4.3. ABE for Fog and Cloud Applications

ABE for Secure Fog Communications—The authors of [69] proposed a key exchange protocol based on CP-ABE for establishing secure communications and enabling authentic and confidential communications among fog nodes. The proposed protocol establishes secure communications to exchange the shared key that is used to encrypt and decrypt the exchanged information. The fog nodes in the group can only obtain the shared key if they satisfy the policy defined over the set of attributes attached to the ciphertext. Based on the attribute set, a private key is issued for each fog node, while the cloud runs the encryption algorithm outputting an encrypted symmetric key which is broadcast to all fog nodes in the group. Upon receiving the encrypted key, each fog node runs the decryption algorithm using the assigned private key to extract the symmetric key. The proposed scheme is analyzed against collusion attacks, message authentication and forgeability, where the underlying structure based on CP-ABE provides the main defense. Apart from the proposed protocol, the authors also analyzed the performance and efficiency in terms of message size and communication overhead. The feasibility of the proposed scheme is demonstrated by implementing and comparing with an existing certificate-based protocol.
Secure Data Access in Fog Computing—The article [70] proposed a secure and fine-grained data access control scheme with ciphertext update and computation outsourcing in fog computing for IoT. Since, for a secure ciphertext update, a user should be able to prove to the cloud service provider (CSP) that they possess valid attributes, the cryptographic technique of attribute-based signature (ABS) is used to help the CSP in user verification. Furthermore, most of the encryption, decryption and signing computations are outsourced from the end users to fog nodes. As a result, the computations for data owners to encrypt, and for end users to decrypt, re-encrypt and sign the data are irrelevant to the number of attributes in the policies. The security model is shown to be resistant and covers the aspects of data confidentiality, fine-grained access control, authentication and collusion. The performance efficiency of the proposed scheme is analyzed in terms of computational complexity for the data users, where it has been shown that the time for computations is small and constant, and the scheme can tolerate the increasing number of attributes well.
Secure Data Sharing in Cloud Computing—The work of [71] addressed the challenges of simultaneous fine-grain access and data confidentiality in cloud-based data sharing by proposing a new attribute-based data sharing scheme. The proposed scheme was specifically designed for resource-limited mobile users in cloud computing. A majority of the computational tasks are eliminated by adding system public parameters and moving partial encryption computation to offline operations. Furthermore, a public ciphertext test phase is performed before the decryption phase, which eliminates most of the computation overhead due to illegitimate ciphertexts. The proposed scheme relies on an online/offline ABE scheme [143] that eliminates a majority of the computational load, allowing a resource-constrained mobile user to quickly transform a message into an ABE ciphertext. The proposed scheme allows anyone to check the validity of ciphertexts before performing an expensive full decryption.

4.4. ABE for Data Searching and Sharing

Data User-Based ABE—In the original ABE scheme, a central authority (CA) administers the system and generates secret keys for the users based on their attributes, where both the data owners (DOs) and data users (DUs) need to trust the CA. However, the CA is not always trustworthy and often, data users do not trust anyone but themselves. The authors in [72] proposed a new decentralized-ABE (DABE) scheme termed data-user-based ABE (DU-ABE), wherein DUs are not obligated to trust a CA. Instead, the DUs themselves take the responsibility and work as the authorities of an ABE system. In the proposed scheme, all the DUs possess attributes and run a DU-ABE system cooperatively to issue secret keys to themselves. In generating the authority setup, DUs are grouped according to their attributes and each member of the group generates a master key and a public key for that attribute. The DUs of different groups broadcast the public keys but save the master keys securely. Encryption setup by DOs takes into account the message, access matrix based on access policy, global setup and public keys of the relevant set of attributes, while for decryption, a DU employs the global setup and secret key related to a DU. For the generation of secret keys, all the DUs need to communicate with each other, which incurs a high communication overhead.
Secure ABE with Keyword Search—The work of [73] presented a CP-ABE scheme with a fast keyword search which preserves the fine-grained access control inherited from ABE while supporting hidden policy and fast search. The proposed scheme supports AND-gate access policy with multiple attribute values, and uses multi-value-independent CP-ABE resulting in constant computation costs as compared to the previously proposed schemes. The authors proposed a multi-value-independent CP-ABE including authorized keyword search and a hidden policy. The search user obtains the secret key from the trusted authority, and given a keyword, the user generates a valid trapdoor and submits it to the cloud (only those users whose attribute set satisfies the specified access policy can generate a valid trapdoor). With the given trapdoor, the cloud server operates keyword search over the encrypted data and retrieves the corresponding information.
ABE with Personalized Search—The authors in [74] addressed the design of an SE scheme termed AEPS which supports personalized search and fine-grained access control. A user interest model for individual users is proposed according to the department that the user belongs to and their search history, where in addition to offering the flexible search service in cloud computing, the scheme is able to return search results tailored to the user. Furthermore, AEPS achieves access control and search functionality at the same time, making it suitable for multi-user shared cloud search services. A personalized interest model is built to record and analyze the user’s department attributes and their search history. Using the access structure, the data manager controls the user’s access rights based on their attributes, while the search results are sorted according to the rank algorithm. The proposed scheme provides a solution of more flexible and personalized search for companies, hospitals and schools, while providing a solution to secure and inexpensive data storage in the cloud server.
Information Sharing in Tactical Mobile Networks—The work in [75] presented a novel ABE cryptographic algorithm for battlefield tactical mobile networks (TMNs) with added capabilities for revocation, delegation and federation. The authors argued that it can serve as a foundation for a security infrastructure that allows efficient and effective information sharing on the TMN. The construction of the proposed algorithm is divided into a federated setup and key generation, key generation delegation as well as data distribution and access. The scheme is resistant against unauthorized access from a single user and against collusion attacks since ABE is inherently compatible with the TMN.

4.5. ABE for e-Health Applications

Secure Medical Data Sharing using IoT Sensors—The work in [76] proposed an efficient medical data sharing scheme that caters for smart terminals with limited computing power. Owing to user information leakage due to the attribute matching function, the use of attribute bloom filter (ABF) is proposed which hides the entire attributes in the anonymous access control structure. To generate the ciphertext more quickly, the use of online/offline encryption is proposed where the majority of the work needed in the encryption phase is completed before knowing the exact message. Furthermore, in the case of an increase in system users’ attributes, the proposed system does not need to be reinitialized, resulting in improved efficiency. Although hiding the values of attributes protects user privacy to a certain extent, even the names of attributes can leak some sensitive information. To cater for this, the authors propose to hide the attributes in an access control structure. For successful attribute assignment and gaining the secret key, both data owners and users should register and be authenticated with the attribute authority. Due to the use of pre-encryption technology, ciphertext is generated more quickly, which is well-suited for terminals with limited computing power.
User Study and Evaluation for ABE Adoption in Hospitals—To study the integration of ABE in e-Health environments, the work in [77] conducted a study to identify use cases and requirements, and to learn the integration of ABE in IT processes. Based on the identified requirements through a focus group, an adaptive prototype implemented and evaluated through a cognitive walkthrough with usability experts. The target is to identify application scenarios and best-suited strategies to embed the useful features of ABE into the daily routine of a hospital. The authors proposed an architecture that is adaptive and matches the requirements of healthcare domain. The requirements derived from the focus group are taken into account for the development of a user management and container management (UMCM) endpoint, which deals with the authentication and authorization of users and also the validation of claimed email addresses that serve as part of user identity. The end users maintain a contact list and tags corresponding to identities with attributes, where the client application takes care of the policy authoring process.

4.6. ABE for Smart Cities

ABE Utilization in Smart Cities Environment—The use of cloud storage systems (CSS) generally lowers the capital and operating expenses, while guaranteeing high availability; however, there is also the risk of information disclosure to unauthorized entities. The work in [78] presented an encryption scheme for urban sensing which addresses the data storage concerns on the cloud while ensuring fine-grained access control by means of ABE. The work focused on a non-hierarchical ABE scheme with a single trusted third party (TTP), which generates decryption keys and provides them to users. The authors also proposed a key revocation method whose efficiency is based on a convenient attribute representation of the smart city, wherein IoT devices only execute the lightweight operations of symmetric cryptography. The proposed scheme also provides security against a variety of adversaries including the honest-but-curious CSS, an external adversary capable of eavesdropping traffic and compromising sensing devices, and a set of colluding users waning to illegally gain more authorizations.

5. Identity-Based Encryption

IBE is public-key encryption wherein a user generates a public key from a known unique identifier such as age or an email address or known location, and a TTP server calculates the corresponding private key from the public key. As a result, there is no need to distribute public keys before the exchange of encrypted information. A review of the significant literature on IBE in terms of applications for the last decade is provided in Table 3. In the following, we review some works on the application of IBE in the IoT domain.

5.1. IBE for IoT Applications

Identity-based Authentication for IoT—The work in [79] proposed an identification and authentication scheme for heterogeneity in terms of format, type and semantics for IoT networks based on a software-defined network (SDN) [144]. The central SDN controller translates the different technology-specific identities from the different silos into a shared identity based on virtual IPv6 addresses and authenticates devices and gateways through a hierarchical and distributed deployment. The key establishment method is based on elliptic curve cryptography (ECC) [141], while the root controller public key is assumed to be hardcoded in each thing when manufactured. The authors provided details of all the phases involved in the process of authentication, including public key certification, thing registration and the authentication phase. The evaluation of the proposed scheme shows that it is safe against masquerade, man-in-the-middle and replay attacks.
IBE for Post-Quantum Secure IoT—The authors in [80] demonstrated that IBE has become practical for a range of embedded devices for the Internet of Things. The authors explored how different security levels and parameters for the underlying ring learning with errors (RLWE) assumption [145] will affect the implementation of IBE encryption and decryption in a range of typical IoT devices. Furthermore, the authors also proposed parameters for a pair of security levels that render an efficient IBE implementation via the number theoretic transform (NTT) [146] possible. In particular, the authors considered an ARM Cortex-M0 and an ARM Cortex-M4 for low-cost microcontrollers and a Xilinx Spartan-6 for FPGA implementation. The implementation results provided a detailed analysis of the applied techniques and algorithms, comparing the cycle counts and read-only memory (ROM) consumption, especially for the processes of encryption and decryption. The results suggested that IBE is practical for IoT devices as the performance is only slightly lower than the performance of RLWE Encrypt, with the added benefit of IBE’s simplified key management.
IBE for Anonymous Communication in IoT—The article [81] proposed a scheme to ensure the privacy and anonymity of a communication system based on anonymous IBE, protecting the users’ metadata. In the proposed scheme, a user can send and receive the ciphertext in the same round of communication, which apart from causing sufficient confusion for the adversary, also results in improved efficiency. This work addresses the security goal of anonymous communication in three aspects, consisting of the message security, as well as the anonymity of both the sender and recipient. All the users follow a slotted time format, where the operations of encryption, upload, download and decryption are undertaken within pre-specified time slots. One downside of the proposed scheme stems from the fact that every user is required to send at least one message in each round of communication whether they want to have a communication or not.
Table 3. Significant IoT-related literature for IBE in the last decade.
Table 3. Significant IoT-related literature for IBE in the last decade.
Ref.YearAuthorSignificancePublisher
 [147]2020X. Jia et al.IBE-Based Authentication for IoTMDPI
 [148]2020N. Farjana et al.IBE for Security in FogSpringer
 [84]2017A. Karati et al.IBE for Industrial IoTIEEE
 [149]2017J.Y. Kim et al.Secure Management of IoTACM
 [80]2017Tim Güneysu et al.Lightweight IBE for Post-Quantum IoT SecurityIEEE
 [82]2016Y. Mao et al.Fuzzy IBE for Secure IoTElsevier
 [150]2013F. Li et al.Integrating WSNs in IoTIEEE
 [141]2012B S Adiga et al.IBE for M2M CommunicationACM
 [79]2016O. Salman et al.IBE-Based Authentication for IoTIEEE
 [81]2018L. Jiang et al.IBE for Anonymous IoT CommunicationHindawi
 [83]2016S. SankaranIBE-Based IoT Security FrameworkIEEE
Fuzzy IBE for Secure IoT—The work in article [82] presented a fuzzy IBE scheme that is secure in the full model (i.e., the adversary can commit the target identity at any time) without random oracles, and at the same time, has a tight security reduction and short public parameters. Under the tight security reduction, the scheme does not need to enlarge the key and ciphertext size to obtain an increased security level. Due to these efficiencies of the proposed scheme, the authors believe that the scheme is more suitable for secure IoT communications. The authors also proved the semantic security of the proposed scheme under the modified bilinear Diffie–Hellman exponent (2-MBDHE) assumption, which is adapted from some of the previous [151] security constructions.
IoT Security Framework Based on IBE—The paper [83] proposes a lightweight security framework for IoTs using identity-based cryptography (IBC). The authors developed a hierarchical security architecture for IoTs, and provided protocols for secure IoT communication such as for intra-domain and inter-domain communication, mutual authentication and revocation. In contrast to prevalent mechanism, the authors envisioned hierarchical topologies for IoT that can adapt to deployment at a massive scale. For the intra-domain communication, the authors adapt the Sakai, Ohgishi and Kasahara (SOK) scheme [152] for non-interactive key agreement. On the other hand, the mutual authentication scheme is a hybrid key management mechanism that uses IBE to set up pairwise symmetric keys between s and gateway nodes, and operates in bootstrapping, operational and post-operational phases. The scheme preserves data integrity by computing a message authentication code (MAC) on the pairwise symmetric key to provide an increased level of security, and it is shown that the scheme is scalable and incurs less overhead than traditional public key-based cryptography.
Identity Signcryption for Industrial IoT—The authors in [84] presented an identity-based signcryption (IBSC) scheme using bilinear pairing for IIoT deployment. After studying two hard problems named modified bilinear Diffie–Hellman inversion (MBDHI) and modified bilinear strong Diffie–Hellman (MBSDH) under polynomial time intractable assumptions, the authors demonstrated through a rigorous security analysis that their scheme is provably secure based on the intractability of decisional-MBDHI and MBSDH assumptions. The scheme works on a multiplicative group elements, and proves its resistance in the formal security structure. The performance of the proposed scheme is illustrated considering the computational cost and the communication cost. Although the scheme is efficient, the cost during signcrypted IIoT data generation and verification can be reduced by eliminating the pairing overhead. Furthermore, the scheme does not support any revocation facility.

5.2. IBE for Smart Cities and Homes

IBE for Smart Homes—The work in [85] addressed the key challenges of the management flexibility and efficiency of computation and communication in providing a smart home system with confidentiality services. The authors proposed a lightweight encryption scheme for smart homes called lightweight encryption for smart home (LES), which is based on stateful IBE [153] combining IBE and stateful DH encryption scheme, encouraged to be used for resource-constrained devices. As an identity-based scheme, the public keys used for the scheme are merely identity strings, hence they do not need any certificates. The proposed scheme separates key encryption and data encryption in such a way that key encryption is performed less frequently. The authors provided a security definition for LES, and analyzed the security of the proposed scheme showing that it is IND-CPA secure in the random oracle model. The computational efficiency in the scheme comes from using the state, which is calculated only once between a smart home device and a user per communication. Numerical evaluation shows that in comparison to a stateless version of IBE, the encryption schemes accelerate nearly 10 times in the proposed scheme.
IBE for Smart City Information System—In the work of [86], the authors propose a generic broadcast encryption scheme which is identity-based, and is from a generic anonymous IBE construction, providing confidentiality and anonymity simultaneously against chosen ciphertext attacks under DBDH assumption. The scheme also utilizes the strong one-time security notion for signature scheme (this captures the intuition that an adversary can request a signature σ on any single message m one time, after which the adversary should not be able to forge a pair of valid signature on another message; furthermore, the strong security requires that the adversary cannot generate a valid, but different, signature σ on the same message m). The proposed generic identity-based broadcast encryption (IBBE) has a desirable property that its public parameter size and private key size are constant and that its decryption cost is independent of the number of receivers. Furthermore, the ciphertext is linear with the size of the receivers. Due to these characteristics, the proposed construction is deemed to be appropriate for smart city information systems. The security model of the proposed scheme builds on the IND-CCA (indistinguishability under chosen-ciphertext attacks), ANO-CCA (anonymity under chosen-ciphertext attacks) and WROB-CCA (weakly robust against chosen-ciphertext attacks) models. However, it should be noted that the construction is proven in the random oracle model.

5.3. IBE for Healthcare and Cloud Applications

IBE-based encrypted traffic analytic for cloud computing—The work of [87] used the concept of IBE with an equality test (IBEET) to propose a scheme for malware detection and the verifiability of encrypted data. The flow metadata, which includes the inbound and outbound bytes and packets along with the source and destination ports and flow duration in seconds, is used to compute a trapdoor for the detection of malware in encrypted data. The proposed technique builds on the work of [154] to allow the trapdoor function generation based on the flow metadata and byte distribution of encrypted data, where the metadata is sent to a remote MAP (malware analytic provider) server for verification. Based on the decision of the MAP server, which relies on the machine learning classifier-generated matches for a standard handshake scheme, the ciphertext is either forwarded to the cloud server for storage or rejected. Thus, the MAP server is presumed to possess the database records of standard handshake parameters and generated signatures between a client and the server.
Data Sharing in e-Healthcare Systems—The paper [88] proposes a secure data sharing scheme for e-healthcare systems based on IBE with signatures to enable data sharing based on a user’s public identity. The scheme also ensures that data sharing is encrypted and authenticated such that only authorized uses are allowed to exchange any data. The data sharing is encrypted using AES, and authenticated using the BLS signature scheme (Boneh–Lynn–Shacham signature scheme that allows users to verify that a signature is authentic) [155]. The proposed protocol is divided into four algorithms, namely KeyGen, Extract, Encrypt & Sign, and Verify & Decrypt. The scheme only differs from original IBE scheme in the incorporation of AES, ensuring encrypted health information and verified recovered health data. The authors also showed the practicality of the proposed system through the computation times of encryption and signing, and decryption and verification on different platforms including the Arm Cortex Processor.
Data Sharing for Mobile Healthcare Social Networks—The article [89] presented a secure data sharing and profile matching scheme for the mobile healthcare social networks (MHSNs) in cloud computing. The users are able to outsource their encrypted health records to cloud storage with an identity-based broadcast encryption technique, and share them with a group of doctors in a secure and efficient manner. The authors also present an attribute-based conditional data re-encryption construction which—should the pre-defined conditions in the ciphertext be satisfied—allows doctors to authorize the cloud platform to transform the ciphertext into a new ciphertext for any specialists that are authorized by the patient. The scheme also provides a profile matching mechanism in MHSN based on IBE with an equality test [154], where users can find friends and achieve authorization for the encrypted health records, with resistance against a keywords guessing attacks. The scheme is shown to be collusion-resistant against colluding doctors, while the scheme is also a one-way chosen-ciphertext-secure against a chosen identity attack.

5.4. IBE for Blockchain Privacy and Authentication

IBE and Blockchain-Based Authentication—The paper [90] proposes an improved key distribution scheme by integrating the techniques of blockchain [156] into the secure key issuing of IBE. The scheme implements mutual identity authentication between the communicating parties through integrating blockchain in the key issuing process. Users are treated as nodes of a blockchain, and are divided into the roles of supervision, production and protection nodes. The authentication process consists of key issuing and identity authentication to establish a secure communication channel. Furthermore, the role of the nodes are changed from time to time to effectively reduce the attack probability, where the change in roles is carried out through a consensus mechanism using the proof of vote (PoV). To prevent any network attacks, the scheme employs timestamps, random numbers and a hash algorithm in the process of identification. The analysis shows that the proposed scheme can effectively resist network replay attacks and DoS attacks, guaranteeing integrity and authenticity.
Data Privacy for Permissioned Blockchains—The authors in [91] presented a practical scheme by adding IBE to blockchain systems, effectively improving the data privacy for non-transaction applications. The proposed approach has a high security level which can prevent both disguised and passive attacks, offering functionality, effectiveness and practicality in many applications for non-transactional scenarios. For many applications related to the real-world economy, such as quality tracking, copyright and supply chain finance, only data transfer is mainly needed which means that operations in consensus are primarily the consolidation of data. The authors first constructed a simple ID-based encryption privacy protection scheme that can be well applied to non-transaction scenarios in permissioned blockchains. In the proposed scheme, a user’s public key is generated through their identity, which simplifies the management and distribution of certificates in traditional PKI systems. Any new user joining the permissioned blockchain can obtain the encrypted key directly through their unique identity, which offers convenience in comparison to PKI systems.

5.5. IBE for Keyword Search and Biometric Verification

Dual Trapdoor IBE with Keyword Search—The work in [92] addresses an efficient search over encrypted data where previous schemes focus on supporting efficient and complex queries for the private key holder, while the authority cannot efficiently search the encrypted data. The authors introduced a new primitive named dual trapdoor identity-based encryption with keyword search (DTIBEKS), where the authority can use a peculiar means of producing an additional trapdoor allowing it to search for any identity’s encrypted data. The security of the proposed scheme is proven without random oracles, and is based on the methodology of dual system encryption [157]. The proposed scheme can be easily transformed into identity-based encryption with fuzzy keyword search by adopting a method similar to [158]. In the proposed primitive, two forms of trapdoors are considered, namely ‘identity-keyword trapdoor’ and ‘keyword trapdoor’, where the keyword trapdoor enables the cloud server to search for which data contain a given keyword regardless of who owns the data.
Biometric Identity Verification—The article [93] described the first generic construction for multimodal biometric IBE considering two distance measures at the same time. In order to have a high recognition rate, and thus an increased possibility of decryption—even in the case of white noise—the proposed construction is based on two different biometric IBE systems encoding the same message. The scheme combines a fuzzy IBE-type scheme, which allows the use of biometric attributes as the identity instead of an arbitrary string, and the distance-based encryption (DBE) [159] with minimum overhead in terms of public parameters, ciphertext and private key size. Here, the authors described an IBE scheme denoted as ordFIBE, which is restricted for biometrics that can be represented as an ordered/grouped set of features. The proposed system can also be implemented as an ABE scheme, since the attributes of users can be grouped/ordered. If some of the attributes at the sender’s side do not match those on the receiver side, then due to the error-tolerance of the scheme, the receiver is still able to decrypt the ciphertext. The security of the scheme is analyzed under both the ROM and in standard model, and the efficiency is improved using an online/offline encryption scheme.

6. Searchable Encryption

SE allows a user to encrypt and send a message to an information receiver who can reassign it to a third party for searching the encrypted message for keywords without compromising the security of the encrypted message contents. A review of the significant literature on SE in terms of applications for the last decade is provided in Table 4. In the following, we review some works on the application of SE in the IoT domain.

6.1. SE for Fog and Cloud Applications

Probably Secure SE for Cloud Storage—The work in [94] addressed searchable encryption in cloud storage systems. The work first analyzed the security of a multi-user searchable encryption scheme presented by Wu et al. in [160] and it is shown that this scheme does not satisfy the invisibility of trapdoors. More precisely, it is shown that since the test algorithm can be executed by anyone, the challenger can guess the keyword trapdoor in at most two tests. Furthermore, the authors proposed a probably secure multi-user multi-keyword searchable encryption scheme, expanding the work presented in [161], which is a file-centric multi-keyword aggregate keyword searchable encryption scheme for IIoT, but suffers from the shortcoming of a data owner losing control over data due to the encryption execution at the same time. The presented scheme solves the problem of [161] by satisfying the indiscernibility of trapdoors against adaptive chosen keywords in the random oracle model.
Cross-Lingual Multi-Keyword Search over Encrypted Data—The authors in [95] proposed a cross-lingual multi-keyword rank search (CLRSE) scheme which eliminates the language barriers and achieves semantic extension using the Open Multilingual Wordnet (OMW) [162]. The authors explored the problem of cross-lingual multi-keyword ranked search over encrypted cloud data, where the cross-lingual target query is built upon OMW. Through flexible keyword and language preference settings, as well as the automated calculation of preference scores for extended keywords for the semantic, the proposed scheme achieves intelligent and personalized sorting search and improves the accuracy of top-k search results. The proposed CLRSE scheme operates in different phases, including initialization, document outsourcing, cross-lingual query construction, trapdoor generation and top-k rank search. The security analysis of the scheme considers the confidentiality of the outsourced data, unlinkability of the query and privacy preservation as the key aspects.
Attribute-Based SE for Reliable Smart Grid—The paper [96] introduced an attribute-based online/offline searchable encryption scheme where the encryption and trapdoor generation algorithms are separated into two different phases, and the message encryption and attribute control policy are performed in the offline phase. The authors combined the online/offline encryption scheme of [163] and the searchable scheme of [164] to propose this scheme. Based on the user’s attributes, the scheme provides secure data access to authorized users while protecting unauthorized users from accessing the data. The scheme thus achieves the properties of secure searchable ciphertext privacy, keyword privacy and a secure data access control. The proposed scheme offers the benefit of reducing the computation cost utilizing the online/offline phases. The proposed scheme is shown to be secure against both chosen plaintext and chosen keyword attacks.
Fog-Based Healthcare in IoT Networks—The work in [97] proposed a fog-supported hybrid infrastructure where distributed fogs are deployed between IoT devices and cloud servers, providing temporary data storage, computation and analysis and network services. The authors designed a keyword searchable encryption scheme in the healthcare-related IoT–Fog–Cloud architecture, which ensures the security requirement that both data and keywords are protected from the cloud and the fog. The authors designed a fine-grained access control framework wherein a user should obtain their query capability authorization from a trusted authority and the fog through checking their attributes. To overcome the issue of resource-constrained IoT devices, the majority of the heavy computations of the proposed scheme are transferred to the fog and cloud, whereas only a small part is reserved for the users. The security analysis of the scheme demonstrates it to be secure under IND-CK-CCA attacks and to satisfy the trapdoor indistinguishability.
Dynamic SE with Privacy Protection—The authors in [98] proposed a scheme to increase efficiency where the cloud is used to generate and store IoT-aggregated files. Forward privacy is achieved through a sublinear search efficiency by keeping an increasing counter for each keyword at an IoT gateway. The proposed scheme achieves forward privacy through the combination of locally stored state information and lightweight cryptography, whereas the cloud server is unaware of whether a newly added file consists of certain keywords except when the keyword is queried again. The proposed approach encrypts the combined increasing counter and the keyword together, making the server unable to link the keyword with the newly added file to any keywords in the cloud without knowing the secret key. In addition, a secure pseudo-random function is used to hide the connections with the generated tuples with the consecutive counter values.
Table 4. Significant literature for SE in the last decade.
Table 4. Significant literature for SE in the last decade.
Ref.YearAuthorSignificancePublisher
 [104]2020K. Zhang et al.Lightweight SE for Industrial IoTIEEE
 [165]2018J. Ning et al.Analysis of Passive Attacks on SEIEEE
 [166]2017G.S. Poh et al.Detailed Review of SSE SchemesACM
 [13]2017R. Zhang et al.SE for Healthcare CloudsIEEE
 [102]2018L. Wu et al.SE for Cloud-Based IoTElsevier
 [101]2017M. Ma et al.Certificateless SE for Industrial IoTIEEE
 [12]2016W. Yunling et al.Survey on Main Techniques of SESpringer
 [167]2014C. Bösch et al.Survey on Provably Secure SE SchemesACM
 [168]2013E. Stefanov et al.Dynamic SE Scheme for Small Leakage and EfficiencyCryptology

6.2. SE for Secure Data Sharing

Searchable Encryption for Data Sharing—The paper [99] presented a scheme that enables authorized users to retrieve encrypted documents and verify the search results using a single aggregate key. The semi-honest-but-curious server is considered as a computationally bounded adversary, who may execute only a fraction of honest search operations. In the proposed verifiable searchable encryption with aggregate keys (VSEAK) scheme, the search keys and verification tokens are aggregated into one single key, avoiding the communication of massive key sets. The user is able to use the aggregate key to not only generate a single trapdoor as a keyword search query, but also to verify whether the server just conducts a part of computing for the search request. Thus, the data owner only needs to distribute a single aggregate key to other users to selectively share both search and verification privileges over their document sets. A majority of the user’s computations and storage are confidentially passed to the cloud server. Furthermore, an advanced scheme extending the work to multi-owner settings is also given which further reduces the users’ storage overheads.
Combining ABE and SE for Data Sharing—The authors in [100] proposed a protocol based on the combination of SSE [169] and ABE [18] such that the main advantages of both are used. While the symmetric key needed for decryption is protected via a CP-ABE scheme, a user can directly search over the encrypted data through an SSE scheme. The considered threat model assumes that hardware integrity, physical security, network infrastructure and cryptographic security are all functioning in their standard way. Multiple users can efficiently and securely share files through the proposed protocol, and it can be considered as an independent contribution to the field of hybrid encryption since it combines both SSE and ABE schemes. In the proposed design, the authors separated the revocation functionality from the actual ABE scheme by proposing to use Intel’s Software Guard Extensions (SGX) to host a revocation authority in a trusted execution environment.

6.3. SE for IoT Applications

SE for Industrial IoT—The article [101] proposed the design of a secure channel-free certificateless searchable public key encryption with a multiple keywords scheme for IIoT deployment. The system model is composed of four standard entities including a cloud server, a data owner, a data receiver and a key generation center (KGC). The security of the proposed scheme is demonstrated in the random oracle model against two types of adversaries, where one adversary is given the power to choose a random public key instead of any user’s public key, while the second adversary is allowed to learn the system master key, where the security model is based on the indistinguishability of the chosen keyword attacks under the intractability of the standard BDH problem. The utility of this scheme is also demonstrated through its performance in terms of computational efficiency and communication cost.
SE for Cloud-Based IoT—The work in [102] proposed a secure and efficient searchable encryption protocol using the trapdoor permutation function. The protocol is designed for cloud-based IoT, and compared to existing protocols, it incurs a lower computation cost at the expense of a higher storage cost. The protocol achieves inside keyword-guessing attacks (KGAs) resilience, forward privacy and file-injection attack resilience. This protocol uses neither bilinear pairing operation nor map-to-point hash operations, while the search time of the protocol is only dependent on the database update times. The system model is comprised of only three entities, namely the data sender (DS), data receiver (DR) and the cloud server (CS) where, apart from the traditional roles of DR and CS, DS is responsible for initializing the system, creating keyword indexes for files, and encrypting and uploading data. The computation and security parameters are compared to existing works based on bilinear pairing operation, the map-to-point, exponentiation, keyed hash function and scalar point multiplication.
Multi-user SE for Home IoT System—The authors in [103] proposed a multi-user searchable encrypted voice scheme for voice systems based on home IoT systems, which enables users to send their voice commands to servers and retrieve each other’s voices. The proposed scheme employs long short-term memory (LSTM) networks algorithm to convert one user’s voice into another in order to improve the performance for multi-user retrieval. For enhanced security, the authors adopted an obfuscation function to hide the feature of the voice and DH algorithm to exchange parameters between users. The voice is divided into answers and queries where the answer part is encrypted and the query part is converted into features. The proposed scheme uses AES for encryption and decryption, where the small calculation overhead and suitability for large data blocks are the advantages while the key needs to be negotiated in advance and transmitted through a secure channel. The use of LSTM improves the precision and recall rate of the search while, to prevent the restoration of voice features, the obfuscation function helps process the mel frequency cepstral coefficients’ (MFCCs) features.
Lightweight SE for Industrial IoT—The paper [104] proposed a lightweight searchable attribute-based encryption scheme that can significantly reduce the computing cost of IoT devices with the provision of multiple-keyword searching for data users. The proposed scheme is also extended to multi-authority scenarios to effectively generate and manage the public/secret keys in the distributed IoT environments. The proposed scheme is motivated by Green’s scheme [170] and Yang’s work [171], where the multi-keyword search in a distributed IoT environment was adopted. The proposed schemes offer the advantages of flexible access control, data confidentiality, lightweight decryption, accurate data retrieval and scalable key management. One of the scheme’s strengths lies in the preservation of the constant size of public parameters which do not vary with the number of attributes. Although the ciphertext of both the schemes is larger than most of the existing schemes, it does not affect the user experience since the ciphertext uploaded to the cloud does not require extra storage at IoT devices.

6.4. SE for Blockchain Privacy

SE for Permissioned Blockchains—The work in [105] built on the premise that existing approaches to search queries assume that the cloud server is “trusted-but-curious” or “honest-but-curious”, and to ensure greater levels of security, it should be considered malicious. The authors proposed an amalgamation of SE and permitted blockchains such that the client can place complete trust in the cloud server and the services it has to offer. The work presents a privacy-preserving framework that facilitates keyword search over the encrypted data stored on the blockchain network. Based on probabilistic trapdoors to resist distinguishability attacks and ensure high levels of security and privacy, the authors presented a privacy-preserving SE framework that facilitates the search over encrypted data stored on the permissioned and distributed ledger, i.e., hyperledger fabric [172], where the search over the blockchain is based on the SE scheme presented in [173]. Since the index table by default reveals the frequency of occurrence of an encrypted word within a document leading to a statistical analysis attack, the proposed algorithm masks these values to mitigate the risk of an attack and only reveals the presence/absence of an encrypted keyword in a document.
SE for Health Record Sharing—The authors in [106] proposed a blockchain-based searchable encryption scheme for EHRs, where the index for EHRs is constructed through complex logic expressions and stored in the blockchain so that a data user can utilize these expressions to search the index. This gives the data owners full control over who has access to their EHRs, and the integrity and traceability of the data index is ensured through blockchain technology. In the proposed scheme, the real EHRs are stored on a public cloud server in encrypted form and users must be authenticated by the data owner to access these records. The scheme supports the complex query that allows healthcare agents to request permission to access and interact with the medical records, where the application uses a smart contract based on Ethereum [174]. The proposed scheme only focuses on the query accuracy, while it does not consider access to the data records. However, this can be achieved through existing file sharing schemes such as those based on ABE for fine-grained access control.

6.5. SE for Neural Networks and Geo-Referenced Data

Encrypted Searchable Neural Networks—The work in [107] proposed interpretable encrypted searchable neural networks to explore probabilistic query, balanced index tree construction and an automatic weight update in an encrypted cloud environment, resulting in an intelligent SE model. The probabilistic learning was used to obtain search ranking for searchable index, and a probabilistic query is performed based on the ciphertext index, which significantly reduces the computational complexity. More precisely, apart from the initial weight index generated by data owners, all the other automatic update operations are completed in an encrypted cloud environment, resulting in a lower computation, communication and storage overhead. The authors proposed a combination of adversarial learning [175] and automatic weight update in response to a user’s query of the latest dataset. Furthermore, to enable automatic weight update, a combination of backpropagation neural network [176] and Hopfield neural network [177] was proposed. Based on the neural network, the scheme sorts the network and employs probabilistic learning to obtain the query ranking for an encrypted searchable index.
SE for Geo-Referenced Data—The authors in [108] presented different techniques to achieve range queries in SE, enhancing performance and reducing information leakage. The focus is on the case of one and two-dimensional range queries to an encrypted geo-referenced database in a client–server architecture. The authors provide techniques for SE to reduce the communication and computational costs of range queries based on over-covers, and to reduce information leakage under a symmetric key cryptographic scheme. The problem of searching encrypted data in the context of project CLARUS [178] is considered, which originally provides a framework for user-centered privacy and security in the cloud. For all the considered SSE schemes, the OXT scheme by Cash et al. [179] was chosen due to its suitability for static databases and highly efficient Boolean search causing moderate and quantifiable leakage to the server. In the considered data model, the client delegates an encrypted version of its dataset to the server, and afterwards, it retrieves a subset of the outsourced dataset through queries where query locations are considered to be rectangles.

7. Predicate Encryption

PE is a novel cryptographic primitive that provides accurate fine-grained access to encrypted data. In contrast to traditional public-key cryptographic systems, it has been widely adopted in point-to-point communication systems. A cryptographic system such as PE discerns the justification of information only being available to the users with access rights, providing more fine-grained control over the ciphertext. A review of the significant literature on PE in terms of applications over the last decade is provided in Table 5. In the following, we review some works on the application of PE in the IoT domain.

7.1. PE for Fog and Cloud Applications

Privacy-Preserving Search in Cloud Storage—The article [42] proposed a variant of symmetric predicate encryption which provides controllable privacy-preserving search functionalities including revocable delegated search and un-decryptable delegated search. These functionalities enable the owner of cloud storage to easily control the lifetimes and search privileges of cloud data. The proposed scheme is based on the work of [41], and introduces two new features including revocable delegated search and an un-decryptable delegated search. Here, the revocable delegated search makes it possible for the secret key owner to control the lifetime of the delegation, while due to the un-decryptable delegated search, a delegated person cannot decrypt the returned matched ciphertexts despite having the delegated search privilege. The considered system has three main roles, namely the secret key owner who wants to store sensitive data in the cloud and controls the encryption; a cloud storage service provider that stores data in the form of ciphertexts; and a delegated person who can obtain and decrypt the returned matched ciphertexts. The security of the proposed scheme is proven in detail through semantic security, attribute hiding and key confidentiality.
PE with Equality Testing in Cloud Computing—The work in [109] presented the concept of attribute-hiding PE with an equality test by incorporating the notions of public-key encryption with the equality test and PE. Building on the idea, the authors presented an AH-PE-ET scheme that features constant pairing computations and minimal costs for decryption and testing. In the proposed scheme, a data receiver can calculate a trapdoor using their private key and deliver this trapdoor to an untrusted cloud server, who compares the ciphertexts from one receiver to the other receiver’s ciphertexts. The information about the provided trapdoor as well as the attributes associated with the ciphertexts are not disclosed to the cloud server during the comparison. The proposed scheme enables the cloud server to conduct an equivalence test on ciphertexts under various access policies. The scheme supports attribute-hiding as well as a more expressive access control. The authors also provide a rigorous comparison with existing ABE-ET schemes, in particular with [180,181], in terms of storage and communication cost, computation cost, functionality, security level and hardness assumption.
PE with Fine-Grained Search in Cloud Storage—The authors in [110] proposed an efficient predicate encryption scheme and showed how to use it to implement a public key encryption with fine-grained searchable (PEFKS) capability mechanism. Furthermore, by combining PEFKS and PE into an integral encryption system, the authors are able to propose a privacy-preserving framework supporting an efficient predicate encryption with fine-grained searchable capability. The proposed scheme is computationally efficient since, for each attribute in the ciphertext and user’s key, there is only one group element and for each attribute in the decryption algorithm, only one pairing operation is required. The proposed PEFKS can not only search for the presence of multiple keywords in the ciphertext, but it can also evaluate the logical relations of these keywords. The efficiency of the proposed scheme is compared with the seminal works of [38,182], and shows that the scheme achieves a higher efficiency.
Enabled/Disabled PE in Clouds—The article [111] proposed an enabled/disabled predicate encryption scheme that provides time-release services and data self-destruction. Given these characteristics, the receiver can set the readable and unreadable time of the files to be sent to the receiver, where the receiver can only read the file after the readable time. The structure of the file is destroyed after the unreadable time and the file then becomes unreadable. The time-release and data self-destruction properties are integrated with a predicate encryption that is based on the PE with the inner-product scheme of [183]. The proposed scheme can prevent the attacker from obtaining the ciphertext and performing crypt-analysis using any form of attacks on the ciphertext after the disabled time. Based on the proposed scheme, an extended scheme is also presented which, along with time-release services and data self-destruction, provides long message encryption and an undecryptable search. In the extended scheme, the length of the encrypted messages does not depend on the order of the group and the cloud server can only obtain the matched ciphertexts after the search.
Table 5. Significant IoT-related literature for PE in the last decade.
Table 5. Significant IoT-related literature for PE in the last decade.
Ref.YearAuthorSignificancePublisher
 [184]2021Y.F. Tseng et al.Efficient PE for IoTIEEE
 [109]2018J. Sun et al.Attribute Hiding PE for Cloud ComputingIEEE
 [116]2018S. Xu et al.PE-Based Anomaly Detection in e-HealthIEEE
 [114]2017C-I Fan et al.PE for OSNsIEEE
 [110]2016X.A. Wang et al.PE-Based Search for Cloud StorageElsevier
 [111]2016S-Y Huang et al.PE for CloudsElsevier
 [113]2016W. Liu et al.Public-Index PE for Mobile AccessSpringer
 [42]2013C-I Fan et al.PE-Based Controlled Search in Cloud StorageElsevier
Data Preprocessing for Fog Privacy—The authors in [112] proposed a privacy-preserving data preprocessing scheme for fog computing in 5G network security. Specifically, the scheme is presented from the perspective of the quality of protection (QoP), aiming to preserve the security service option learned from attributes and to enable fog nodes to supply different levels of privacy protection services with different security demands from users. In the presented scheme, the end users have the options to contribute a list of attributes for their desired level of security protection. The proposed scheme intends to preserve the privacy of user data, by enabling fog nodes to supply different levels of privacy protection services with different security demands from users. The fog nodes are introduced to perform a privacy-preserving data preprocessing scheme for QoP. End users will conduct predicate encryption over these attributes, and fog nodes will provide the encrypted data with an additional and enhanced protection service based on the output run by the predicate utility function. The double-protected data will eventually be forwarded to and stored in a remote cloud.

7.2. PE for Social and Mobile Networks

Online/Offline PE for Mobile Access Control—The work of [113] proposed a general online/offline framework to address the expensive algebraic operations in public index predicate encryption (PIPE). The authors first proposed a generic transformation from a large universe PIPE which is secure against a chosen plaintext attack to online/offline PIPE under the same security model. To address the issue of generating a ciphertext without any knowledge of the associated ciphertext attributes in the offline phase, the authors presented a solution by identifying an attribute-malleability property in many LU-PIPE schemes. It is shown that with public-malleability, the security of the resulting OO-PIPE can be tightly reduced to the CPA security of the underlying LU-PIPE. Furthermore, the authors designed a generic transformation for CPA-secure LU-PIPE to OO-PIPE secure against an adaptive chosen ciphertext attack under the assumption that the underlying LU-PIPE has the specific properties of attribute-malleability and public-verifiability. To circumvent the issue of the online/offline mechanism implying forgery, the authors employed a universally collision-resistant chameleon hash [185]. The encryptor can replace the randomly encrypted ciphertext attribute in the offline phase with the target ciphertext attribute in the online phase, while an attacker cannot make such malleation.
Multireceiver PE for Social Networks—The article [114] proposed a multireceiver predicate encryption (MRPE) scheme that is tailored for the online social networks (OSN) platform. In this scheme, the sender shares encrypted messages with a set of authorized receivers who can decrypt them, whereas the OSN provider can retrieve commercial keywords from the encrypted messages for advertisers, which improves the accuracy of advertisement without revealing the contents of the messages. The public parameters are defined by a third party, and the encryption process can be performed with a set of receivers. Since the public parameters are independent of the receivers, the length of ciphertexts can be compressed. Furthermore, the scheme allows each user to choose a part of their own secret value, while sharing the same public parameters. Here, the OSN provider is capable of finding corresponding keywords and producing customized advertisements.

7.3. PE for e-Health Networks and Authentication

Application of PE to Anonymous Authentication—The authors in [115] proposed an extension of predicate encryption named ‘delegate predicate encryption’ (DPE), where the user generates an encryption capability of a set of attributes, and then sends this capability to an encryption proxy. Using this capability, the proxy can encrypt an arbitrary message using these attributes without knowing anything about them. The proposed construction also satisfies the property named delegation transparency to the decryptor, which states that the receiver cannot tell whether a ciphertext is directly encrypted or via an encryption proxy. Thus, the anonymity of the provider and the authentication rules are well protected. The security requirement for DPE is defined by measuring the adversary’s advantage in winning a game, which is based on an extension of the game presented in [38] by adding the delegate encryption key query and a delegate encryption key corresponding to ciphertext in the challenge phase.
Anomaly Detection in e-Health Networks—The paper [116] proposed a PE scheme for anomaly detection in networks applied to e-Health applications. Apart from the trusted authority, the system model consists of three distinct entities, namely a sender (provider); a receiver (examiner) which examines the critical component of a packet by validating the attribute vector with the predicate vector; and the malicious attacker, who forges the sensitive attributes of the created packets and deliberately falsifies sender’s packets with the contaminated elements. The contributions of the proposed scheme are measured in terms of confidentiality, privacy, efficiency and anomaly detection. The major contribution of this work comes from the use of the session key as a message in the encryption operation of PE system, which achieves information privacy and efficient cryptographic computation since, as compared to symmetric key encryption, here the session key is not pre-shared between the communicating parties. A case study in the form of evaluating an e-Health communication network is provided, where the performance of the proposed scheme is presented in terms of computational and communication overhead as well as anomaly detection.

8. Functional Encryption

FE is a public-key encryption scheme with different decryption keys allowing a user to learn specific functions of the encrypted data. The control that FE offers over which functions are allowed to be computed on the data by which user immensely benefits the data owner in multiple cases. A review of the significant literature on FE in terms of applications for the last decade is provided in Table 6. In the following, we review some works on the application of FE in the IoT domain.

8.1. FE for Data Sharing and Classification

Proxy Re-Cryptography for Cloud Data Sharing—Based on the work on proxy re-encryption called deterministic finite Automata-based functional proxy re-encryption (DFA-based FPRE) [186], the authors in [117] presented an outsourcing decryption scheme to increase the flexibility of users by delegating their decryption rights to a semi-trusted proxy. Based on the proposed construction, the decryption phase utilizes only one exponential operation instead of 12 pairing operations of the original work of [186], resulting in improved efficiency. This is due to the fact that the computation of bilinear pairings was considered a prohibitively expensive operation [187]. Only the user who has a DFA associated with their secret key can accept the key associated with the ciphertext and can efficiently access the encrypted data through the help of a semi-trusted proxy.
Data Ordering using FE—The work in [118] proposed an improvised FE scheme for encrypted data ordering that takes as input multiple ciphertexts and orders them at the server site without compromising the data privacy. To achieve this, the authors formalized an order function using multi-input FE with obfuscation. Although data ordering can be achieved through order-preserving encryption (OPE) [188] and probabilistic predicate encryption [38], these approaches suffer from data privacy and efficiency issues and are not suitable for ordering operations at the server site. The proposed approach, MIFEO, runs the order function on multiple ciphertexts, and arranges them in an ordered set of ciphertexts. To use MIFOE in practical scenarios with existing cryptographic mechanisms, all incoming ciphertexts must be extended by associating an additional layer of encryption.
Private Data Classification using FE—The authors in [119] used an instantiation of IPFE to perform the classification of encrypted data. The proposed method utilizes the fully secure FE for inner product functionality under the DDH assumption as given in [189]. Based on this, a multi-class prediction algorithm with encrypted input data is described. More specifically, the data item over which the prediction must be made is encrypted. From the encrypted data, integer inner products are extracted and are used afterwards to produce the class of the input data item. In the context of ML algorithms, the inner product can be viewed as a linear binary classifier. The learning process is kept secret and only the linear classifier’s coefficients are shared with the authority. Apart from the servers and users who have information to be kept secret but want to release classification results, a third party called the authority is introduced which handles the generation of FE keys and overlooks the process. The studied method ensures that the original image cannot be found from the inner product values.

8.2. FE for Machine Learning Applications

Privacy-enhanced ML with FE—The work in [120] introduced open source cryptographic libraries for FE. It presents, in detail, how FE can be used to build efficient privacy-preserving machine learning models, and provides an implementation of three prediction services that can be applied on the encrypted data. The paper addressed the lack of implementations of practical FE schemes that enable computation over encrypted data. Two full-fledged FE cryptographic libraries, named GoFE and CiFEr, are presented, which allow the library user to choose the underlying primitives when instantiating an FE scheme. Here, GoFE is implemented in GO, while CiFEr is implemented in C and aims at a lower level, possibly IoT-related applications. The three prediction services which are implemented using the developed libraries consist of an online privacy-friendly predictor of cardiovascular diseases, anonymous traffic heatmap service and image classification on encrypted data.
Table 6. Significant IoT-related literature for FE in the last decade.
Table 6. Significant IoT-related literature for FE in the last decade.
Ref.YearAuthorSignificancePublisher
 [190]2015P. Ananth et al.FE for Turing MachinesSpringer
 [191]2015K. WronaMilitary Perspective on Securing the IoTIEEE
 [123]2018O. Stan et al.Tax Calculations Using FEIEEE
 [124]2020Y-B Son et al.Energy Trading using Blockchain and FEMDPI
 [125]2019J-H Im et al.Electricity Billing Using FEMDPI
 [126]2020H. Cui et al.Outsourcing FE Using BlockchainIEEE
 [129]2015D. Sharma et al.FE in IoT e-HealthSpringer
 [117]2016H. Abdalla et al.FE for Public Cloud Data SharingIEEE
 [118]2018D. Sharma et al.Data Ordering with FEIEEE
 [119]2017D. Ligier et al.Private Data Classification Using FESpringer
 [120]2019T. Marc et al.Private ML Using FESpringer
 [121]2019R. Xu et al.Privacy-Preserving Federated Learning using FEACM
 [122]2019R. Xu et al.Training NNs with Encrypted dataIEEE
Privacy-Preserving Federated Learning—In general, approaches that offer privacy guarantees incur a large number of communication rounds, substantially increasing the training time for FL systems. The authors in [121] proposed an approach for privacy-preserving FL employing a secure multi-party computation protocol based on FE, where a differential privacy mechanism is employed that defines a protocol from a multiparty FE scheme to mitigate the risk that curious aggregators and colluding participants will infer private information. The authors adopted the MIFE scheme of [192] with some modifications due to its computational efficiency. The approach also demonstrates a solution to the dynamic participant group issue, showing robustness to participant dropout or addition. To benchmark the performance, a convolutional neural network (CNN) was trained with the same topology as in [193] to classify the MNIST dataset of handwritten digits [194]. The evaluation results show that it can reduce the training time by 68% and the data transfer volume by 93% on average while providing a similar model performance and privacy guarantees as some existing approaches.
Training Neural Networks over Encrypted Data—In the context of ML networks, it is beneficial to have a well-designed privacy preserving framework that does not require cloud and data owners to reveal their training models or information on the sensitive data. The work of [122] addressed this scenario where neural networks are trained over encrypted data without the overhead involved with interactive communication protocols, while supporting predictive analytics in a privacy-preserving way. The authors also constructed an FE scheme for basic arithmetic computations, termed FEBO, to support the requirements of the proposed approach. The intermediate data are not ciphertext in the hidden layers of the model, which intuitively indicates that the proposed approach can be expected to be more efficient than HE-based schemes. It should be noted that for training scenarios in ML, the HE-based approach does not allow the server to learn the prediction result, which the FE-based approach does.

8.3. FE for Smart Cities

Tax Calculations in Smart Cities—The work in [123] investigated how Inner-Product FE (IPFE) [189] can enable the design of a tax calculation system with built-in privacy. Based on FE, the authors proposed a new private-by-design taxation service for smart factories. They also proposed the application of this general approach for the use case of carbon tax where instantiations and experimental results under DDH and decision composite residuosity (DCR) assumptions are presented. The authors presented a carbon tax model for industries, taking into account the different fuel sources for the electricity they use, while keeping the amount of emissions that are produced private. The system architecture consists of the smart factory whose tax is calculated, a tax service entity in charge of the service proposing the taxation, and a qualified authority who not only is responsible for setting up the whole taxation strategy but also serves as the encryption key manager. The authors provided an IPFE construct based on [189] showing that for the subject computation of carbon tax, the inner-product primitive is sufficient since the assumed model is linear.
Energy Trading in Smart Grids using FE—The authors in [124] proposed a peer-to-peer energy trading system on blockchains where the bids are encrypted and peer matching is performed on the encrypted bids by an FE-based smart contract. The system guarantees that the information encoded in the encrypted bids is protected but the peer matching transactions are performed by the nodes in a publicly verifiable manner through smart contracts. The proposed P2P energy trading system is based on a private Ethereum blockchain. The authors focused on achieving two goals, namely the transparency of the peer matching process and the confidentiality of the matching information. The system used the practical function hiding IPFE proposed in [195]. The prosumers remain anonymous to each other whereas the utility company knows their identity for accounting and billing purposes. Furthermore, the matching peers cannot repudiate their bids after the matching is complete. The feasibility of the proposed scheme is verified by implementing a prototype involving smart meters.
Electricity Billing Using FE—Detailed power consumption data raise serious privacy concerns since personal data can be inferred from the energy usage profiles measured by smart metres. The article [125] proposes a privacy-preserving electricity billing method that does not sacrifice data quality for privacy, based on a novel use of FE. The proposed scheme is based on the scheme of [195], which develops on the function-hiding inner product encryption similar to the work in [196], and allows a smart metre to send the provider all of the measured data with full granularity and without privacy leaks. The smart metre encrypts the measured consumption and sends them to the electricity provider, who possesses a restricted decryption key, using which it can obtain the total consumption. The proposed system does not require any special purpose hardware and can be realized through a mere software update of the smart metre. Furthermore, it does not render the previous methods obsolete; rather, it can be combined for advanced services.
Decryption Outsourcing using Blockchains—Since most FE schemes are built from bilinear pairings for which the computation is very expensive, a major issue in most FE schemes is efficiency. The paper [126] aims to design an FE with payable outsourced decryption (FEPOD). Leveraging the transactions involving cryptocurrencies supported by the blockchain technology, the payments in the FEPOD scheme are achieved through a blockchain-based cryptocurrency. This enables the data owner to pay a third party who correctly completes the outsourced decryption. However, there is always the issue of fairness between the user and the proxy, i.e., the user may refuse to pay even if they obtain a valid result. The proposed work is different from the works presented in [197] and [198] where [197] presents a fair exchange protocol to enable the exchange of a cryptocurrency payment for a receipt, whereas [198] addresses the need to integrate the FEOD scheme into the Bitcoin platform. The authors proposed a notion of FEPOD which allows anybody to check the correctness of the answer for the outsourcing computation task provided by an untrusted third party such that the payment can be processed through a blockchain-based cryptocurrency.
FE for UAV-Integrated Heterogeneous Networks—The work in [127] proposed the use of FE in UAV-enabled HetNets to secure data against intrusion attacks. The process of implementing FE is proposed in two phases: first between UE and macro base station (MBS) and second between MBS and UE through UAVs. The work mainly focuses on the activation of an intrusion monitoring process and attacker ejection. Furthermore, a Bayesian game model was proposed to accurately detect the attacks with low overhead. Following the standard construction of FE, the work mainly proposes to secure the communication between the three parties, although no concrete construction is provided, and the security validation is proposed to be conducted through the AVISPA tool [199].

8.4. FE for Biometric Authentication, Healthcare and Cloud Applications

Language Search over Encrypted Cloud Data—The authors in [128] proposed the design of a novel privacy-preserving FE-based search mechanism over encrypted cloud data. The proposed new primitive supports an extreme expressive search mode, which is the regular language search. To facilitate this, the authors defined a new notion called searchable deterministic finite automata-based FE, which is a generalization of PEKS [39,200]. In the proposed construction, any system user can describe data to be shared with regular language in an encrypted form, where the language description can be arbitrary length. A valid data receiver can generate and deliver a search token represented as a DFA to a cloud server, such that the cloud server can locate the corresponding ciphertexts and return them to the data receiver. In the search phase, the server does not know anything about the search contents and the underlying data.
FE for e-Health IoT Systems—To perform central processing, IoT systems require an automation tool or service at the central site which possesses collected data without compromising data security and privacy. The paper [129] presents a framework for the efficient utilization of centralized data while protecting data confidentiality and privacy in IoT infrastructure. The authors proposed a framework for the network layer of the IoT infrastructure to secure centralized data as well as utilize them for various analytical reasoning. Through the use of CP-ABE, privacy preservation with the access control of centralized data is proposed while with FE, various analytical functions can be executed on the encrypted data. A key feature of the proposed scheme is that since there is no dependency of any ciphertext on any function, the insertion of new ciphertexts as well as new functions is possible. On the other hand, a key limitation comes from the use of double encryption, where to create the FE ciphertext, already encrypted data (CP-ABE ciphertext) are used as the payload.
User-Centric Biometric Authentication—The work in [130] proposed a user-centric biometric authentication scheme that enables end users to encrypt their own templates with a newly proposed light-weight encryption scheme. During the authentication process, all the templates remain encrypted and the server never sees them in their plain form. However, the server is able to determine whether the distance of two encrypted templates is within a pre-defined threshold. Under the scenario of both passive and active attacks, no critical information of the templates is revealed. The proposed scheme follows a compute-then-compare approach where the newly proposed primitive, threshold predicate encryption (TPE), can encrypt two vectors in such a way that the inner product of those vectors can be evaluated and compared to a pre-defined threshold. TPE uses similar techniques as in [201], however, the computational models as well as the security requirements are quite different. The proposed TPE can be used as a building block for various distance metrics involving encrypted data.

8.5. FE for Rights Managements and Searchable Encryption

Secure Digital Rights Management—The work in [131] proposed a novel Digital Rights Management (DRM) scheme based on a DFA-based FPRE scheme [186] which has been proven to be secure against CCA in the standard model. In the proposed scheme, a user with secret keys associated with their DFA accepts the ciphertext-associated string and can quite efficiently access the encrypted content with the help of the cloud service provider. The authors leveraged the DFA-based FPRE scheme to realize fine-grained access control over encrypted contents among a set of users, protecting the contents stored in a semi-trusted cloud environment and allowing flexibility in specifying the access rights of individual users. Through the use of computation outsourcing, the issue of high computation at the user side is also addressed. The work follows the scheme of [202] which allows the delegated key server to immediately revoke the attributes and malicious users.
Searchable Encryption using Multi-Input FE—The authors in [132] proposed a secure and efficient searchable encryption scheme supporting multi-keyword search in a single-owner multi-user settings. The scheme is mainly applicable in cases where the number of keywords is limited but the number of files is large, such as sharing a comprehensive knowledge base in a certain field. In the proposed scheme, the cloud server is able to complete search processes with search tokens consisting of only two items, resulting in a significantly decreased communication and transportation overhead. The scheme achieves an efficient multi-keyword search through the use of an inverted index structure and super-incremental sequence. Furthermore, the scheme avoids per-query interaction between the data owner and data user, hence the data owner does not need to stay online for data users to search in their archives.

9. Open Challenges and Research Trends

Beyond the traditional secure computing methodologies, the developing domain of functional encryption has proven to be a promising avenue. Although crucial, contributions to cryptography design and implementation still need to be taken into account for further research projects. The main issues and interesting research paths for FE-based secure computing, in the majority of the IoT realm, are briefly discussed in this section.
Inherent Factors affecting IoT Security—security threats are a common issue that can seriously harm network infrastructure. IoT systems are vulnerable to security threats for a variety of reasons, including a the low processing power of smart devices, wireless connectivity, system openness and the physical accessibility of sensors, actuators and objects [203,204]. As a result, the three pieces of IoT hardware that may be exposed to frequent attacks are RFIDs, WSNs and clouds. Here, RFIDs are found to be the most susceptible technology since they are utilized in identifying and monitoring both people and items [205]. Furthermore, although IoT devices are manufactured with ease of use and connectivity in mind, they become vulnerable over time as attackers find new security issues to exploit. Regular patches and updates are needed to prevent these devices being exploited over time.
Need for Secure Programming Protocol—The majority of IoT devices are weak and susceptible to different types of malware due to their ease of accessibility and the limited computational resources at their disposal. Owing to a lack of transport encryption protocols, unsecured web interfaces, insufficient software security and authorization, this issue keeps on affecting and compromising the security of IoT nodes [206]. Thus, a device authentication and digital certificates approach can be adopted as a solution. More recently, the National Institute of Standards and Technology (NIST) released its recommendations [207] for device manufacturers to establish a security baseline. Furthermore, the traditional network reprogramming method has an authentication issue since it merely uses a data dissemination protocol to send codes in the network without running any authentication protocol [208], compromising network security. This requires the nodes to be aware of the validity of every code in order to avoid any malicious installation and to establish a secure programming protocol. A rogue node pretending to be a legitimate node in order to perform malicious activities poses another threat related to system and identity management.
Threat Identification, Remediation and Multi-Key Attacks—The development of lightweight cryptography for devices with limited resources is largely dictated by the key size and blocklength. The cipher text size increases with an increase in the key size, asking for more processing resources. One of the main problems concerning IoT security is a multi-key attack, which allows attackers to decrypt data using more than one key. In the event that the attackers obtain the key, the secrecy property may be jeopardized. The IoT system must identify and deploy countermeasures in order to address a security attack, and to continue functioning effectively [209]. In particular, after the system has been deployed, it must also be able to respond to new, unforeseen threats. These operations must be carried out lightly due to the constrained resources of IoT devices, and should utilize real-time calculations in order to contribute to a dependable and responsive system. For this objective to be successfully achieved, there is a need for procedures that teach developers to incorporate firewalls and intrusion prevention systems.
Tighter Security Guarantees for FE—Any secure computing protocols must address the crucial challenges of security and privacy assurances. The security of the underlying FE schemes determines how safe an FE-based secure computation can be performed. Existing FE methods with workable formulations often defend against the decisional Diffie–Hellman (DDH) assumption or selective indistinguishability under chosen-plaintext attack (IND-CPA). Even if such FE architectures meet security requirements in the majority of situations, they could not satisfy application circumstances, including those involving military applications, where strict security criteria/guarantees need to be met.
Third-Party Infrastructures for FE Schemes—Majority of FE schemes and related cryptographic primitives including ABE or PE rely on a trusted third-party authority (TPA) to supply a key service, with the exception of decentralized FE schemes. To enable the TPA-related FE-based secure computation protocols in the Internet environment, there are not a lot of generally accepted TPA infrastructures, apart from the commonly used certificate authority (CA) infrastructure [210]. The deployment of FE-based privacy-preserving applications in the actual Internet environment can be made easier, and the adoption of privacy-preserving applications can be hastened with the help of a transparent and generally trusted TPA infrastructure [211]. The implementation of such FE-based mechanisms will be more reliable with such an infrastructure for accountability and transparency. Although blockchains are perceived to eliminate the need for a TPA to enforce exclusion rights, and provide a system of universal access to knowledge and discoverability, recent works have started to look at the inclusion of TPAs. For example, the work of [212] proposed a framework that provides the transparency and trustworthiness of TPA and third-party facilities using blockchain techniques for emerging crypto-based privacy-preserving applications.
Protection in Post-Quantum Era—Recent advances in quantum computers are projected to impose severe threats to the security of widely used public-key cryptosystems and the communications that make use of it. It is therefore necessary to explore new post-quantum cryptographic algorithms and investigate architectures against strong attackers, especially those employing quantum computing [213]. Recent research works have investigated the application of potential post-quantum key encapsulation mechanisms and the digital signature algorithms identified in current NIST proposals [214]. There is always a risk of sensitive information being leaked as the function result in FE processing is communicated to the presumably sincere but inquisitive coordinator [121]. Therefore, it is necessary to investigate more robust security and privacy guarantees for safe computing protocols based on FE, including those for the post-quantum period.
In future works, we look to explore and utilize additional FE schemes, particularly multi-client and multi-input schemes that enable a broad range of applications such as querying encrypted databases, computing over encrypted data streams, and multi-client computation delegation. Furthermore, we intended to build and test function-hiding methods that will allow for privacy-preserving requests to prediction services.

10. Conclusions

In this survey, we looked at a variety of application areas where FE and various underlying cryptographic primitives have been used to enhance the security and integrity of user data including their identity and access rights, among others. We first presented a brief introduction to some of these primitives, including ABE, IBE, SE, PE and FE itself. After the overview of some of these potential applications, particularly those based on IoT sensors, we surveyed the recent literature utilizing these different cryptosystems in the aforementioned application areas. Although a lot of these schemes have been developed to address the broader areas of IoT and cloud computing, research in areas such as ML and biometric identification using state-of-the-art sensors is also being looked into by researchers. We aimed to provide the reader with a recent view of the developments in this growing area of research from the point of view of applications, such that it can inspire further interest. It should be noted that all the aforementioned primitives are provably secure and provide unquestionable security, which generally causes an efficiency barrier for various applications. For example, in a typical ABE implementation, the size of ciphertext is proportional to the number of attributes associated with the access policy, and the decryption time is proportional to the number of attributes used during decryption. Similarly, most current ABKS schemes incur large computation costs in the encryption and keyword search operations. In particular, when implementing an ABKS system inherited from ABE technology, the size of the ciphertext is proportional (at least linearly) to the number of attributes associated with the access policy. Future work should consider this important aspect in terms of trade-off between the security and efficiency for different cryptographic primitives, under various applications, and explore how the primitives might need to be modified to suit the application.

Author Contributions

Conceptualization, K.S. and T.Z.; methodology, K.S.; investigation, K.S. and E.-u.-H.Q.; resources, T.Z.; writing—original draft preparation, K.S.; writing—review and editing, K.S., T.Z. and E.-u.-H.Q.; supervision, T.Z.; project administration, K.S.; funding acquisition, T.Z. and E.-u.-H.Q. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by Security Research Center at Naif Arab University for Security Sciences (Project No. SRC-PR2-01).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors would like to express their profound gratitude to the Vice Presidency for Scientific Research at Naif Arab University for Security Sciences for their kind encouragement of this work.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

List of abbreviations used in this work:
Acronym DescriptionAcronymDescription
AAAttribute AuthorityKGCKey Generation Center
AABEAttribute-Based EncryptionKP-ABEKey-Policy ABE
ABKSAttribute-Based Encryption with Keyword SearchLSTMLong Short-Term Memory
ABSAttribute-Based SignatureMACMessage Authentication Code
AESAdvanced Encryption StandardMAPMalware Analytic Provider
ASPEAsymmetric PEMANETsMobile Ad Hoc Networks
CACertificate AuthorityMBSMacro Base Station
CAACentral Attribute AuthorityCCAChosen Ciphertext Attack
MFCCMel Frequency Cepstral CoefficientsMHSNMobile Healthcare Social Network
CCA2Adaptive CCAMiTMMan in The Middle
CNNConvolutional Neural NetworkMLMachine Learning
CP-ABECiphertext-Policy ABEMQTTMessage Queue Telemetry Transport
CPAChosen Plaintext AttackMRPEMultireceiver PE
CSPCloud Service ProviderOPEOrder-Preserving Encryption
CSSCloud Storage ServiceOSNsOnline Social Networks
D2DDevice to DevicePEPredicate Encryption
DABEDecentralized ABEPIPEPublic Index PE
DBDHDecisional Bilinear Diffie–HellmanPEKSPublic Key Encryption with Keyword Search
DBEDistance-Based EncryptionPKGPublic Key Generator
DOData OwnerNTTNumber Theoretic Transform
DUData UserRLWERing Learning with Errors
DPEDelegate PEPKIPublic Key Infrastructure
DRMDigital Rights ManagementPoVProof of Vote
ECCElliptic Curve CryptographyPRESProxy Re-Encryption with Keyword Search
EHRsElectronic Health RecordsQoPQuality of Protection
FPGAField Programmable Gate ArrayKGAsKeyword Guessing Attacks
GIDGlobal IdentityQoSQuality of Service
FEFunctional EncryptionSDESearchable Data Encryption
FHEFully Homomorphic EncryptionSDNSoftware Defined Networking
FVMFunctional Virtual MachineSESearchable Encryption
HABEHierarchical ABESSESymmetric SE
HEHomomorphic EncryptionSPESymmetric PE
IBBEIdentity-Based Broadcast EncryptionSMCSecure Multi-Party Computation
IBCIdentity-Based CryptographyTMNTactical Mobile Network
IBEIdentity-Based EncryptionTPEThreshold PE
IBSCIdentity-Based SigncryptionTTPTrusted Third Party
ICNInformation-Centric NetworkingUAVUnmanned Aerial Vehicle
IoTInternet of ThingsIPFEInner Product FE
UMCMUser Management and Container ManagementWSANWireless Sensor and Actuator Network
SOKSakai, Ohgishi and KasaharaROMRead-Only Memory
MQTTMessage Queue Telemetry TransportMBDHEModified Bilinear Diffie- Hellman Exponent

References

  1. Atzori, L.; Iera, A.; Morabito, G. The internet of things: A survey. Comput. Netw. 2010, 54, 2787–2805. [Google Scholar] [CrossRef]
  2. Gaubatz, G.; Kaps, J.P.; Sunar, B. Public key cryptography in sensor networks—Revisited. In European Workshop on Security in Ad-Hoc and Sensor Networks; Springer: Berlin/Heidelberg, Germany, 2004; pp. 2–18. [Google Scholar]
  3. Galbraith, S.D. Mathematics of Public Key Cryptography; Cambridge University Press: Cambridge, UK, 2012. [Google Scholar]
  4. Boneh, D.; Sahai, A.; Waters, B. Functional encryption: Definitions and challenges. In Theory of Cryptography, Proceedings of the 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, 28–30 March 2011; Springer: Berlin/Heidelberg, Germany, 2011; pp. 253–273. [Google Scholar]
  5. Abdalla, M.; Catalano, D.; Gay, R.; Ursu, B. Inner-product functional encryption with fine-grained access control. In Advances in Cryptology—ASIACRYPT 2020, Proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, Korea, 7–11 December 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 467–497. [Google Scholar]
  6. Lee, C.C.; Chung, P.S.; Hwang, M.S. A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments. IJ Netw. Secur. 2013, 15, 231–240. [Google Scholar]
  7. Moffat, S.; Hammoudeh, M.; Hegarty, R. A survey on ciphertext-policy attribute-based encryption (CP-ABE) approaches to data security on mobile devices and its application to IoT. In Proceedings of the International Conference on Future Networks and Distributed Systems, Cambridge, UK, 19–20 July 2017. [Google Scholar]
  8. Balamurugan, B.; Krishna, P.V. Extensive survey on usage of attribute based encryption in cloud. J. Emerg. Technol. Web Intell. 2014, 6, 263–272. [Google Scholar]
  9. Zhao, S.; Aggarwal, A.; Frost, R.; Bai, X. A survey of applications of identity-based cryptography in mobile ad hoc networks. IEEE Commun. Surv. Tutor. 2011, 14, 380–400. [Google Scholar] [CrossRef] [Green Version]
  10. Phaneendra, H. Identity-based cryptography and comparison with traditional public key encryption: A survey. Int. J. Comput. Sci. Inf. Technol. 2014, 5, 5521–5525. [Google Scholar]
  11. Li, F.; Khan, M.K. A survey of identity-based signcryption. IETE Tech. Rev. 2011, 28, 265–272. [Google Scholar] [CrossRef]
  12. Wang, Y.; Wang, J.; Chen, X. Secure searchable encryption: A survey. J. Commun. Inf. Netw. 2016, 1, 52–65. [Google Scholar] [CrossRef] [Green Version]
  13. Zhang, R.; Xue, R.; Liu, L. Searchable encryption for healthcare clouds: A survey. IEEE Trans. Serv. Comput. 2017, 11, 978–996. [Google Scholar] [CrossRef]
  14. Handa, R.; Krishna, C.R.; Aggarwal, N. Searchable encryption: A survey on privacy-preserving search schemes on encrypted outsourced data. Concurr. Comput. Pract. Exp. 2019, 31, e5201. [Google Scholar] [CrossRef]
  15. Mascia, C.; Sala, M.; Villa, I. A survey on Functional Encryption. arXiv 2021, arXiv:2106.06306. [Google Scholar] [CrossRef]
  16. Moher, D.; Liberati, A.; Tetzlaff, J.; Altman, D.G.; Group, P. Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement. Ann. Intern. Med. 2009, 151, 264–269. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  17. Sahai, A.; Waters, B. Fuzzy identity-based encryption. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 22–26 May 2005; Springer: Berlin/Heidelberg, Germany, 2005; pp. 457–473. [Google Scholar]
  18. Bethencourt, J.; Sahai, A.; Waters, B. Ciphertext-policy attribute-based encryption. In Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP’07), Oakland, CA, USA, 22–23 May 2007; IEEE: Piscataway, NJ, USA, 2007; pp. 321–334. [Google Scholar]
  19. Cheung, L.; Newport, C. Provably secure ciphertext policy ABE. In Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 31 October–2 November 2007; pp. 456–465. [Google Scholar]
  20. Goyal, V.; Jain, A.; Pandey, O.; Sahai, A. Bounded ciphertext policy attribute based encryption. In Proceedings of the International Colloquium on Automata, Languages and Programming, Reykjyavik, Iceland, 7–11 July 2008; Springer: Berlin/Heidelberg, Germany, 2008; pp. 579–591. [Google Scholar]
  21. Liang, X.; Cao, Z.; Lin, H.; Xing, D. Provably secure and efficient bounded ciphertext policy attribute based encryption. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia, 10–12 March 2009; pp. 343–352. [Google Scholar]
  22. Waters, B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Proceedings of the International Workshop on Public Key Cryptography; Springer: Berlin/Heidelberg, Germany, 2011; pp. 53–70. [Google Scholar]
  23. Goyal, V.; Pandey, O.; Sahai, A.; Waters, B. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 30 October–3 November 2006; pp. 89–98. [Google Scholar]
  24. Whitten, A.; Tygar, J.D. Why Johnny Ca not Encrypt: A Usability Evaluation of PGP 5.0. In Proceedings of the USENIX Security Symposium, Washington, DC, USA, 23–26 August 1999; Volume 348, pp. 169–184. [Google Scholar]
  25. Sheng, S.; Broderick, L.; Koranda, C.A.; Hyland, J.J. Why johnny still can’t encrypt: Evaluating the usability of email encryption software. In Proceedings of the Symposium On Usable Privacy and Security, Pittsburgh, PA, USA, 12–14 July 2006; ACM: New York, NY, USA, 2006; pp. 3–4. [Google Scholar]
  26. Shamir, A. Identity-based cryptosystems and signature schemes. In Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Paris, France, 9–11 April 1984; Springer: Berlin/Heidelberg, Germany, 1984; pp. 47–53. [Google Scholar]
  27. Boneh, D.; Franklin, M. Identity-based encryption from the Weil pairing. In Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 19–23 August 2001; Springer: Berlin/Heidelberg, Germany, 2001; pp. 213–229. [Google Scholar]
  28. Cocks, C. An identity based encryption scheme based on quadratic residues. In Proceedings of the IMA International Conference on Cryptography and Coding, Cirencester, UK, 17–19 December 2001; Springer: Berlin/Heidelberg, Germany, 2001; pp. 360–363. [Google Scholar]
  29. Park, J.H.; Lee, K.; Lee, D.H. Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups. IACR Cryptol. ePrint Arch. 2016, 2016, 500. [Google Scholar]
  30. Liu, J.; Ke, L. New efficient identity based encryption without pairings. J. Ambient Intell. Humaniz. Comput. 2019, 10, 1561–1570. [Google Scholar] [CrossRef]
  31. Yao, A.C. Protocols for secure computations. In Proceedings of the 23rd Annual Symposium on Foundations of Computer Science (SFCS 1982) NW, Washington, DC, USA, 3–5 November 1982; IEEE: Piscataway, NJ, USA, 1982; pp. 160–164. [Google Scholar]
  32. Gentry, C. Fully homomorphic encryption using ideal lattices. In Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, Bethesda, MD, USA, 31 May–2 June 2009; pp. 169–178. [Google Scholar]
  33. Song, D.X.; Wagner, D.; Perrig, A. Practical techniques for searches on encrypted data. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, S&P, Berkeley, CA, USA, 14–17 May 2000; IEEE: Piscataway, NJ, USA, 2000; pp. 44–55. [Google Scholar]
  34. Curtmola, R.; Garay, J.; Kamara, S.; Ostrovsky, R. Searchable symmetric encryption: Improved definitions and efficient constructions. J. Comput. Secur. 2011, 19, 895–934. [Google Scholar] [CrossRef]
  35. Ibrahim, A.; Jin, H.; Yassin, A.A.; Zou, D. Secure rank-ordered search of multi-keyword trapdoor over encrypted cloud data. In Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, Guilin, China, 6–8 December 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 263–270. [Google Scholar]
  36. Chen, X.; Huang, X.; Li, J.; Ma, J.; Lou, W.; Wong, D.S. New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans. Inf. Forensics Secur. 2014, 10, 69–78. [Google Scholar] [CrossRef]
  37. Sun, W.; Wang, B.; Cao, N.; Li, M.; Lou, W.; Hou, Y.T.; Li, H. Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, Hangzhou, China, 8–10 May 2013; pp. 71–82. [Google Scholar]
  38. Katz, J.; Sahai, A.; Waters, B. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, 13–17 April 2008; Springer: Berlin/Heidelberg, Germany, 2008; pp. 146–162. [Google Scholar]
  39. Boneh, D.; Waters, B. Conjunctive, subset, and range queries on encrypted data. In Proceedings of the Theory of Cryptography Conference, Amsterdam, The Netherlands, 21–24 February 2007; Springer: Berlin/Heidelberg, Germany, 2007; pp. 535–554. [Google Scholar]
  40. Kawai, Y.; Takashima, K. Predicate-and attribute-hiding inner product encryption in a public key setting. In Proceedings of the International Conference on Pairing-Based Cryptography, Beijing, China, 22–24 November 2013; Springer: Berlin/Heidelberg, Germany, 2013; pp. 113–130. [Google Scholar]
  41. Blundo, C.; Iovino, V.; Persiano, G. Private-key hidden vector encryption with key confidentiality. In Proceedings of the International Conference on Cryptology and Network Security, Kanazawa, Japan, 12–14 December 2009; Springer: Berlin/Heidelberg, Germany, 2009; pp. 259–277. [Google Scholar]
  42. Fan, C.I.; Huang, S.Y. Controllable privacy preserving search based on symmetric predicate encryption in cloud storage. Future Gener. Comput. Syst. 2013, 29, 1716–1724. [Google Scholar] [CrossRef]
  43. Gay, R.; Méaux, P.; Wee, H. Predicate encryption for multi-dimensional range queries from lattices. In Proceedings of the IACR International Workshop on Public Key Cryptography, Gaithersburg, MD, USA, 30 March–1 April 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 752–776. [Google Scholar]
  44. Boneh, D.; Sahai, A.; Waters, B. Functional encryption: A new vision for public-key cryptography. Commun. ACM 2012, 55, 56–64. [Google Scholar] [CrossRef]
  45. Whitmore, A.; Agarwal, A.; Da Xu, L. The Internet of Things—A survey of topics and trends. Inf. Syst. Front. 2015, 17, 261–274. [Google Scholar] [CrossRef]
  46. Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.D.; Katz, R.; Konwinski, A.; Lee, G.; Patterson, D.; Rabkin, A.; Stoica, I.; et al. A view of cloud computing. Commun. ACM 2010, 53, 50–58. [Google Scholar] [CrossRef] [Green Version]
  47. Bonomi, F.; Milito, R.; Zhu, J.; Addepalli, S. Fog computing and its role in the internet of things. In Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, Helsinki, Finland, 17 August 2012; pp. 13–16. [Google Scholar]
  48. Ali, M.; Dhamotharan, R.; Khan, E.; Khan, S.U.; Vasilakos, A.V.; Li, K.; Zomaya, A.Y. SeDaSC: Secure data sharing in clouds. IEEE Syst. J. 2015, 11, 395–404. [Google Scholar] [CrossRef]
  49. Özkar, M.; Sandıkkaya, M.T. A Survey on Security & Privacy Design in e-Health. In Proceedings of the 2020 5th International Conference on Computer Science and Engineering (UBMK); Diyarbakır, Turkey, 9–11 September 2020, IEEE: Piscataway, NJ, USA, 2020; pp. 208–213. [Google Scholar]
  50. Alam, M.R.; Reaz, M.B.I.; Ali, M.A.M. A review of smart homes—Past, present, and future. IEEE Trans. Syst. Man Cybern. Part C 2012, 42, 1190–1203. [Google Scholar] [CrossRef]
  51. Albino, V.; Berardi, U.; Dangelico, R.M. Smart cities: Definitions, dimensions, performance, and initiatives. J. Urban Technol. 2015, 22, 3–21. [Google Scholar] [CrossRef]
  52. Feng, Q.; He, D.; Zeadally, S.; Khan, M.K.; Kumar, N. A survey on privacy protection in blockchain system. J. Netw. Comput. Appl. 2019, 126, 45–58. [Google Scholar] [CrossRef]
  53. Li, X.; Jiang, P.; Chen, T.; Luo, X.; Wen, Q. A survey on the security of blockchain systems. Future Gener. Comput. Syst. 2020, 107, 841–853. [Google Scholar] [CrossRef]
  54. Jordan, M.I.; Mitchell, T.M. Machine learning: Trends, perspectives, and prospects. Science 2015, 349, 255–260. [Google Scholar] [CrossRef]
  55. Yang, Q.; Liu, Y.; Chen, T.; Tong, Y. Federated machine learning: Concept and applications. ACM Trans. Intell. Syst. Technol. 2019, 10, 1–19. [Google Scholar] [CrossRef]
  56. Unar, J.; Seng, W.C.; Abbasi, A. A review of biometric technology along with trends and prospects. Pattern Recognit. 2014, 47, 2673–2688. [Google Scholar] [CrossRef]
  57. Liyanage, M.; Salo, J.; Braeken, A.; Kumar, T.; Seneviratne, S.; Ylianttila, M. 5G privacy: Scenarios and solutions. In Proceedings of the 2018 IEEE 5G World Forum (5GWF), Santa Clara, CA, USA, 9–11 July 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 197–203. [Google Scholar]
  58. Zheleva, E.; Getoor, L. Privacy in social networks: A survey. In Social Network Data Analytics; Springer: Berlin/Heidelberg, Germany, 2011; pp. 277–306. [Google Scholar]
  59. Ambrosin, M.; Anzanpour, A.; Conti, M.; Dargahi, T.; Moosavi, S.R.; Rahmani, A.M.; Liljeberg, P. On the feasibility of attribute-based encryption on internet of things devices. IEEE Micro 2016, 36, 25–35. [Google Scholar] [CrossRef] [Green Version]
  60. Girgenti, B.; Perazzo, P.; Vallati, C.; Righetti, F.; Dini, G.; Anastasi, G. On the feasibility of attribute-based encryption on constrained IoT devices for smart systems. In Proceedings of the IEEE International Conference on Smart Computing (SMARTCOMP), Washington, DC, USA, 12–15 June 2019; pp. 225–232. [Google Scholar]
  61. Oualha, N.; Nguyen, K.T. Lightweight attribute-based encryption for the internet of things. In Proceedings of the IEEE International Conference on Computer Communication and Networks (ICCCN), Waikoloa, HI, USA, 1–4 August 2016; pp. 1–6. [Google Scholar]
  62. Garg, H.; Dave, M. Securing User Access at IoT Middleware Using Attribute Based Access Control. In Proceedings of the International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kanpur, India, 6–8 July 2019; pp. 1–6. [Google Scholar]
  63. Kurniawan, A.; Kyas, M. Securing Machine Learning Engines in IoT Applications with Attribute-Based Encryption. In Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI), Shenzhen, China, 1–3 July 2019; pp. 30–34. [Google Scholar]
  64. Rahulamathavan, Y.; Phan, R.C.W.; Rajarajan, M.; Misra, S.; Kondoz, A. Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption. In Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Odisha, India, 17–20 December 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 1–6. [Google Scholar]
  65. Singh, M.; Rajan, M.; Shivraj, V.; Balamuralidhar, P. Secure MQTT for Internet of Things (IoT). In Proceedings of the IEEE International Conference on Communication Systems and Network Technologies, Gwalior, India, 4–6 April 2015; pp. 746–751. [Google Scholar]
  66. Belguith, S.; Kaaniche, N.; Mohamed, M.; Russello, G. C-ABSC: Cooperative attribute based signcryption scheme for internet of things applications. In Proceedings of the IEEE International Conference on Services Computing (SCC), San Francisco, CA, USA, 2–7 July 2018; pp. 245–248. [Google Scholar]
  67. Ion, M.; Zhang, J.; Schooler, E.M. Toward content-centric privacy in ICN: Attribute-based encryption and routing. In Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking, Hong Kong, China, 12 August 2013; pp. 39–40. [Google Scholar]
  68. La Manna, M.; Perazzo, P.; Rasori, M.; Dini, G. fABElous: An attribute-based scheme for industrial internet of things. In Proceedings of the IEEE International Conference on Smart Computing (SMARTCOMP), Washington, DC, USA, 12–15 June 2019; pp. 33–38. [Google Scholar]
  69. Alrawais, A.; Alhothaily, A.; Hu, C.; Xing, X.; Cheng, X. An attribute-based encryption scheme to secure fog communications. IEEE Access 2017, 5, 9131–9138. [Google Scholar] [CrossRef]
  70. Huang, Q.; Yang, Y.; Wang, L. Secure data access control with ciphertext update and computation outsourcing in fog computing for Internet of Things. IEEE Access 2017, 5, 12941–12950. [Google Scholar] [CrossRef]
  71. Li, J.; Zhang, Y.; Chen, X.; Xiang, Y. Secure attribute-based data sharing for resource-limited users in cloud computing. Elsevier Comput. Secur. 2018, 72, 1–12. [Google Scholar] [CrossRef]
  72. Meamari, E.; Guo, H.; Shen, C.C.; Zhang, R. Data User-Based Attribute Based Encryption. In Proceedings of the 54th IEEE Annual Conference on Information Sciences and Systems (CISS), Princeton, NJ, USA, 18–20 March 2020; pp. 1–5. [Google Scholar]
  73. Wang, H.; Dong, X.; Cao, Z.; Li, D. Secure and efficient attribute-based encryption with keyword search. Comput. J.-Br. Comput. Soc. 2018, 61, 1133–1142. [Google Scholar] [CrossRef] [Green Version]
  74. Zhang, Q.; Wang, G.; Liu, Q.; Peng, T. Attribute-based encryption with personalized search. In Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications and IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), Guangzhou, China, 12–15 December 2017; pp. 1172–1178. [Google Scholar]
  75. Luo, J.; Dong, Q.; Huang, D.; Kang, M. Attribute Based Encryption for Information Sharing on Tactical Mobile Networks. In Proceedings of the MILCOM 2018—2018 IEEE Military Communications Conference (MILCOM), Los Angeles, CA, USA, 29–31 October 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–9. [Google Scholar]
  76. Zheng, D.; Wu, A.; Zhang, Y.; Zhao, Q. Efficient and privacy-preserving medical data sharing in Internet of Things with limited computing power. IEEE Access 2018, 6, 28019–28027. [Google Scholar] [CrossRef]
  77. Thatmann, D.; Raschke, P.; Küpper, A. Please, No More GUIs!: A User Study, Prototype Development and Evaluation on the Integration of Attribute-Based Encryption in a Hospital Environment. In Proceedings of the IEEE Annual Computer Software and Applications Conference (COMPSAC), Atlanta, GA, USA, 10–14 June 2016; Volume 2, pp. 496–502. [Google Scholar]
  78. Rasori, M.; Perazzo, P.; Dini, G. ABE-Cities: An attribute-based encryption system for smart cities. In Proceedings of the IEEE International Conference on Smart Computing (SMARTCOMP), Taormina, Italy, 18–20 June 2018; pp. 65–72. [Google Scholar]
  79. Salman, O.; Abdallah, S.; Elhajj, I.H.; Chehab, A.; Kayssi, A. Identity-based authentication scheme for the Internet of Things. In Proceedings of the IEEE Symposium on Computers and Communication (ISCC), Messina, Italy, 27–30 June 2016; pp. 1109–1111. [Google Scholar]
  80. Güneysu, T.; Oder, T. Towards lightweight identity-based encryption for the post-quantum-secure Internet of Things. In Proceedings of the 2017 18th International Symposium on Quality Electronic Design (ISQED), Santa Clara, CA, USA, 14–15 March 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 319–324. [Google Scholar]
  81. Jiang, L.; Li, T.; Li, X.; Atiquzzaman, M.; Ahmad, H.; Wang, X. Anonymous communication via anonymous identity-based encryption and its application in IoT. Wirel. Commun. Mob. Comput. 2018, 2018, 6809796. [Google Scholar] [CrossRef]
  82. Mao, Y.; Li, J.; Chen, M.R.; Liu, J.; Xie, C.; Zhan, Y. Fully secure fuzzy identity-based encryption for secure IoT communications. Comput. Stand. Interfaces 2016, 44, 117–121. [Google Scholar] [CrossRef]
  83. Sankaran, S. Lightweight security framework for IoTs using identity based cryptography. In Proceedings of the 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Jaipur, India, 21–24 September 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 880–886. [Google Scholar]
  84. Karati, A.; Islam, S.H.; Biswas, G.; Bhuiyan, M.Z.A.; Vijayakumar, P.; Karuppiah, M. Provably secure identity-based signcryption scheme for crowdsourced industrial Internet of Things environments. IEEE Internet Things J. 2017, 5, 2904–2914. [Google Scholar] [CrossRef]
  85. Al Salami, S.; Baek, J.; Salah, K.; Damiani, E. Lightweight encryption for smart home. In Proceedings of the 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, Austria, 31 August–2 September 2016; pp. 382–388. [Google Scholar]
  86. He, K.; Weng, J.; Mao, Y.; Yuan, H. Anonymous identity-based broadcast encryption technology for smart city information system. Pers. Ubiquitous Comput. 2017, 21, 841–853. [Google Scholar] [CrossRef]
  87. Alornyo, S.; Asante, M.; Hu, X.; Mireku, K.K. Encrypted Traffic Analytic using Identity Based Encryption with Equality Test for Cloud Computing. In Proceedings of the IEEE 7th International Conference on Adaptive Science & Technology (ICAST), Accra, Ghana, 22–24 August 2018; pp. 1–4. [Google Scholar]
  88. Sudarsono, A.; Yuliana, M.; Darwito, H.A. A secure data sharing using identity-based encryption scheme for e-healthcare system. In Proceedings of the 3rd International Conference on Science in Information Technology (ICSITech), Bandung, Indonesia, 25–26 October 2017; pp. 429–434. [Google Scholar]
  89. Huang, Q.; Yue, W.; He, Y.; Yang, Y. Secure identity-based data sharing and profile matching for mobile healthcare social networks in cloud computing. IEEE Access 2018, 6, 36584–36594. [Google Scholar] [CrossRef]
  90. Zhou, B.; Li, H.; Xu, L. An authentication scheme using identity-based encryption & blockchain. In Proceedings of the 2018 IEEE Symposium on Computers and Communications (ISCC), Natal, Brazil, 25–28 June 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 00556–00561. [Google Scholar]
  91. Zhang, M.; Wang, S.; Zhang, P.; He, L.; Li, X.; Zhou, S. Protecting Data Privacy for Permissioned Blockchains using Identity-Based Encryption. In Proceedings of the 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chengdu, China, 15–17 March 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 602–605. [Google Scholar]
  92. Liu, J.; Lai, J.; Huang, X. Dual trapdoor identity-based encryption with keyword search. Soft Comput. 2017, 21, 2599–2607. [Google Scholar] [CrossRef]
  93. Sarier, N.D. Multimodal biometric identity based encryption. Future Gener. Comput. Syst. 2018, 80, 112–125. [Google Scholar] [CrossRef]
  94. Li, S.; Wang, F.; Shi, T.; Kuang, J. Probably secure multi-user multi-keyword searchable encryption scheme in cloud storage. In Proceedings of the 3rd IEEE Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chengdu, China, 15–17 March 2019; pp. 1368–1372. [Google Scholar]
  95. Liu, X.; Guan, Z.; Du, X.; Wu, L.; Abedin, Z.U.; Guizani, M. Achieving secure and efficient cloud search services: Cross-lingual multi-keyword rank search over encrypted cloud data. In Proceedings of the IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
  96. Eltayieb, N.; Elhabob, R.; Hassan, A.; Li, F. An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid. J. Syst. Archit. 2019, 98, 165–172. [Google Scholar] [CrossRef]
  97. Li, H.; Jing, T. A Lightweight fine-grained searchable encryption scheme in fog-based healthcare IoT networks. Wirel. Commun. Mob. Comput. 2019, 2019, 1019767. [Google Scholar] [CrossRef] [Green Version]
  98. Ocansey, S.K.; Ametepe, W.; Li, X.W.; Wang, C. Dynamic searchable encryption with privacy protection for cloud computing. Int. J. Commun. Syst. 2018, 31, e3403. [Google Scholar] [CrossRef]
  99. Liu, Z.; Li, T.; Li, P.; Jia, C.; Li, J. Verifiable searchable encryption with aggregate keys for data sharing system. Future Gener. Comput. Syst. 2018, 78, 778–788. [Google Scholar] [CrossRef]
  100. Michalas, A. The lord of the shares: Combining attribute-based encryption and searchable encryption for flexible data sharing. In Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, Limassol, Cyprus, 8–12 April 2019; pp. 146–155. [Google Scholar]
  101. Ma, M.; He, D.; Kumar, N.; Choo, K.K.R.; Chen, J. Certificateless searchable public key encryption scheme for industrial internet of things. IEEE Trans. Ind. Inform. 2017, 14, 759–767. [Google Scholar] [CrossRef]
  102. Wu, L.; Chen, B.; Choo, K.K.R.; He, D. Efficient and secure searchable encryption protocol for cloud-based Internet of Things. J. Parallel Distrib. Comput. 2018, 111, 152–161. [Google Scholar] [CrossRef]
  103. Li, W.; Xiao, Y.; Tang, C.; Huang, X.; Xue, J. Multi-user searchable encryption voice in home IoT system. Internet Things 2020, 11, 100180. [Google Scholar] [CrossRef]
  104. Zhang, K.; Long, J.; Wang, X.; Dai, H.N.; Liang, K.; Imran, M. Lightweight searchable encryption protocol for industrial internet of things. IEEE Trans. Ind. Inform. 2020, 17, 4248–4259. [Google Scholar] [CrossRef]
  105. Tahir, S.; Rajarajan, M. Privacy-preserving searchable encryption framework for permissioned blockchain networks. In Proceedings of the IEEE International Conferences on Internet of Things, Green Computing and Communications, Cyber, Physical and Social Computing, and Smart Data, Halifax, NS, Canada, 30 July–3 August 2018; pp. 1628–1633. [Google Scholar]
  106. Chen, L.; Lee, W.K.; Chang, C.C.; Choo, K.K.R.; Zhang, N. Blockchain based searchable encryption for electronic health record sharing. Future Gener. Comput. Syst. 2019, 95, 420–429. [Google Scholar] [CrossRef]
  107. Chen, K.; Lin, Z.; Wan, J.; Xu, C. Interpretable Encrypted Searchable Neural Networks. In Proceedings of the International Conference on Machine Learning for Cyber Security, Xi’an, China, 19–21 September 2019; Springer: Berlin/Heidelberg, Germany, 2019; pp. 279–289. [Google Scholar]
  108. Farràs, O.; Ribes-González, J. Searchable encryption for geo-referenced data. In Proceedings of the 2016 Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), Vilanova i la Geltru, Spain, 20–22 June 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1–8. [Google Scholar]
  109. Sun, J.; Bao, Y.; Nie, X.; Xiong, H. Attribute-hiding predicate encryption with equality test in cloud computing. IEEE Access 2018, 6, 31621–31629. [Google Scholar] [CrossRef]
  110. Wang, X.A.; Xhafa, F.; Cai, W.; Ma, J.; Wei, F. Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage. Comput. Electr. Eng. 2016, 56, 871–883. [Google Scholar] [CrossRef]
  111. Huang, S.Y.; Fan, C.I.; Tseng, Y.F. Enabled/disabled predicate encryption in clouds. Future Gener. Comput. Syst. 2016, 62, 148–160. [Google Scholar] [CrossRef]
  112. Xu, S.; Qian, Y.; Hu, R.Q. Privacy-preserving data preprocessing for fog computing in 5g network security. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–6. [Google Scholar]
  113. Liu, W.; Liu, J.; Wu, Q.; Qin, B.; Liang, K. Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control. In Proceedings of the European Symposium on Research in Computer Security, Heraklion, Greece, 26–30 September 2016; Springer: Berlin/Heidelberg, Germany, 2016; pp. 588–605. [Google Scholar]
  114. Fan, C.I.; Tseng, Y.F.; Huang, J.J.; Chen, S.F.; Kikuchi, H. Multireceiver predicate encryption for online social networks. IEEE Trans. Signal Inf. Process. Netw. 2017, 3, 388–403. [Google Scholar] [CrossRef]
  115. Wei, R.; Ye, D. Delegate predicate encryption and its application to anonymous authentication. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia, 10–12 March 2009; pp. 372–375. [Google Scholar]
  116. Xu, S.; Ye, F. A predicate encryption based anomaly detection scheme for e-Health communications network. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–6. [Google Scholar]
  117. Abdallai, H.; Hu, X.; Wahaballa, A.; Eltayieb, N.; Ramadan, M.; Zhiguang, Q. Efficient functional encryption and proxy re-cryptography for secure public cloud data sharing. In Proceedings of the 2016 IEEE International Conference of Online Analysis and Computing Science (ICOACS), Chongqing, China, 28–29 May 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 367–370. [Google Scholar]
  118. Sharma, D.; Jinwala, D.C. Encrypted data ordering with functional encryption. In Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India, 15–17 March 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–8. [Google Scholar]
  119. Ligier, D.; Carpov, S.; Fontaine, C.; Sirdey, R. Privacy Preserving Data Classification using Inner-product Functional Encryption. In Proceedings of the ICISSP, Porto, Portugal, 19–21 February 2017; pp. 423–430. [Google Scholar]
  120. Marc, T.; Stopar, M.; Hartman, J.; Bizjak, M.; Modic, J. Privacy-Enhanced Machine Learning with Functional Encryption. In Proceedings of the European Symposium on Research in Computer Security, Luxembourg, 23–27 September 2019; Springer: Berlin/Heidelberg, Germany, 2019; pp. 3–21. [Google Scholar]
  121. Xu, R.; Baracaldo, N.; Zhou, Y.; Anwar, A.; Ludwig, H. Hybridalpha: An efficient approach for privacy-preserving federated learning. In Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, London, UK, 15 November 2019; pp. 13–23. [Google Scholar]
  122. Xu, R.; Joshi, J.B.; Li, C. Cryptonn: Training neural networks over encrypted data. In Proceedings of the 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA, 7–10 July 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1199–1209. [Google Scholar]
  123. Stant, O.; Sirdey, R.; Gouy-Pailler, C.; Blanchart, P.; BenHamida, A.; Zayani, M.H. Privacy-Preserving Tax Calculations in Smart Cities by Means of Inner-Product Functional Encryption. In Proceedings of the 2018 2nd Cyber Security in Networking Conference (CSNet), Paris, France, 24–26 October 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–8. [Google Scholar]
  124. Son, Y.B.; Im, J.H.; Kwon, H.Y.; Jeon, S.Y.; Lee, M.K. Privacy-Preserving Peer-to-Peer Energy Trading in Blockchain-Enabled Smart Grids Using Functional Encryption. Energies 2020, 13, 1321. [Google Scholar] [CrossRef]
  125. Im, J.H.; Kwon, H.Y.; Jeon, S.Y.; Lee, M.K. Privacy-Preserving Electricity Billing System Using Functional Encryption. Energies 2019, 12, 1237. [Google Scholar] [CrossRef] [Green Version]
  126. Cui, H.; Wan, Z.; Wei, X.; Nepal, S.; Yi, X. Pay as you decrypt: Decryption outsourcing for functional encryption using blockchain. IEEE Trans. Inf. Forensics Secur. 2020, 15, 3227–3238. [Google Scholar] [CrossRef]
  127. Sharma, D.; Rashid, A.; Gupta, S.; Gupta, S.K. A functional encryption technique in uav integrated hetnet: A proposed model. Int. J. Simul.-Sci. Technol. 2019, 20, 7.1–7.7. [Google Scholar] [CrossRef]
  128. Liang, K.; Huang, X.; Guo, F.; Liu, J.K. Privacy-preserving and regular language search over encrypted cloud data. IEEE Trans. Inf. Forensics Secur. 2016, 11, 2365–2376. [Google Scholar] [CrossRef] [Green Version]
  129. Sharma, D.; Jinwala, D. Functional encryption in IoT e-health care system. In Proceedings of the International Conference on Information Systems Security, Kolkata, India, 16–20 December 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 345–363. [Google Scholar]
  130. Zhou, K.; Ren, J. PassBio: Privacy-preserving user-centric biometric authentication. IEEE Trans. Inf. Forensics Secur. 2018, 13, 3050–3063. [Google Scholar] [CrossRef] [Green Version]
  131. Abdalla, H.; Hu, X.; Wahaballa, A.; Ali, A.A.; Ramadan, M.; Qin, Z. Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme. IJ Netw. Secur. 2017, 19, 27–38. [Google Scholar]
  132. Liang, Y.; Cao, Z.; Dong, X.; Shen, J. Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product Functional Encryption. In Proceedings of the International Conference on Information and Communications Security, Lille, France, 29–31 October 2018; Springer: Berlin/Heidelberg, Germany, 2018; pp. 377–392. [Google Scholar]
  133. Yao, X.; Chen, Z.; Tian, Y. A lightweight attribute-based encryption scheme for the Internet of Things. Future Gener. Comput. Syst. 2015, 49, 104–112. [Google Scholar] [CrossRef]
  134. Touati, L.; Challal, Y.; Bouabdallah, A. C-CP-ABE: Cooperative ciphertext policy attribute-based encryption for the internet of things. In Proceedings of the IEEE International Conference on Advanced Networking Distributed Systems and Applications, Bejaia, Algeria, 17–19 June 2014; pp. 64–69. [Google Scholar]
  135. Rasori, M.; La Manna, M.; Perazzo, P.; Dini, G. A Survey on Attribute-Based Encryption Schemes Suitable for the Internet of Things. IEEE Internet Things J. 2022, 9, 8269–8290. [Google Scholar] [CrossRef]
  136. Imam, R.; Kumar, K.; Raza, S.M.; Sadaf, R.; Anwer, F.; Fatima, N.; Nadeem, M.; Abbas, M.; Rahman, O. A systematic literature review of attribute based encryption in health services. J. King Saud Univ.-Comput. Inf. Sci. 2022, in press. [Google Scholar]
  137. Zhang, Y.; Nakanishi, R.; Sasabe, M.; Kasahara, S. Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things. Sensors 2021, 21, 5053. [Google Scholar] [CrossRef] [PubMed]
  138. Tan, S.Y.; Yeow, K.W.; Hwang, S.O. Enhancement of a lightweight attribute-based encryption scheme for the Internet of Things. IEEE Internet Things J. 2019, 6, 6384–6395. [Google Scholar] [CrossRef]
  139. Kumar Premkamal, P.; Pja, A.; Kumar, P.S. Attribute based encryption in cloud computing: A survey, gap analysis, and future directions. J. Netw. Comput. Appl. 2018, 108, 37–52. [Google Scholar]
  140. Locke, D. MQ Telemetry Transport (MQTT) v3. 1 protocol specification. IBM Dev. Tech. Libr. 2010, 15. [Google Scholar]
  141. Adiga, B.; Balamuralidhar, P.; Rajan, M.; Shastry, R.; Shivraj, V. An identity based encryption using elliptic curve cryptography for secure m2m communication. In Proceedings of the First International Conference on Security of Internet of Things, Kollam, India, 17–19 August 2012; pp. 68–74. [Google Scholar]
  142. Belguith, S.; Kaaniche, N.; Laurent, M.; Jemai, A.; Attia, R. Constant-size threshold attribute based signcryption for cloud applications. In Proceedings of the International Conference on Security and Cryptography (SECRYPT), Madrid, Spain, 24–26 July 2017; pp. 212–225. [Google Scholar]
  143. Guo, F.; Mu, Y.; Chen, Z. Identity-based online/offline encryption. In Proceedings of the International Conference on Financial Cryptography and Data Security, Cozumel, Mexico, 28–31 January 2008; Springer: Berlin/Heidelberg, Germany, 2008; pp. 247–261. [Google Scholar]
  144. Kreutz, D.; Ramos, F.M.; Verissimo, P.E.; Rothenberg, C.E.; Azodolmolky, S.; Uhlig, S. Software-defined networking: A comprehensive survey. Proc. IEEE 2014, 103, 14–76. [Google Scholar] [CrossRef]
  145. Lyubashevsky, V.; Peikert, C.; Regev, O. On ideal lattices and learning with errors over rings. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco and Nice, France, 30 May–3 June 2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 1–23. [Google Scholar]
  146. Roy, S.S.; Vercauteren, F.; Mentens, N.; Chen, D.D.; Verbauwhede, I. Compact ring-LWE cryptoprocessor. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, Busan, Korea, 23–26 September 2014; Springer: Berlin/Heidelberg, Germany, 2014; pp. 371–391. [Google Scholar]
  147. Jia, X.; Hu, N.; Su, S.; Yin, S.; Zhao, Y.; Cheng, X.; Zhang, C. IRBA: An identity-based cross-domain authentication scheme for the internet of things. Electronics 2020, 9, 634. [Google Scholar] [CrossRef] [Green Version]
  148. Farjana, N.; Roy, S.; Mahi, M.; Nayeen, J.; Whaiduzzaman, M. An identity-based encryption scheme for data security in fog computing. In Proceedings of the International Joint Conference on Computational Intelligence, Budapest, Hungary, 2–4 November 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 215–226. [Google Scholar]
  149. Kim, J.Y.; Hu, W.; Sarkar, D.; Jha, S. ESIoT: Enabling secure management of the internet of things. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Boston, MA, USA, 18–20 July 2017; pp. 219–229. [Google Scholar]
  150. Li, F.; Xiong, P. Practical secure communication for integrating wireless sensor networks into the internet of things. IEEE Sens. J. 2013, 13, 3677–3684. [Google Scholar] [CrossRef]
  151. Gentry, C. Practical identity-based encryption without random oracles. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, 28 May–1 June 2006; Springer: Berlin/Heidelberg, Germany, 2006; pp. 445–464. [Google Scholar]
  152. Sakai, R.; Kasahara, M. Cryptosystems based on pairings. In Proceedings of the Symposium on Cryptography and Information Security-SCIS’00, Okinawa, Japan, 26–28 January 2000. [Google Scholar]
  153. Phong, L.T.; Matsuoka, H.; Ogata, W. Stateful identity-based encryption scheme: Faster encryption and decryption. In Proceedings of the ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, 18–20 March 2008; pp. 381–388. [Google Scholar]
  154. Ma, S. Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 2016, 328, 389–402. [Google Scholar] [CrossRef]
  155. Boneh, D.; Lynn, B.; Shacham, H. Short signatures from the Weil pairing. J. Cryptol. 2004, 17, 297–319. [Google Scholar] [CrossRef] [Green Version]
  156. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System; Technical Report; Manubot. 2009. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 25 July 2022).
  157. Waters, B. Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. In Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 16–20 August 2009; Springer: Berlin/Heidelberg, Germany, 2009; pp. 619–636. [Google Scholar]
  158. Li, J.; Wang, Q.; Wang, C.; Cao, N.; Ren, K.; Lou, W. Fuzzy keyword search over encrypted data in cloud computing. In Proceedings of the IEEE INFOCOM, San Diego, CA, USA, 14–19 March 2010; pp. 1–5. [Google Scholar]
  159. Guo, F.; Susilo, W.; Mu, Y. Distance-based encryption: How to embed fuzziness in biometric-based encryption. IEEE Trans. Inf. Forensics Secur. 2015, 11, 247–257. [Google Scholar] [CrossRef]
  160. Wu, Q. Uni-Sender Multi-Receiver searchable encryption. In Proceedings of the 2nd IEEE International Conference on Computer and Communications (ICCC), Chengdu, China, 14–17 October 2016; pp. 223–226. [Google Scholar]
  161. Zhou, R.; Zhang, X.; Du, X.; Wang, X.; Yang, G.; Guizani, M. File-centric multi-key aggregate keyword searchable encryption for industrial internet of things. IEEE Trans. Ind. Inform. 2018, 14, 3648–3658. [Google Scholar] [CrossRef]
  162. Bond, F.; Foster, R. Linking and extending an open multilingual wordnet. In Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), Sofia, Bulgaria, 4–9 August 2013; pp. 1352–1362. [Google Scholar]
  163. Hohenberger, S.; Waters, B. Online/offline attribute-based encryption. In Proceedings of the International Workshop on Public Key Cryptography, Buenos Aires, Argentina, 26–28 March 2014; Springer: Berlin/Heidelberg, Germany, 2014; pp. 293–310. [Google Scholar]
  164. Wang, C.; Li, W.; Li, Y.; Xu, X. A ciphertext-policy attribute-based encryption scheme supporting keyword search function. In Proceedings of the International Symposium on Cyberspace Safety and Security, Zhangjiajle, China, 13–15 November 2013; Springer: Berlin/Heidelberg, Germany, 2013; pp. 377–386. [Google Scholar]
  165. Ning, J.; Xu, J.; Liang, K.; Zhang, F.; Chang, E.C. Passive attacks against searchable encryption. IEEE Trans. Inf. Forensics Secur. 2018, 14, 789–802. [Google Scholar] [CrossRef]
  166. Poh, G.S.; Chin, J.J.; Yau, W.C.; Choo, K.K.R.; Mohamad, M.S. Searchable symmetric encryption: Designs and challenges. ACM Comput. Surv. 2017, 50, 1–37. [Google Scholar] [CrossRef]
  167. Bösch, C.; Hartel, P.; Jonker, W.; Peter, A. A survey of provably secure searchable encryption. ACM Comput. Surv. 2014, 47, 1–51. [Google Scholar] [CrossRef]
  168. Stefanov, E.; Papamanthou, C.; Shi, E. Practical dynamic searchable encryption with small leakage. Cryptol. ePrint Arch. 2013. Available online: https://eprint.iacr.org/2013/832.pdf (accessed on 25 July 2022).
  169. Kamara, S.; Papamanthou, C.; Roeder, T. Dynamic searchable symmetric encryption. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, Raleigh, NC, USA, 16–18 October 2012; pp. 965–976. [Google Scholar]
  170. Green, M.; Hohenberger, S.; Waters, B. Outsourcing the decryption of abe ciphertexts. In Proceedings of the USENIX Security Symposium, San Francisco, CA, USA, 8–12 August 2011; Volume 2011. [Google Scholar]
  171. Yang, Y.; Liu, X.; Zheng, X.; Rong, C.; Guo, W. Efficient traceable authorization search system for secure cloud storage. IEEE Trans. Cloud Comput. 2018, 8, 819–832. [Google Scholar] [CrossRef]
  172. Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; De Caro, A.; Enyeart, D.; Ferris, C.; Laventman, G.; Manevich, Y.; et al. Hyperledger fabric: A distributed operating system for permissioned blockchains. In Proceedings of the 13th EuroSys Conference, Porto, Portugal, 23–26 April 2018; pp. 1–15. [Google Scholar]
  173. Tahir, S.; Ruj, S.; Rahulamathavan, Y.; Rajarajan, M.; Glackin, C. A new secure and lightweight searchable encryption scheme over encrypted cloud data. IEEE Trans. Emerg. Top. Comput. 2017, 7, 530–544. [Google Scholar] [CrossRef] [Green Version]
  174. Wood, G. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 2014, 151, 1–32. [Google Scholar]
  175. Goodfellow, I.; Pouget-Abadie, J.; Mirza, M.; Xu, B.; Warde-Farley, D.; Ozair, S.; Courville, A.; Bengio, Y. Generative adversarial nets. In Proceedings of the Advances in Neural Information Processing Systems, Montreal, QC, Canada, 8–13 December 2014; pp. 2672–2680. [Google Scholar]
  176. Hinton, G.; Osindero, S.; Welling, M.; Teh, Y.W. Unsupervised discovery of nonlinear structure using contrastive backpropagation. Cogn. Sci. 2006, 30, 725–731. [Google Scholar] [CrossRef] [PubMed]
  177. Park, J.; Kim, Y.; Eom, I.; Lee, K. Economic load dispatch for piecewise quadratic cost function using Hopfield neural network. IEEE Trans. Power Syst. 1993, 8, 1030–1038. [Google Scholar] [CrossRef] [Green Version]
  178. González, J.R. CLARUS: User-Centered Privacy and Security in the Cloud. In Proceedings of the 2nd URV Doctoral Workshop in Computer Science and Mathematics, Tarragona, Spain, 13 November 2015; Publicacions Universitat Rovira i Virgili: Catalunya, Spain, 2015; p. 29. [Google Scholar]
  179. Cash, D.; Jarecki, S.; Jutla, C.; Krawczyk, H.; Roşu, M.C.; Steiner, M. Highly-scalable searchable symmetric encryption with support for boolean queries. In Proceedings of the Annual Cryptology Conference, Santa Barbara, CA, USA, 18–22 August 2013; Springer: Berlin/Heidelberg, Germany, 2013; pp. 353–373. [Google Scholar]
  180. Wang, Q.; Peng, L.; Xiong, H.; Sun, J.; Qin, Z. Ciphertext-policy attribute-based encryption with delegated equality test in cloud computing. IEEE Access 2017, 6, 760–771. [Google Scholar] [CrossRef]
  181. Zhu, H.; Wang, L.; Ahmad, H.; Niu, X. Key-policy attribute-based encryption with equality test in cloud computing. IEEE Access 2017, 5, 20428–20439. [Google Scholar] [CrossRef]
  182. Lewko, A.; Okamoto, T.; Sahai, A.; Takashima, K.; Waters, B. Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco and Nice, France, 30 May–3 June 2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 62–91. [Google Scholar]
  183. Park, J.H. Inner-product encryption under standard assumptions. Des. Codes Cryptogr. 2011, 58, 235–257. [Google Scholar] [CrossRef]
  184. Tseng, Y.F.; Gao, S.J. Efficient Subset Predicate Encryption for Internet of Things. In Proceedings of the 2021 IEEE Conference on Dependable and Secure Computing (DSC), Fukushima, Japan, 30 January–2 February 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–2. [Google Scholar]
  185. Chen, X.; Zhang, F.; Kim, K. Chameleon hashing without key exposure. In Proceedings of the International Conference on Information Security, Palo Alto, CA, USA, 27–29 September 2004; Springer: Berlin/Heidelberg, Germany, 2004; pp. 87–98. [Google Scholar]
  186. Liang, K.; Au, M.H.; Liu, J.K.; Susilo, W.; Wong, D.S.; Yang, G.; Phuong, T.V.X.; Xie, Q. A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing. IEEE Trans. Inf. Forensics Secur. 2014, 9, 1667–1680. [Google Scholar] [CrossRef]
  187. He, D.; Chen, J.; Zhang, R. An efficient identity-based blind signature scheme without bilinear pairings. Comput. Electr. Eng. 2011, 37, 444–450. [Google Scholar] [CrossRef]
  188. Agrawal, R.; Kiernan, J.; Srikant, R.; Xu, Y. Order preserving encryption for numeric data. In Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, Paris, France, 13–18 June 2004; pp. 563–574. [Google Scholar]
  189. Agrawal, S.; Libert, B.; Stehlé, D. Fully secure functional encryption for inner products, from standard assumptions. In Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 14–18 August 2016; Springer: Berlin/Heidelberg, Germany, 2016; pp. 333–362. [Google Scholar]
  190. Ananth, P.; Sahai, A. Functional encryption for turing machines. In Proceedings of the Theory of Cryptography Conference, Beijing, China, 31 October–3 November 2016; Springer: Berlin/Heidelberg, Germany, 2016; pp. 125–153. [Google Scholar]
  191. Wrona, K. Securing the Internet of Things a military perspective. In Proceedings of the 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, Italy, 14–16 December 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 502–507. [Google Scholar]
  192. Abdalla, M.; Catalano, D.; Fiore, D.; Gay, R.; Ursu, B. Multi-input functional encryption for inner products: Function-hiding realizations and constructions without pairings. In Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 19–23 August 2018; Springer: Berlin/Heidelberg, Germany, 2018; pp. 597–627. [Google Scholar]
  193. Truex, S.; Baracaldo, N.; Anwar, A.; Steinke, T.; Ludwig, H.; Zhang, R.; Zhou, Y. A hybrid approach to privacy-preserving federated learning. In Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, London, UK, 15 November 2019; pp. 1–11. [Google Scholar]
  194. LeCun, Y.; Cortes, C.; Burges, C. MNIST Handwritten Digit Database. 2010, Volume 7, p. 23. Available online: http://yann.Lecun.Com/exdb/mnist (accessed on 15 November 2021).
  195. Kim, S.; Lewi, K.; Mandal, A.; Montgomery, H.; Roy, A.; Wu, D.J. Function-hiding inner product encryption is practical. In Proceedings of the International Conference on Security and Cryptography for Networks, Amalfi, Italy, 5–7 September 2018; Springer: Berlin/Heidelberg, Germany, 2018; pp. 544–562. [Google Scholar]
  196. Bishop, A.; Jain, A.; Kowalczyk, L. Function-hiding inner product encryption. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, 29 November–3 December 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 470–491. [Google Scholar]
  197. Liu, J.; Li, W.; Karame, G.O.; Asokan, N. Toward fairness of cryptocurrency payments. IEEE Secur. Priv. 2018, 16, 81–89. [Google Scholar] [CrossRef] [Green Version]
  198. Zhang, Y.; Deng, R.H.; Liu, X.; Zheng, D. Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf. Sci. 2018, 462, 262–277. [Google Scholar] [CrossRef]
  199. Armando, A.; Basin, D.; Boichut, Y.; Chevalier, Y.; Compagna, L.; Cuéllar, J.; Drielsma, P.H.; Heám, P.C.; Kouchnarenko, O.; Mantovani, J.; et al. The AVISPA tool for the automated validation of internet security protocols and applications. In Proceedings of the International Conference on Computer Aided Verification, San Francisco, CA, USA, 18–24 July 2005; Springer: Berlin/Heidelberg, Germany, 2005; pp. 281–285. [Google Scholar]
  200. Zheng, Q.; Xu, S.; Ateniese, G. VABKS: Verifiable attribute-based keyword search over outsourced encrypted data. In Proceedings of the IEEE INFOCOM 2014—IEEE Conference on Computer Communications, Toronto, ON, Canada, 27 April–2 May 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 522–530. [Google Scholar]
  201. Wang, Q.; Hu, S.; Ren, K.; He, M.; Du, M.; Wang, Z. CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud. In Proceedings of the European Symposium on Research in Computer Security, Vienna, Austria, 21–25 September 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 186–205. [Google Scholar]
  202. Huang, Q.; Ma, Z.; Yang, Y.; Niu, X.; Fu, J. Attribute based DRM scheme with dynamic usage control in cloud computing. China Commun. 2014, 11, 50–63. [Google Scholar] [CrossRef]
  203. Stankovic, J.A. Research directions for the internet of things. IEEE Internet Things J. 2014, 1, 3–9. [Google Scholar] [CrossRef]
  204. Naru, E.R.; Saini, H.; Sharma, M. A recent review on lightweight cryptography in IoT. In Proceedings of the 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 10–11 February 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 887–890. [Google Scholar]
  205. Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef] [Green Version]
  206. Lee, I.; Lee, K. The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Bus. Horiz. 2015, 58, 431–440. [Google Scholar] [CrossRef]
  207. Fagan, M.; Megas, K.; Scarfone, K.; Smith, M. Recommendations for IoT Device Manufacturers: Foundational Activities and Core Device Cybersecurity Capability Baseline, 2nd ed.; Technical Report; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2020. [Google Scholar]
  208. Kanuparthi, A.; Karri, R.; Addepalli, S. Hardware and embedded security in the context of internet of things. In Proceedings of the 2013 ACM workshop on Security, Privacy & Dependability for Cyber Vehicles, Berlin, Germany, 4 November 2013; pp. 61–64. [Google Scholar]
  209. Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [Google Scholar] [CrossRef]
  210. Li, B.; Lin, J.; Li, F.; Wang, Q.; Li, Q.; Jing, J.; Wang, C. Certificate transparency in the wild: Exploring the reliability of monitors. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK, 11–15 November 2019; pp. 2505–2520. [Google Scholar]
  211. Xu, R.; Joshi, J. Trustworthy and transparent third-party authority. ACM Trans. Internet Technol. 2020, 20, 1–23. [Google Scholar] [CrossRef]
  212. Xu, R.; Li, C.; Joshi, J. Blockchain-based Transparency Framework for Privacy Preserving Third-party Services. IEEE Trans. Dependable Secur. Comput. 2022. [Google Scholar] [CrossRef]
  213. Rahman, M.S.; Hossam-E-Haider, M. Quantum IoT: A quantum approach in IoT security maintenance. In Proceedings of the 2019 International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), Dhaka, Bangladesh, 10–12 January 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 269–272. [Google Scholar]
  214. Schöffel, M.; Lauer, F.; Rheinländer, C.C.; Wehn, N. Secure IoT in the Era of Quantum Computers—Where Are the Bottlenecks? Sensors 2022, 22, 2484. [Google Scholar] [CrossRef]
Figure 1. Overview of IoT applications.
Figure 1. Overview of IoT applications.
Sensors 22 07567 g001
Figure 2. PRISMA components of this review on applications of fine-grained access control in IoT.
Figure 2. PRISMA components of this review on applications of fine-grained access control in IoT.
Sensors 22 07567 g002
Figure 3. The number of works considered in this work, shown according to the publication year. ‘X represents year 2003 and earlier.
Figure 3. The number of works considered in this work, shown according to the publication year. ‘X represents year 2003 and earlier.
Sensors 22 07567 g003
Figure 4. Outline of this work.
Figure 4. Outline of this work.
Sensors 22 07567 g004
Figure 5. Functional encryption—spam filtering on encrypted mail.
Figure 5. Functional encryption—spam filtering on encrypted mail.
Sensors 22 07567 g005
Figure 6. A brief summary of the advantages and disadvantages of cryptographic primitives considered in this work.
Figure 6. A brief summary of the advantages and disadvantages of cryptographic primitives considered in this work.
Sensors 22 07567 g006
Figure 7. Application areas for FE and encompassed primitives considered in this work.
Figure 7. Application areas for FE and encompassed primitives considered in this work.
Sensors 22 07567 g007
Figure 8. A list of applications covered in this work under considered cryptographic primitives.
Figure 8. A list of applications covered in this work under considered cryptographic primitives.
Sensors 22 07567 g008
Figure 9. IoT data processing in cloud and fog.
Figure 9. IoT data processing in cloud and fog.
Sensors 22 07567 g009
Figure 10. e-Health applications offer quick and safe access for both doctors and patients, resulting in better advice and services.
Figure 10. e-Health applications offer quick and safe access for both doctors and patients, resulting in better advice and services.
Sensors 22 07567 g010
Figure 11. Smart cities are perceived to improve the overall quality of life for their citizens.
Figure 11. Smart cities are perceived to improve the overall quality of life for their citizens.
Sensors 22 07567 g011
Table 1. An overview of the representative literature discussed in this work.
Table 1. An overview of the representative literature discussed in this work.
ABEConstrained IoT Sensor Devices [59,60,61]
IoT Applications [62,63,64,65,66,67,68]
Fog and Cloud Applications [69,70,71]
Data Search and Sharing [72,73,74,75]
e-Health and Smart Cities [76,77,78]
IBEIoT Applications [79,80,81,82,83,84]
Smart Cities and Homes [85,86]
Healthcare and Cloud Applications [87,88,89]
Blockchain Privacy and Authentication [90,91]
Keyword Search and Biometric Verification [92,93]
SEFog and Cloud Applications [94,95,96,97,98]
Secure Data Sharing [99,100]
IoT Sensor-Based Applications [101,102,103,104]
Blockchain Privacy [105,106]
Neural Networks and Geo-Referenced Data [107,108]
PEFog and Cloud Application [42,109,110,111,112]
Social and Mobile Networks [113,114]
e-Health Networks and Authentication [115,116]
FEData Sharing and Classification [117,118,119]
Machine Learning Applications [120,121,122]
Smart Cities [123,124,125,126,127]
Biometric Authentication, Healthcare and Cloud Applications [128,129,130]
Rights Managements and Searchable Encryption [131,132]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Shahzad, K.; Zia, T.; Qazi, E.-u.-H. A Review of Functional Encryption in IoT Applications. Sensors 2022, 22, 7567. https://doi.org/10.3390/s22197567

AMA Style

Shahzad K, Zia T, Qazi E-u-H. A Review of Functional Encryption in IoT Applications. Sensors. 2022; 22(19):7567. https://doi.org/10.3390/s22197567

Chicago/Turabian Style

Shahzad, Khurram, Tanveer Zia, and Emad-ul-Haq Qazi. 2022. "A Review of Functional Encryption in IoT Applications" Sensors 22, no. 19: 7567. https://doi.org/10.3390/s22197567

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop