0% found this document useful (0 votes)
19 views

A Review of Functional Encryption in IoT Applications

Uploaded by

abla msir
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

A Review of Functional Encryption in IoT Applications

Uploaded by

abla msir
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

sensors

Review
A Review of Functional Encryption in IoT Applications
Khurram Shahzad 1, * , Tanveer Zia 1,2 and Emad-ul-Haq Qazi 2

1 School of Computing, Mathematics and Engineering, Charles Sturt University, Wagga Wagga 2650, Australia
2 Center of Excellence in Cybercrime and Digital Forensics, Naif Arab University for Security Sciences,
Riyadh 14812, Saudi Arabia
* Correspondence: [email protected]

Abstract: The Internet of Things (IoT) represents a growing aspect of how entities, including humans
and organizations, are likely to connect with others in their public and private interactions. The
exponential rise in the number of IoT devices, resulting from ever-growing IoT applications, also gives
rise to new opportunities for exploiting potential security vulnerabilities. In contrast to conventional
cryptosystems, frameworks that incorporate fine-grained access control offer better opportunities for
protecting valuable assets, especially when the connectivity level is dense. Functional encryption
is an exciting new paradigm of public-key encryption that supports fine-grained access control,
generalizing a range of existing fine-grained access control mechanisms. This survey reviews the
recent applications of functional encryption and the major cryptographic primitives that it covers,
identifying areas where the adoption of these primitives has had the greatest impact. We first provide
an overview of different application areas where these access control schemes have been applied.
Then, an in-depth survey of how the schemes are used in a multitude of applications related to IoT is
given, rendering a potential vision of security and integrity that this growing field promises. Towards
the end, we identify some research trends and state the open challenges that current developments
face for a secure IoT realization.

Keywords: IoT; functional encryption; security; privacy; fog and cloud computing; data sharing;
blockchain; e-Health
Citation: Shahzad, K.; Zia, T.; Qazi,
E.-u.H. A Review of Functional
Encryption in IoT Applications.
Sensors 2022, 22, 7567. https:// 1. Introduction
doi.org/10.3390/s22197567
1.1. Background
Academic Editor: Raffaele Bruno The last decade has seen an explosion in digital technologies, essentially transforming
Received: 26 July 2022
the way we produce, store and transmit information. Our lives are dependent on the use
Accepted: 26 September 2022
of services brought about through this change, whether it be as simple a task as opening
Published: 6 October 2022
the garage door or transferring highly personal information including medical records
and financial transactions. One of the drivers behind the recent data revolution is the
Publisher’s Note: MDPI stays neutral
Internet of Things (IoT) [1], which revolves around the idea of connecting a multitude
with regard to jurisdictional claims in
of devices. These devices, ranging from small sensors to advanced electronic gadgets,
published maps and institutional affil-
communicate and exchange information with either each other or central entities to form
iations.
a network. Through the use of smart terminals equipped with sensors and actuators,
and the integration of technologies and promising solutions, the IoT constitutes a network
of distributed intelligence, realizing the vision of a smart connected world. The variety
Copyright: © 2022 by the authors.
of applications wherein IoT has made a difference is vast, ranging from massive IoT
Licensee MDPI, Basel, Switzerland. applications to time- and information-critical IoT networks. The range of IoT applications
This article is an open access article is visually depicted in Figure 1. The positives of this modern digital transformation also
distributed under the terms and resulted in some negatives, among which the security and privacy of information appears
conditions of the Creative Commons to be of the highest concern. Apart from the standard security concerns involved in generic
Attribution (CC BY) license (https:// broadcast-natured wireless systems, IoT comes with its own additional challenges. These
creativecommons.org/licenses/by/ challenges stem from its unique characteristics including the range of communication,
4.0/). desired capabilities of self-organization and the availability of limited resources. The IoT

Sensors 2022, 22, 7567. https://doi.org/10.3390/s22197567 https://www.mdpi.com/journal/sensors


Sensors 2022, 22, 7567 2 of 50

also often connects to the cloud for added storage and computation capabilities, which
brings upon additional challenges in maintaining desired security and privacy.

Figure 1. Overview of IoT applications.

Researchers from the industry and academia alike are interested in analyzing and
developing ways to achieve the highest possible degree of information security, whether
it be identity protection, data integrity and security, or simply ensuring users that both
their day-to-day and sensitive information is in safe hands. Traditional approaches to data
integrity and security are highly dependent on public-key cryptography [2,3], which has
been driving the research efforts in the cryptographic community for a long time. In these
conventional cryptosystems, the decryption process eventually recovers the underlying
plaintext if the decryption process is successful, which means that all the information
contained in the plaintext is revealed. However, there are many applications where only
a partial exposure of the contained information is needed. For example, a financial orga-
nization may want to filter transactions above a certain amount in which case decrypting
the exact value of all transaction records is not needed. Rather, a simple decision on the
transaction amount determining whether it is above or below the desired threshold is
needed. Similarly, access rights in broadcast transmissions need to determine the level of
access that a user is granted instead of revealing the complete content of the transmission.
These rights can be determined based on, among other things, a user’s identity, affiliation,
attributes and organizational standing. This is specifically needed to hold under circum-
stances where the encryptor does not necessarily know the identity or attributes of the
decryptor, but rather all that is needed are the required attributes to determine the access
structure. Such a structure for data access drastically changes the way that information
access can be determined since it fundamentally alters the way in which data are distributed
among receivers and also affects the steps taken to ensure the security and integrity of these
data. This fine-grained access control provides a method of controlling certain forms of
data access, and compared to generalized data access control, it uses more distinctive and
variable methods for allowing access. Fine-gained access control provides the ability to
Sensors 2022, 22, 7567 3 of 50

centrally store data, maintain confidentiality and precision, improve security and improve
the information access for authorized users.
Functional encryption (FE) [4] is a public-key encryption scheme with different de-
cryption keys allowing a user to learn specific functions of the encrypted data. The control
that FE offers over which functions are allowed to be computed on the data and by which
user immensely benefits the data owner in multiple ways. For example, if suspicious
activity is observed within an organization, a scan of system logs might help understand
the origin of this activity. However, sharing the complete logs with an external security
expert may not be feasible as it gives them access to the entire network data. In such a
situation, a function can be generated for the expert to only look at the transmission-control
protocol (TCP) port, giving the external expert the corresponding key, and restricting their
access only to the desired information. Since its introduction, functional encryption has
attracted a lot of interest, and its known results are broadly categorized as either focusing on
feasibility results for general functionalities, or concrete, efficient realizations for restricted
functionalities of practical interest [5]. In this work, we review the recent applications of
functional encryption and the major cryptographic primitives that it covers. We identify
the areas in which the adoption of these primitives has had the greatest impact, especially
in the realm of IoT. Our work provides a review of these applications without strictly going
into the mathematical details associated with each area of application. This essentially
helps readers understand the domains and guides them towards further exploration in the
desired directions.

1.2. Related Works


A number of studies have recently been presented in the literature which have sur-
veyed the different aspects of fine-grained access control schemes, including attribute
and identity-based encryption, although the applications of FE have not been considered
on the larger scale. Lee et al. [6] presented a study on attribute-based encryption (ABE)
schemes for access control in cloud environments. The study is broken down based on two
different access policy structures and two encryption schemes, namely ABE, key-policy
ABE (KP-ABE), ciphertext-policy ABE (CP-ABE), hierarchical ABE (HABE), and ABE with
non-monotonic access structure. The authors provide a detailed performance and security
analysis of the considered schemes and conclude that user accountability is hard to justify
in these schemes. Furthermore, due to a pre-defined access structure in these schemes, all
the encrypted data need to be regenerated if a new user wants to access data and their
attributes are not in the access structure.
Based on the use of mobile devices to access private data hosted in the cloud and the
physical limitations of the mobile device to perform complex computations, Moffat et al. [7]
analyzed the CP-ABE approaches to data security of the mobile devices in a recent survey.
The authors found that the computational demands of CP-ABE encryption and decryption
is inefficient on mobile devices due to their physical limitations including the processor
and battery power as well as network bandwidth. To overcome these shortcomings,
some solutions have been proposed, including managing the efficiency and complexity of
encryption-generated computations, delegating encryption to assisting nodes, and efforts
to enhance the physical traits of these devices. The authors in [8] surveyed the various
varieties of ABE for use in cloud environments, making observations about their use and
provision of access privilege. A comparison of different ABE techniques based on their
distinctive features such as computation overhead, user revocation, resistance to collusion,
and attribute association was also provided.
Zhao et al. [9] provided a comprehensive survey of the applications of identity-based
cryptography (IBC) in mobile ad hoc networks (MANETs). The authors observed that
although IBC offers properties suitable for use in MANETs including the generation and
storage of privacy keys and the elimination of any need to distribute and store partner
certificates, IBC requires system parameters to be distributed among all communicating
parties before any encryption/decryption could take place, putting the “ad hoc” property
Sensors 2022, 22, 7567 4 of 50

out of scope. The authors in [10] provided a review of IBC and a comparison with tra-
ditional public-key encryption. After reviewing some important IBE schemes based on
bilinear pairing, a computational primitive widely used to build various identity-based
cryptographic schemes, a number of real-world applications were identified. Li et al. [11]
surveyed identity-based signcryption (IBSC) schemes (Signcryption is the cryptographic
primitive that meets both requirements of authenticity and confidentiality of crowdsourced
data among users and is ideal for ensuring secure authentic data storage and transmission
in industrial crowdsourcing environments), providing a comparison on their security prop-
erties and efficiency. Several recommendations to improve the performance of IBSC were
made, including the construction of schemes in the standard model, the construction of
post-quantum signcryption schemes and efficiency improvements.
Wang et al. [12] provided a survey on the two main techniques of searchable encryption
(SE), namely symmetric SE (SSE) and public key encryption with keyword search (PEKS).
Different SE schemes are categorized and compared in terms of functionality, efficiency,
and security. The work of [13] describes the notion of SE in the context of healthcare appli-
cations and characterizes the SE use cases into different healthcare scenarios. The authors
provided a comprehensive overview of the four representative SE techniques: SSE, PEKS,
attribute-based encryption with keyword search (ABKS), and proxy re-encryption with
keyword search (PRES) according to different electronic health records (EHRs) retrieving
scenarios and requirements. Furthermore, the categorization and comparison of different
SE schemes in terms of their security, efficiency, and functionality is also provided. In a
more recent work, the authors in [14] presented a complete taxonomy/classification of
the searchable encryption schemes in terms of the type of search, type of index, results
retrieved, implementation type, multiplicity of users, and the techniques used. A more
recent study in [15] provided the reader with a wide view of the different FE schemes, fo-
cusing on their functionalities, limitations, security models, and the involved mathematical
assumptions. The authors also presented an overview of “non-standard” FE schemes that
go beyond the inner product encryption and schemes with enhanced properties.

1.3. Methodology, Contribution and Organization


1.3.1. Research Methodology
As discussed in Section 1.2, the abundant literature on different aspects of fine-grained
access control in general, and related to IoT in particular, has been previously analyzed from
various perspectives. This work aimed to complement the previous works by providing
a comprehensive review of the different access control approaches combined under the
umbrella of functional encryption, as specifically applied to IoT applications. To achieve the
desired objectives, we adopted the Preferred Reporting Items for Systematic Reviews and
Meta-Analyses (PRISMA) methodology, a framework developed to support systematic re-
views and meta-analyses of literature [16]. To approach the problem at hand, we performed
a search, in November 2021, in the Scopus database using the available search tool. Fur-
thermore, we performed another search in April 2022 using the same database to include
any new works published in early 2022. We chose this database owing to its breadth and
relevancy in regard to the literature, as it includes the majority of the related archives and
journals. Furthermore, this database is frequently used in a lot of such academic reviews.
The approach which we considered for search through the database looked for
terms that comprised of different word combinations describing the problem at hand.
The terms “Functional Encryption”; “Attribute based Encryption”, “Identity based Encryp-
tion”, “Searchable Encryption” and “Predicate Encryption” were used in combination with
terms relating to “Internet of Things” and underlying applications. Once the articles that
resulted from the search were extracted, a manual review of all the results was performed
through focusing on the title, abstract, keywords and main text of the papers, eliminating
any works that were deemed unrelated to the purpose at hand. Any duplicate results
were also eliminated at this stage. It should be noted here that any articles that discussed
the aforementioned variations of fine-grained access control in mathematical detail but
Sensors 2022, 22, 7567 5 of 50

did not address specific IoT applications were also excluded from further analysis. More
specifically, the articles considered for further analysis met the criteria as (i) they considered
fine-grained access control in one of the variations given above; and (ii) they presented ap-
plication of access control in an application area of IoT. Further screening was also applied
to those records that did not offer full-text availability and were deemed unsuitable for
inclusion in the review due to the fact they were not applicable in IoT areas. We summarize
the process of search, exclusion, and selection in Figure 2, where it can be seen that although
the initial search resulted in a total of 410 articles, the number was reduced to 155 articles
after the analysis, filtering, and classification. We also provided a distribution of the works
considered in this study according to the publication year in Figure 3.

Figure 2. PRISMA components of this review on applications of fine-grained access control in IoT.

1.3.2. Contribution
In this work, we surveyed the recent applications of FE along with the commonly
occurring cryptographic primitives that it generalizes. More specifically, we looked at the
prominent works presented in the literature in recent years covering the applications of
these cryptographic primitives to IoT-related domains. Our main contributions can be
summarized as follows:
• We present a comprehensive review of the use of FE and encompassed fine-grain
access control mechanisms in IoT applications.
• We provide a detailed overview of the different application areas where fine-grain
access schemes were applied.
• We provide an in-depth survey of how these schemes are used in a multitude of
applications related to IoT. The aim was to provide the reader with a potential vision
of fine-grained security and integrity in IoT.
• We identify some research trends and state some open challenges that current devel-
opments face for a secure IoT realization.

1.3.3. Paper Organization


The basics of considered cryptographic primitives and early development works are
described in Sections 2.1–2.5, whereas Section 3 gives a brief description of the considered
application areas. The different applications that we cover in this work range from IoT and
cloud applications to data sharing and classification and machine learning. The presented
work is divided into sections pertaining to different techniques, wherein Section 4 considers
Sensors 2022, 22, 7567 6 of 50

the applications of ABE; Section 5 describes the work utilizing IBE for the most common
application areas; Section 6 presents the works using SE; Section 7 describes the applications
of PE; and the applications wherein FE is utilized are given in Section 8. We provide some
open challenges and related research trends in Section 9, and finally, some conclusions are
drawn in Section 10. A graphical outline of this work is also shown in Figure 4. We also
note that there is a significant overlap in the application areas of all these cryptographic
techniques, whereas the underlying schemes and targeted benefit drawn upon differ greatly
depending on the utilization of these schemes.

Figure 3. The number of works considered in this work, shown according to the publication year. ‘X
represents year 2003 and earlier.
Sensors 2022, 22, 7567 7 of 50

Figure 4. Outline of this work.

2. Review of Functional Encryption and Encompassed Cryptographic Primitives


FE is a strong generalization of several existing cryptographic primitives which ad-
dresses fine-grained access control in varying aspects. In this section, we first present
these underlying primitives and then provide some details on FE before delving into the
application areas of interest. Towards the end of this section, we also described how the
following presented cryptography schemes can be constructed from FE.

2.1. Attribute-Based Encryption


Attribute-based encryption (ABE), first proposed by Sahai and Waters [17], is a type of
public-key cryptosystem where the secret key of a user and the associated ciphertext are
linked to their attributes. As a result, the decryption of a ciphertext is only possible if the
set of attributes of the user’s key match the attributes of the ciphertext. The following set of
cryptographic primitives are commonly used in ABE schemes.
• ( MK, EK ) = Setup(λ)—this primitive initializes the cryptographic scheme, where
taking λ as the input security parameter, a master key MK and an encryption key EK
are generated.
• CP = Encrypt(M, P , EK)—This primitive encrypts the message/plaintext M under the
policy P using the encryption key EK, generating the ciphertext CP.
• DK = KeyGen(γ, MK)—This primitive generates the decryption key DK taking into
account the user attributes contained in γ and the master key MK.
• M = Decrypt(CP, DK )—This primitive outputs the message M taking as input the
ciphertext CP and decryption key DK if the decryption is successful. In the case of
failure, it outputs ⊥ (the symbol ⊥ is commonly used in the literature to denote a
failure to decrypt).
Owing to the fact that attributes are crucial entities in any ABE scheme, two classi-
fications of ABE named CP-ABE and KP-ABE were proposed, which have been widely
adopted in the literature.
Sensors 2022, 22, 7567 8 of 50

2.1.1. Cihpertext-Policy ABE


CP-ABE, as first proposed by Bethencourt et al. [18], offers sufficient flexibility since it
allows rules that specify which private keys can decrypt which ciphertexts. These private
keys are associated with sets of attributes or labels, and when a user encrypts, they encrypt
to an access policy which specifies which keys will be able to decrypt. CP-ABE has been
deemed more appropriate in the literature for data sharing systems since data owners
make and own the decision concerning the access policy. For CP-ABE, since the policy is
embedded in the ciphertext itself, the access structure for CP-ABE answers the question:
“Who can access the data that I am encrypting?”.
A variety of CP-ABE schemes have been proposed for flexible access control policies.
Cheung et al. [19] developed the first CP-ABE scheme under the decisional bilinear Diffie–
Hellman (DBDH) assumption and used positive and negative attributes under AND-gate
constructions. One drawback of this work was that the size of ciphertext and secret key
linearly increased with the number of attributes. Goyal et al. [20] and Liang et al. [21] made
further improvements to CP-ABE through a flexible access structure which supported AND,
OR and threshold operations. Using non-interactive cryptographic assumption, Waters [22]
proposed a new CP-ABE scheme where access the structure is presented using a linear secret
sharing scheme, however, it suffered the same problem of linear increase in encryption and
decryption overhead with the access structure.

2.1.2. Key-Policy ABE


KP-ABE was originally proposed by Goyal et al. [23] which, based on the decisional
bilinear Diffie–Hellman (DBDH) assumption, allowed fine-grained access to monotone
structures. In the proposed scheme, the secret key is associated with a pre-accessed structure
where the user is only able to decrypt the ciphertext if the attribute set satisfies the access
structure in the secret key. For KP-ABE, since the policy is embedded inside the key
belonging to the decryptor, the access structure of KP-ABE simply answers the following
question: “As a decryptor, what type of data can I access?”.

2.2. Identity-Based Encryption


Public-key cryptography enables the communicating parties to encrypt/decrypt mes-
sages and send them through insecure network channels. However, before secure com-
munication can be enabled, users must generate encryption and signature key pairs, be
verified by a certificate authority (CA) and receive CA-signed certificates. Furthermore,
key management issues including the key storage capacity required to archive all the
private keys for distinct users and key certification and validation processes [24,25] result
in major drawbacks of the public-key cryptography’s practical implementation. The idea
of identity-based cryptography was first proposed by Shamir in 1984 [26], putting forth the
notion of using a unique string such as a user’s name, email address or contact number
to explicitly compute the user’s private key. This enabled a new paradigm providing a
key-certificate-less platform effectively overcoming the issues plaguing public-key cryptog-
raphy. However, it came to reality only after Boneh and Franklin designed the first secure
and practical IBE scheme [27] using bilinear pairing on elliptic curves. In the same year,
Cocks proposed an IBE scheme using quadratic residuosity as the underlying primitive [28].
Since then, other primitives including trapdoor subgroups [29,30] have also been proposed.
A conventional IBE scheme can be described in the following cryptographic primitives:
• ( MK, Par ) = Setup(λ)—Upon the input of security parameter λ, it outputs public
system parameters Par, and master key MK. The Par are released to the public while
MK is kept secret.
• PK = Extract( MK, Par, ID )—Upon the input of MK, Par and user’s identity string
ID, this generates the user’s corresponding private key PK.
• CP = Encrypt( Par, ID, M )—Upon the input of Par, ID and message M, this outputs
the ciphertext CP.
Sensors 2022, 22, 7567 9 of 50

• M = Decrypt( Par, ID, CP)—This outputs the message M taking as input the cipher-
text CP alongwith Par and ID. In the case of decryption failure, it outputs ⊥.

2.3. Searchable Encryption


The diverse set of ciphertexts that are stored in the cloud servers or exchanged for
information and analysis among IoT-based sensor entities need to be searched and located
efficiently. The inability to access encrypted files limits the flexibility and precision of data
retrieval, which might result in insufficient or incorrect search results. A simple solution
may be to store the encrypted data on the cloud and a follow a complete decryption
protocol every time there is a search query that needs to be completed. However, this may
result in increased difficulty and complexity levels for data processing and application.
Some cryptographic primitives such as secure multi-party computation (SMC) [31] and
fully homomorphic encryption (FHE) [32] were proposed for the restricted handling of
encrypted data, however, these primitives are currently inefficient and hard to use in
real environments. The work in [33] proposed a first SE scheme based on ciphertext
scanning, which enables users to store encrypted data in the cloud, perform keyword
searches through the ciphertext domain and selectively retrieve relevant documents from
the cloud. The basic scheme of [33] is described as follows: Assume that Alice wants
to encrypt a document that contains a sequence of words W1 , . . . , Wl . Alice generates a
sequence of pseudorandom values S1 , . . . , Sl using a pseudorandom generator G, where
each Si is n − m bits long. To encrypt an n−bit word Wi , Alice takes the pseudorandom
bits Si , sets Ti ⊕ hSi , Fki (Si )i and outputs the ciphertext Ci Wi Ti , where
L L L
denotes a
direct sum. Different SE schemes have been proposed in the literature, including the works
of Curtmola et al. [34] for optimal search time, Ibrahim et al. [35] with information retrieval
system, Chen et al. [36] for security outsourcing of large-scale equation and Sun et al. [37]
for the secure sorting of encrypted data.

2.4. Predicate Encryption


PE [38] is deemed a novel cryptographic primitive that provides accurate fine-grained
access to encrypted data. In contrast to traditional public-key cryptographic systems,
it has been widely adopted in point-to-point communication systems. A cryptographic
system such as PE discerns the justification of information being only available to the
users with access rights, providing more fine-grained control over the ciphertext. Predicate
A P
encryption has an associated attribute space , a predicate space and consists of the
following algorithms:
• Setup(λ)—It takes as input the security parameter λ and outputs a public key PK,
and master key MK.
• P
KeyGen( MK, f )—It takes as input the MK, and a predicate f ∈ and outputs secret
key SK f .
• A
Encrypt( PK, I, M )—It takes as input a public key PK, an attribute I ∈ and a message
M, and outputs a ciphertext CP.
• Decrypt(CP, SK f )—It takes as input the ciphertext CP and a secret key SK f , and out-
puts either a message M, or ⊥ in case of failure.
Two different types of PE have been proposed in the literature: asymmetric PE
(ASPE) [38–40] and symmetric PE (SPE) [41–43], where the main difference in the two
types lies in the identity of the searcher. In general, SPE is suitable for systems where the
searcher is the same entity who has encrypted the data such as cloud storage systems, while
in ASPE, the searcher is not necessarily the same entity as the data encryptor, such as email
servers or credit card payment systems.

2.5. Functional Encryption


Traditional public-key encryption is deemed insufficient in a lot of emerging applica-
tions. For example, a decryption policy pertaining to the ciphertext under consideration
needs to be specified, dictating that only the individuals who satisfy the policy can decrypt
Sensors 2022, 22, 7567 10 of 50

to obtain the plaintext. It is often necessary to only grant access to a function of the plaintext,
depending on the decryptor’s authorization. For example, law enforcement agencies may
ask the cloud to search for particular individual’s images, hence the cloud only needs
restricted access to decrypt images that only contain the target individual, and nothing
else from the images is revealed. Many applications such as spam filters, parental control,
or targeted advertising, only require a partial knowledge of the data. Functional encryption
adapts these useful applications for the desired data privacy and confidentiality, since only
the relevant, processed information is revealed.
As compared to public-key cryptography systems, which contain three algorithms
of Setup, Encryption and Decryption, FE systems also include a fourth algorithm called
KeyGen. The KeyGen algorithm takes as input the master key mk generated by Setup and
a description of some function f , and outputs a key sk [ f ] that is specific to the function f .
More precisely, if c is the result of encrypting x with public key pk, then the decryption
of c using sk [ f ] outputs f ( x ). It should be emphasized here that that sk( f ) does not fully
decrypt c, rather it provides only a function f of the full decryption. However, for full
decryption, users can use a secret key for some function, say g, where g( x ) = x for all x.
An FE system is secure if an attacker with a set of secret keys sk [ f 1 ], . . . , sk [ f t ] can learn
nothing about the decryption of some ciphertext c other than what is revealed by the keys
at the attacker’s disposal (we refer the interested reader to [4,15] for further mathematical
details including the security model analysis).
For further illustration, we consider the common example of spam filtering on en-
crypted mail, as described in [44] and depicted in Figure 5. Here, the email recipient, who
has a master secret key sk, gives a spam-filtering service a key sk [ f ] for the functionality
f ; this f satisfies f ( x ) = 1 whenever message x is marked as spam by a specific spam
predicate, otherwise f ( x ) = 0. A sender encrypts an email message x to the recipient,
but the spam filter blocks the message if it is spam. The spam filter does its job through the
key sk [ f ] but learns nothing else about the contents of the message.

Figure 5. Functional encryption—spam filtering on encrypted mail.

Based on the seminal work of [17], the tutorial style article by Boneh et al. [44] explains
the basic ideas for FE, encompassing previous specializations of public-key encryptions
such as IBE and ABE as special cases of FE. Motivating the use of FE through practical
examples such as spam filtering on encrypted email, expressive access control and the
mining of large datasets, it discusses how FE supports the richest possible families of
functions and also provides an insight into the inherent limitations of FE systems. It is
notable that FE generalizes several existing cryptographic primitives including IBE and
ABE, among others. Under the FE terminology, IBE can be formulated as equality testing
functionality, where assuming pk and mk to be output of an FE setup, the encryptor uses
the encryption algorithm as E( pk, (id, m)) to obtain the ciphertext, while the data being
encrypted are the pair (id, m). A recipient with an identity of id∗ can use the secret key
sk [ f id∗ ], issued by the authority, where the function f id∗ outputs m if id = id∗ , otherwise
it produces a ⊥. Under this construction, users can only decrypt messages intended for
id∗ , otherwise they learn nothing about messages which are encrypted for other identities.
Similarly, in the case of a ciphertext-policy ABE system, the policy φ specifies the recipient
attributes that can decrypt the ciphertext and the encryption function takes into account
Sensors 2022, 22, 7567 11 of 50

the pair (φ, m) to generate the ciphertext. The message m is successfully decrypted if all
the specified attributes of the recipient match the ones specified in the policy else a ⊥ is
the output.
A brief summary of the advantages and disadvantages of the above discussed primi-
tives is given in Figure 6, providing the reader with an intuitive understanding of these
approaches. It should be noted that the details in Figure 6 are not application-specific,
and can be used as general guidelines when choosing between different approaches to
achieve fine-grained access control and security.

Figure 6. A brief summary of the advantages and disadvantages of cryptographic primitives consid-
ered in this work.
Sensors 2022, 22, 7567 12 of 50

3. Areas of Application
In the modern day and age, the range of applications where the security and integrity
of information plays a vital role is virtually unlimited. The amount of data exchanged in
these applications is vast, and data integrity is not only important to the users but also
to various service providers. The Internet of Things [1,45], enabling the realistic vision
of ‘everything smart’ is one of the most common and crucial areas where the security
and integrity of data are highly desirable. A variety of modern-day applications rely on
numerous IoT devices distributed across every possible surface, equipped with various
IoT-based sensors for data collection and further uploading these data to the relevant
authorities. Apart from analysis and response, these data also allow control authorities to
make intelligent decisions and develop algorithms for improved performance. Even though
this realization of IoT seems exciting and able to solve several problems, the characteristics
of these IoT sensor devices make the security and privacy of all the involved information
very critical.
In the following, we provide an overview of some of those application areas that
were considered in this survey, providing the reader with a glimpse of relevant security
concerns in these applications. The major application areas covered in this work are
shown in Figure 7, whereas Figure 8 details the application areas considered under each
cryptographic primitive.

Figure 7. Application areas for FE and encompassed primitives considered in this work.
Sensors 2022, 22, 7567 13 of 50

Fog and Cloud Computing—Cloud computing [46] enables the sharing of resources
as services for software, infrastructure and platforms for customers. Cloud customers,
in general, store their sensitive data in encrypted form. Fog computing [47], as shown
in Figure 9, extends cloud computing to the edge of the network, providing newer ser-
vices such as location awareness, low latency and quality-of-service (QoS) enhancement.
However, significant threats exist in cloud- and fog-based computing networks relating to
data alteration, unauthorized access and eavesdropping attacks. Furthermore, fog nodes
are considered to be more easily compromised and less trustworthy due to their closer
deployment to the network edge. These issues raise the most concerns among users who
look to utilize fog and cloud resources for data storage and sharing.

Figure 8. A list of applications covered in this work under considered cryptographic primitives.

Data Search and Sharing—With the recent increase in the amount of data exchanged [48],
their transmission and sharing across public networks should be treated carefully. This,
in part, can be attributed to the fact that in public networks, participating users are not
fully trusted and everyone, including the adversaries, can easily become part of the net-
work. On the other hand, searching is an increasingly important aspect for the retrieval
of desired information. Since data are generally stored in encrypted form with cloud
service providers, extracting desired information may require the decryption of all the data
which are computationally complex and infeasible. Furthermore, traditional public-key
encryption with keyword search (PEKS) schemes involve public-key infrastructure (PKI) to
authenticate users over the network which is considered a complex and costly task due to
the involvement of certificate revocation, storage, distribution and verification.
e-Health Applications—Smart health systems [49], as shown in Figure 10, enable the
exchange of sensitive and personal data between doctors and patients. If the doctors have
Sensors 2022, 22, 7567 14 of 50

timely access to a patient’s medical information, this can result in better advice and medical
services. The privacy of these data can be threatened if these sensitive data are exposed
to an open network. Furthermore, since most health sensors and mobile devices have
constrained resources, quickly producing and processing ciphertexts can be challenging.
Smart Homes and Cities—Smart homes and cities, as shown in Figure 11, are per-
ceived to facilitate the needs of modern citizens, improving the overall quality of their life.
Smart homes [50] are envisioned to connect all appliances and objects together, integrating
them in the Internet through smartphones and other mobile devices. However, all these
connected devices contain personal information flowing through them, causing concerns
among home owners about their privacy. On the other hand, smart cities [51] can address
the major problems in most urban areas including traffic congestion, energy and resource
management, education, sanitation and healthcare services. However, these technologies
heavily rely on some underlying infrastructure, e.g., IoT sensors to achieve the desired
purpose. Furthermore, the large amounts of data produced for the purposes of observation
and analysis are generally outsourced to a cloud storage service (CSS) for ease of access
and enhanced security. As soon as the data land on the cloud, the user’s control is lost and
they have to fully trust the CSS. To encounter these problems, it has been often proposed to
store encrypted data on the cloud while ensuring fine-grained access control.

Figure 9. IoT data processing in cloud and fog.

Blockchain-Inspired Privacy—Blockchain is a comprehensive technology encompass-


ing data storage, cryptography and distributed systems, among others, providing schemes
to develop decentralized trust relationships [52,53]. This allows users to communicate and
trade directly in the network instead of relying on third-party intermediaries. The dis-
tributed structure ensures that a compromise of one node in the chain does not affect the
rest of the system. With the development of blockchain technology, its applications have
transitioned from crypto-currencies to real economies. As security vulnerabilities make IoT
devices an easy target for distributed denial-of-service attacks, malicious attackers and data
breaches, blockchain technology can improve the security and scalability of IoT networks
due to its transparency, truthfulness, immutability, and privacy features. On the other hand,
in permissioned blockchain networks, each node can be owned by different organizations,
without having to build a centralized network and to bring a certain level of trust among
untrusting parties.
ML Applications—Modern-day applications heavily rely on machine learning (ML)
techniques [54]. In the realm of network privacy and security, these can be used to help
detect and prevent malicious activity and finding any security vulnerabilities. In the case
of an attack on ML engines, training sets or datasets, the result may range from breaking
the ML model to adversely affecting the prediction and classification results. Furthermore,
neural networks which play the role of building blocks in ML applications need a well-
Sensors 2022, 22, 7567 15 of 50

designed privacy-preserving framework such that users can benefit from ML without
revealing their own models and training data. More recent approaches, including federated
learning [55], have every user train their model locally and then exchange only model
parameters with others, instead of the sensitive training data. Although this protects the
local exchanges among users, it requires sophisticated approaches to security and privacy.

Figure 10. e-Health applications offer quick and safe access for both doctors and patients, resulting
in better advice and services.

Biometric Verification and Applications—Biometric authentication helps in provid-


ing services such as access control to verify the individual’s identity based on their biometric
traits [56]. These traits such as fingerprints, iris scans and behavioral characteristics are
physically linked to an individual and unlike passwords or other identity documents, they
cannot be easily forged or manipulated. Standard biometric authentication systems utilize
a two-phase process consisting of registration, where users provide their template to the
server, and a query phase, where a fresh template is provided for authentication. However,
this process is server-centric, suffering from some inherent deficiencies such as users having
to fully trust the server to properly handle their templates and the inherent noise of biomet-
ric template that may cause issues in the query phase of the process. This inherent noise
may also obstruct the system from keeping the identity information in an encrypted form
at all stages, providing an opportunity for adversaries to gain access to them.
Social and Mobile Networks—While the current rolling out of 5G networks offers
tremendous benefits to end users, information privacy has also raised serious concerns
from users and service providers alike [57]. Balancing the trade-off between the strong
confidentiality of user data and maintaining a low computation/communication overhead
still remains a challenge, especially in big data applications. On the other hand, the amount
of personal information stored on and shared through online social networks is immense,
calling for an unprecedented level of security and confidentiality [58]. In the majority of
these social networks, service providers make profits by generating advertisement revenue,
where securing user privacy and generating accurate advertisements simultaneously can
be tricky due to the involvement of user data decryption to extract keywords.
Table 1 provides an overview of the representative literature considered in this work
for different applications under the considered cryptographic primitives.
Sensors 2022, 22, 7567 16 of 50

Figure 11. Smart cities are perceived to improve the overall quality of life for their citizens.

Table 1. An overview of the representative literature discussed in this work.

ABE Constrained IoT Sensor Devices [59–61]


IoT Applications [62–68]
Fog and Cloud Applications [69–71]
Data Search and Sharing [72–75]
e-Health and Smart Cities [76–78]
IBE IoT Applications [79–84]
Smart Cities and Homes [85,86]
Healthcare and Cloud Applications [87–89]
Blockchain Privacy and Authentication [90,91]
Keyword Search and Biometric Verification [92,93]
SE Fog and Cloud Applications [94–98]
Secure Data Sharing [99,100]
IoT Sensor-Based Applications [101–104]
Blockchain Privacy [105,106]
Neural Networks and Geo-Referenced Data [107,108]
PE Fog and Cloud Application [42,109–112]
Social and Mobile Networks [113,114]
e-Health Networks and Authentication [115,116]
FE Data Sharing and Classification [117–119]
Machine Learning Applications [120–122]
Smart Cities [123–127]
Biometric Authentication, Healthcare and Cloud Applications [128–130]
Rights Managements and Searchable Encryption [131,132]
Sensors 2022, 22, 7567 17 of 50

4. Attribute-Based Encryption
ABE is a public-key encryption scheme in which the user attributes determine their
secret key and the resulting ciphertext. Thus, the decryption of a ciphertext is only possible
if the set of attributes of the user key matches the attributes of the ciphertext. A review of
the significant literature on ABE in terms of applications for the last decade is provided
in Table 2. In the following, we review some works on the application of ABE in the
IoT domain.

4.1. ABE for Constrained IoT Sensor Devices


ABE Feasibility for IoT Devices—The work of [59] explores the feasibility of ABE for
some well-known IoT platforms and recommends its adoption for secure access control
in IoT applications. A comprehensive analysis of the cost of ABE operations on resource-
constrained devices is performed, where KP-ABE and CP-ABE are implemented on widely
used IoT-enabling devices. The paper provides evidence of ABE feasibility for devices
including Intel Galileo Gen 2, Intel Edison and Raspberry Pi Zero. The authors also present
a smart healthcare use case to evaluate the proposed feasibility in real-world scenarios.
The cryptographic operation performance is evaluated based on the assured security level
(the number of bits used as primitives in cryptographic operations), where three security
levels equivalent to the security provided by AES symmetric encryption using key lengths
of 80, 112 and 128 bits are considered. The authors observe that the considered security level
does not significantly impact memory usage, which is instead affected by the number of
attributes in the policy. However, considering the execution time and energy consumption,
the overall performance penalty is higher when the security level, instead of the number of
attributes is increased.
ABE Feasibility for Constrained IoT Devices—Further considering the adaptability
of ABE for constrained IoT devices, [60] assessed the feasibility of ABE adoption in con-
strained devices characterized by limited capabilities in computing, storage and power.
Three schemes corresponding to KP-ABE [23]. CP-ABE [18] and a recent KP-ABE for
IoT [133] have been implemented and evaluated in terms of encryption/decryption time
and energy consumption. The analysis presented by the authors highlights how ABE has a
significant effect on the battery life of limited-power devices, which is significantly reduced
when the number of employed attributes increases beyond 10. The authors specifically
consider low-cost embedded devices with less than 1 MB of RAM and a micro-controller.
The analysis shows that KP-ABE schemes are, in general, more efficient than CP-ABE
ones, although CP-ABE schemes are considered more usable due to their association of
access policy to data. It is also highlighted that instead of considering flat (in a flat policy,
the decryption algorithm is always forced to visit all the leaves of the policy tree) poli-
cies, shaping the policies in many levels is good practice to improve the performance of
CP-ABE schemes.
Lightweight ABE for IoT—Addressing the energy needs of constrained IoT devices,
the authors of [61] build their work on the premise that CP-ABE has not been designed
taking into consideration the energy efficiency of most IoT devices. The authors pro-
pose to extend the basic CP-ABE scheme using effective pre-computation techniques.
Although some previously proposed solutions, e.g., ref [134], aim to mitigate this concern
by using online semi-trusted proxies to perform cryptographic operations on behalf of the
data owner, the proposed scheme in this paper does not need the presence or management
of any previously mentioned proxies. Rather, the work relies on the pre-computation
techniques, avoiding any substantial changes to the security protocols. The proposed
algorithm requires fewer computations, where in particular, there is no need for exponen-
tiations or scalar point multiplications apart from small scalars. However, the memory
consumption depends on the number of attributes, limiting the attributes in the access tree
for a given device.
Sensors 2022, 22, 7567 18 of 50

Table 2. Significant IoT-related literature for ABE in the last decade.

Ref. Year Author Significance Publisher


[135] 2022 M. Rasori et al. ABE Survey for IoT IEEE
ABE Review for Health
[136] 2022 R. Imam et al. ScienceDirect
Services
Combination of Blockchain
[137] 2021 Y. Zhang et al. MDPI
and ABE for Access Control
[138] 2019 S-Y Tan et al. ABE Enhancement for IoT IEEE
Survey on ABE in Cloud
[139] 2018 P. Kumar P et al. Elsevier
Computing
Blockchain Enhancement
[64] 2017 Y. Rahulamathavan et al. IEEE
for IoT Based on ABE
[59] 2016 M. Ambrosin et al. ABE Feasibility for IoT IEEE
[133] 2014 X. Yao et al. Lightweight ABE for IoT Elesevier
[65] 2015 M. Singh et al. Secure MQTT for IoT IEEE
Cooperative Signcryption
[66] 2018 S. Belguith et al. IEEE
for IoT
[68] 2019 M. Manna et al. ABE for Industrial IoT IEEE
[69] 2017 A. Alrawais et al. ABE for Fog Security IEEE

4.2. ABE for IoT Applications


Secure User Access at IoT Middleware—The authors in [62] proposed a CP-ABE
scheme on the middleware layer in the IoT system architecture for user access control while
reducing the complexity on the middleware. The authors aimed to provide data security
along with access control on the middleware in IoT architecture, where the middleware
only stores the encrypted data that are encrypted using the data owner’s access policy.
The proposed system model contains four entities that are part of the access control scheme,
the central attribute authority (CAA) which publishes public keys and a unique global
identity (GID) to the users; data owners that define the access policy characterizing which
subset of data each data user is allowed to access; data users who, with the right attributes,
can access the desired information; and middleware, which stores encrypted data and acts
as a data access provider to eligible users. Introducing the CAA between the middleware
and data owner ensures the privacy of the user’s data. Apart from the inherent benefits of
ABE, the scheme also provides resilience against collusion attacks. Since user’s GIDs are
associated with their respective attributes, if two users have different GID approach CAA,
it will identify that although they have the required set of attributes to fulfill an access
policy, the attributes do not belong to the same GID.
Secure ML Engines in IoT Applications—The work in [63] proposed a system to
protect machine learning engines in an IoT environment without modifying the internal
machine learning architecture. The premise builds on the security risks involved in the
scenario where the computation process involves sensitive data in training and testing
computations. The proposed scheme adopts the approach of a black box model where the
machine learning engines are unchanged, i.e., the input and output of machine learning
engines are preserved. To provide a secure access control, each computation request from
the client to the server provides encrypted data with the appropriate access control attribute,
otherwise the computation request is rejected. The authors proposed secure computation
approaches for supervised learning models and predictions, where the scheme uses CP-
ABE for key distribution and the key file is included in the device firmware. The provided
results compare time and file sizes for both encryption and decryption processes, however,
the computation is not performed for data with a size above 400 MB, since CP-ABE needs
more allocated memory and processing power for higher data sizes.
Sensors 2022, 22, 7567 19 of 50

Blockchain-Based IoT Ecosystem—The work in [64] used ABE to address the privacy
and confidentiality of the data shared in blockchain-based IoT ecosystems. It proposes
a restructuring of the blockchain protocol to absorb ABE and provide an end-to-end
privacy-preserving blockchain system. The use of blockchains in IoT offers major security
advantages including the mitigation of data manipulation attacks, avoiding data tampering
and trust building based on node reputation. The authors considered a decentralized ABE
thus more than one AA issues credentials for miners and users, avoiding any single point
of failure. Similarly to traditional blockchain applications, transactions are verified through
AAs using ABE and new blocks are added after mining in a periodic fashion. To guarantee
a stronger security, the blockchain protocol specifies the minimum number of miners for
transaction verification and AAs will be forced to wait until the number of miners for an
attribute surpasses the minimum requirement set by the protocol.
Secure MQTT for IoT—Protocols such as Message Queue Telemetry Transport
(MQTT) [140] are widely used in D2D communication in IoT for rapid developments,
but lack security features. The authors in [65] proposed secure versions of these protocols
where the existing security features are augmented with KP/CP-ABE, based on elliptic
curve cryptography (ECC) [141]. The authors studied the suitability of ABE schemes for
MQTT from an IoT perspective, and evaluate the performance of these secure protocols
in IoT. A new published service ‘Spublish’ is described where the messages are encrypted
using ABE, and suitability is provided based on lightweight ECC. The performance is
evaluated in terms of the time taken to perform encryption, decryption, key generation and
validation against a varying number of attributes with different key sizes. It is shown that a
Secure-MQTT-based KP-ABE scheme is suitable for scenarios where the access policies are
fixed and known a priori, and the requirement of an interactive public key generator (PKG)
is feasible. On the other hand, secure-MQTT based on CP-ABE is more suitable for those
deployments where devices can afford higher computing power and storage, and require
dynamic access policies.
Cooperative Signcryption for IoT Applications—The paper [66] presented a coop-
erative privacy preserving attribute-based signcryption scheme (C-ABSC) based on the
constant-size attribute-based signcryption technique [142]. The main idea presented by
the authors relies on the distribution of the signcrypting operation among different de-
vices, with respect to the selected subsets of a general access predicate. Thus, each device
signcrypts its input data and sends them to an untrusted aggregator (e.g., the edge node
in a cloud scenario) who is capable of decrypting the received data only if a sufficient
number of IoT devices cooperate. The proposed cooperative signcryption scheme does not
reveal more information other than the authenticity of the information. The analysis of the
proposed scheme further shows that the size of the signcrypted data does not depend on
the number of attributes in the access policy.
Attribute-Based Encryption and Routing in ICN—Due to data replication and dis-
semination, it is often difficult for the data owner to control data access in existing
information-centric networking (ICN) implementations. The work of [67] enhances ICN’s
ability to support data confidentiality by introducing ABE into ICN and making the ap-
proach specific to data attributes. The authors proposed an ABE and searchable data
encryption (SDE)-based encryption scheme for content-centric data privacy in ICN, which
offers fine-grained access control policies. The scheme facilitates large-scale applications by
decoupling publishers and subscribers without any need to share keys, as is customary in
symmetric encryption. Under the proposed approach, user privacy is preserved by encrypt-
ing subscription interests while routers can still forward encrypted data to subscribers.
ABE for Industrial IoT—The authors in [68] proposed an ABE scheme suitable for
industrial IoT applications, fABElous, aiming to minimize the encryption overhead in
communication. It should be noted that the computation power for the execution of ABE is
generally not a major concern, as it was shown to be suitable for IoT sensor devices [60],
however, the overhead generated by ABE can be heavy for the communication protocol
as it generates roughly 1 kB overhead per message. In the setting under consideration,
Sensors 2022, 22, 7567 20 of 50

a wireless sensor and actuator network (WSAN) is examined where sensors and actuators
exchange encrypted information. Under the given threat model, an eavesdropper is unable
to gain any information as they lack the symmetric key and the ABE decryption key. Simi-
larly, if compromised, the architecture proposes that the sensors periodically refresh their
symmetric keys, minimizing the information retrieved by an attacker. Although fABElous
has a huge overhead as compared to no security, it has less communication overhead when
compared to naive CP-ABE. Furthermore, as the number of data exchange executions
increases, the overhead becomes lower and lower, and in its best-case scenario, fABElous
has less than 50% of naive CP-ABE.

4.3. ABE for Fog and Cloud Applications


ABE for Secure Fog Communications—The authors of [69] proposed a key exchange
protocol based on CP-ABE for establishing secure communications and enabling authentic
and confidential communications among fog nodes. The proposed protocol establishes
secure communications to exchange the shared key that is used to encrypt and decrypt
the exchanged information. The fog nodes in the group can only obtain the shared key if
they satisfy the policy defined over the set of attributes attached to the ciphertext. Based
on the attribute set, a private key is issued for each fog node, while the cloud runs the
encryption algorithm outputting an encrypted symmetric key which is broadcast to all fog
nodes in the group. Upon receiving the encrypted key, each fog node runs the decryption
algorithm using the assigned private key to extract the symmetric key. The proposed
scheme is analyzed against collusion attacks, message authentication and forgeability,
where the underlying structure based on CP-ABE provides the main defense. Apart from
the proposed protocol, the authors also analyzed the performance and efficiency in terms
of message size and communication overhead. The feasibility of the proposed scheme is
demonstrated by implementing and comparing with an existing certificate-based protocol.
Secure Data Access in Fog Computing—The article [70] proposed a secure and fine-
grained data access control scheme with ciphertext update and computation outsourcing in
fog computing for IoT. Since, for a secure ciphertext update, a user should be able to prove
to the cloud service provider (CSP) that they possess valid attributes, the cryptographic
technique of attribute-based signature (ABS) is used to help the CSP in user verification.
Furthermore, most of the encryption, decryption and signing computations are outsourced
from the end users to fog nodes. As a result, the computations for data owners to encrypt,
and for end users to decrypt, re-encrypt and sign the data are irrelevant to the number
of attributes in the policies. The security model is shown to be resistant and covers the
aspects of data confidentiality, fine-grained access control, authentication and collusion.
The performance efficiency of the proposed scheme is analyzed in terms of computational
complexity for the data users, where it has been shown that the time for computations is
small and constant, and the scheme can tolerate the increasing number of attributes well.
Secure Data Sharing in Cloud Computing—The work of [71] addressed the chal-
lenges of simultaneous fine-grain access and data confidentiality in cloud-based data
sharing by proposing a new attribute-based data sharing scheme. The proposed scheme
was specifically designed for resource-limited mobile users in cloud computing. A ma-
jority of the computational tasks are eliminated by adding system public parameters and
moving partial encryption computation to offline operations. Furthermore, a public ci-
phertext test phase is performed before the decryption phase, which eliminates most of
the computation overhead due to illegitimate ciphertexts. The proposed scheme relies on
an online/offline ABE scheme [143] that eliminates a majority of the computational load,
allowing a resource-constrained mobile user to quickly transform a message into an ABE
ciphertext. The proposed scheme allows anyone to check the validity of ciphertexts before
performing an expensive full decryption.
Sensors 2022, 22, 7567 21 of 50

4.4. ABE for Data Searching and Sharing


Data User-Based ABE—In the original ABE scheme, a central authority (CA) adminis-
ters the system and generates secret keys for the users based on their attributes, where both
the data owners (DOs) and data users (DUs) need to trust the CA. However, the CA is not
always trustworthy and often, data users do not trust anyone but themselves. The authors
in [72] proposed a new decentralized-ABE (DABE) scheme termed data-user-based ABE
(DU-ABE), wherein DUs are not obligated to trust a CA. Instead, the DUs themselves
take the responsibility and work as the authorities of an ABE system. In the proposed
scheme, all the DUs possess attributes and run a DU-ABE system cooperatively to issue
secret keys to themselves. In generating the authority setup, DUs are grouped according to
their attributes and each member of the group generates a master key and a public key for
that attribute. The DUs of different groups broadcast the public keys but save the master
keys securely. Encryption setup by DOs takes into account the message, access matrix
based on access policy, global setup and public keys of the relevant set of attributes, while
for decryption, a DU employs the global setup and secret key related to a DU. For the
generation of secret keys, all the DUs need to communicate with each other, which incurs a
high communication overhead.
Secure ABE with Keyword Search—The work of [73] presented a CP-ABE scheme
with a fast keyword search which preserves the fine-grained access control inherited from
ABE while supporting hidden policy and fast search. The proposed scheme supports
AND-gate access policy with multiple attribute values, and uses multi-value-independent
CP-ABE resulting in constant computation costs as compared to the previously proposed
schemes. The authors proposed a multi-value-independent CP-ABE including authorized
keyword search and a hidden policy. The search user obtains the secret key from the trusted
authority, and given a keyword, the user generates a valid trapdoor and submits it to the
cloud (only those users whose attribute set satisfies the specified access policy can generate
a valid trapdoor). With the given trapdoor, the cloud server operates keyword search over
the encrypted data and retrieves the corresponding information.
ABE with Personalized Search—The authors in [74] addressed the design of an SE
scheme termed AEPS which supports personalized search and fine-grained access control.
A user interest model for individual users is proposed according to the department that the
user belongs to and their search history, where in addition to offering the flexible search
service in cloud computing, the scheme is able to return search results tailored to the
user. Furthermore, AEPS achieves access control and search functionality at the same time,
making it suitable for multi-user shared cloud search services. A personalized interest
model is built to record and analyze the user’s department attributes and their search
history. Using the access structure, the data manager controls the user’s access rights based
on their attributes, while the search results are sorted according to the rank algorithm.
The proposed scheme provides a solution of more flexible and personalized search for
companies, hospitals and schools, while providing a solution to secure and inexpensive
data storage in the cloud server.
Information Sharing in Tactical Mobile Networks—The work in [75] presented a
novel ABE cryptographic algorithm for battlefield tactical mobile networks (TMNs) with
added capabilities for revocation, delegation and federation. The authors argued that it
can serve as a foundation for a security infrastructure that allows efficient and effective
information sharing on the TMN. The construction of the proposed algorithm is divided
into a federated setup and key generation, key generation delegation as well as data
distribution and access. The scheme is resistant against unauthorized access from a single
user and against collusion attacks since ABE is inherently compatible with the TMN.

4.5. ABE for e-Health Applications


Secure Medical Data Sharing using IoT Sensors—The work in [76] proposed an
efficient medical data sharing scheme that caters for smart terminals with limited computing
power. Owing to user information leakage due to the attribute matching function, the use of
Sensors 2022, 22, 7567 22 of 50

attribute bloom filter (ABF) is proposed which hides the entire attributes in the anonymous
access control structure. To generate the ciphertext more quickly, the use of online/offline
encryption is proposed where the majority of the work needed in the encryption phase is
completed before knowing the exact message. Furthermore, in the case of an increase in
system users’ attributes, the proposed system does not need to be reinitialized, resulting
in improved efficiency. Although hiding the values of attributes protects user privacy
to a certain extent, even the names of attributes can leak some sensitive information.
To cater for this, the authors propose to hide the attributes in an access control structure.
For successful attribute assignment and gaining the secret key, both data owners and
users should register and be authenticated with the attribute authority. Due to the use of
pre-encryption technology, ciphertext is generated more quickly, which is well-suited for
terminals with limited computing power.
User Study and Evaluation for ABE Adoption in Hospitals—To study the integra-
tion of ABE in e-Health environments, the work in [77] conducted a study to identify use
cases and requirements, and to learn the integration of ABE in IT processes. Based on the
identified requirements through a focus group, an adaptive prototype implemented and
evaluated through a cognitive walkthrough with usability experts. The target is to identify
application scenarios and best-suited strategies to embed the useful features of ABE into
the daily routine of a hospital. The authors proposed an architecture that is adaptive and
matches the requirements of healthcare domain. The requirements derived from the focus
group are taken into account for the development of a user management and container
management (UMCM) endpoint, which deals with the authentication and authorization of
users and also the validation of claimed email addresses that serve as part of user identity.
The end users maintain a contact list and tags corresponding to identities with attributes,
where the client application takes care of the policy authoring process.

4.6. ABE for Smart Cities


ABE Utilization in Smart Cities Environment—The use of cloud storage systems
(CSS) generally lowers the capital and operating expenses, while guaranteeing high avail-
ability; however, there is also the risk of information disclosure to unauthorized entities.
The work in [78] presented an encryption scheme for urban sensing which addresses the
data storage concerns on the cloud while ensuring fine-grained access control by means
of ABE. The work focused on a non-hierarchical ABE scheme with a single trusted third
party (TTP), which generates decryption keys and provides them to users. The authors
also proposed a key revocation method whose efficiency is based on a convenient attribute
representation of the smart city, wherein IoT devices only execute the lightweight opera-
tions of symmetric cryptography. The proposed scheme also provides security against a
variety of adversaries including the honest-but-curious CSS, an external adversary capable
of eavesdropping traffic and compromising sensing devices, and a set of colluding users
waning to illegally gain more authorizations.

5. Identity-Based Encryption
IBE is public-key encryption wherein a user generates a public key from a known
unique identifier such as age or an email address or known location, and a TTP server
calculates the corresponding private key from the public key. As a result, there is no need
to distribute public keys before the exchange of encrypted information. A review of the
significant literature on IBE in terms of applications for the last decade is provided in Table 3.
In the following, we review some works on the application of IBE in the IoT domain.

5.1. IBE for IoT Applications


Identity-based Authentication for IoT—The work in [79] proposed an identification
and authentication scheme for heterogeneity in terms of format, type and semantics for IoT
networks based on a software-defined network (SDN) [144]. The central SDN controller
translates the different technology-specific identities from the different silos into a shared
Sensors 2022, 22, 7567 23 of 50

identity based on virtual IPv6 addresses and authenticates devices and gateways through
a hierarchical and distributed deployment. The key establishment method is based on
elliptic curve cryptography (ECC) [141], while the root controller public key is assumed to
be hardcoded in each thing when manufactured. The authors provided details of all the
phases involved in the process of authentication, including public key certification, thing
registration and the authentication phase. The evaluation of the proposed scheme shows
that it is safe against masquerade, man-in-the-middle and replay attacks.
IBE for Post-Quantum Secure IoT—The authors in [80] demonstrated that IBE has
become practical for a range of embedded devices for the Internet of Things. The authors
explored how different security levels and parameters for the underlying ring learning
with errors (RLWE) assumption [145] will affect the implementation of IBE encryption
and decryption in a range of typical IoT devices. Furthermore, the authors also proposed
parameters for a pair of security levels that render an efficient IBE implementation via the
number theoretic transform (NTT) [146] possible. In particular, the authors considered an
ARM Cortex-M0 and an ARM Cortex-M4 for low-cost microcontrollers and a Xilinx Spartan-
6 for FPGA implementation. The implementation results provided a detailed analysis
of the applied techniques and algorithms, comparing the cycle counts and read-only
memory (ROM) consumption, especially for the processes of encryption and decryption.
The results suggested that IBE is practical for IoT devices as the performance is only slightly
lower than the performance of RLWE Encrypt, with the added benefit of IBE’s simplified
key management.
IBE for Anonymous Communication in IoT—The article [81] proposed a scheme
to ensure the privacy and anonymity of a communication system based on anonymous
IBE, protecting the users’ metadata. In the proposed scheme, a user can send and receive
the ciphertext in the same round of communication, which apart from causing sufficient
confusion for the adversary, also results in improved efficiency. This work addresses the
security goal of anonymous communication in three aspects, consisting of the message
security, as well as the anonymity of both the sender and recipient. All the users follow a
slotted time format, where the operations of encryption, upload, download and decryption
are undertaken within pre-specified time slots. One downside of the proposed scheme
stems from the fact that every user is required to send at least one message in each round
of communication whether they want to have a communication or not.

Table 3. Significant IoT-related literature for IBE in the last decade.

Ref. Year Author Significance Publisher


[147] 2020 X. Jia et al. IBE-Based Authentication for IoT MDPI
[148] 2020 N. Farjana et al. IBE for Security in Fog Springer
[84] 2017 A. Karati et al. IBE for Industrial IoT IEEE
[149] 2017 J. Y. Kim et al. Secure Management of IoT ACM
Lightweight IBE for Post-
[80] 2017 Tim Güneysu et al. IEEE
Quantum IoT Security
[82] 2016 Y. Mao et al. Fuzzy IBE for Secure IoT Elsevier
[150] 2013 F. Li et al. Integrating WSNs in IoT IEEE
[141] 2012 B S Adiga et al. IBE for M2M Communication ACM
[79] 2016 O. Salman et al. IBE-Based Authentication for IoT IEEE
[81] 2018 L. Jiang et al. IBE for Anonymous IoT Communication Hindawi
[83] 2016 S. Sankaran IBE-Based IoT Security Framework IEEE

Fuzzy IBE for Secure IoT—The work in article [82] presented a fuzzy IBE scheme that
is secure in the full model (i.e., the adversary can commit the target identity at any time)
without random oracles, and at the same time, has a tight security reduction and short
public parameters. Under the tight security reduction, the scheme does not need to enlarge
Sensors 2022, 22, 7567 24 of 50

the key and ciphertext size to obtain an increased security level. Due to these efficiencies of
the proposed scheme, the authors believe that the scheme is more suitable for secure IoT
communications. The authors also proved the semantic security of the proposed scheme
under the modified bilinear Diffie–Hellman exponent (2-MBDHE) assumption, which is
adapted from some of the previous [151] security constructions.
IoT Security Framework Based on IBE—The paper [83] proposes a lightweight se-
curity framework for IoTs using identity-based cryptography (IBC). The authors devel-
oped a hierarchical security architecture for IoTs, and provided protocols for secure IoT
communication such as for intra-domain and inter-domain communication, mutual au-
thentication and revocation. In contrast to prevalent mechanism, the authors envisioned
hierarchical topologies for IoT that can adapt to deployment at a massive scale. For the
intra-domain communication, the authors adapt the Sakai, Ohgishi and Kasahara (SOK)
scheme [152] for non-interactive key agreement. On the other hand, the mutual authenti-
cation scheme is a hybrid key management mechanism that uses IBE to set up pairwise
symmetric keys between s and gateway nodes, and operates in bootstrapping, operational
and post-operational phases. The scheme preserves data integrity by computing a message
authentication code (MAC) on the pairwise symmetric key to provide an increased level of
security, and it is shown that the scheme is scalable and incurs less overhead than traditional
public key-based cryptography.
Identity Signcryption for Industrial IoT—The authors in [84] presented an identity-
based signcryption (IBSC) scheme using bilinear pairing for IIoT deployment. After study-
ing two hard problems named modified bilinear Diffie–Hellman inversion (MBDHI) and
modified bilinear strong Diffie–Hellman (MBSDH) under polynomial time intractable
assumptions, the authors demonstrated through a rigorous security analysis that their
scheme is provably secure based on the intractability of decisional-MBDHI and MBSDH
assumptions. The scheme works on a multiplicative group elements, and proves its re-
sistance in the formal security structure. The performance of the proposed scheme is
illustrated considering the computational cost and the communication cost. Although the
scheme is efficient, the cost during signcrypted IIoT data generation and verification can be
reduced by eliminating the pairing overhead. Furthermore, the scheme does not support
any revocation facility.

5.2. IBE for Smart Cities and Homes


IBE for Smart Homes—The work in [85] addressed the key challenges of the manage-
ment flexibility and efficiency of computation and communication in providing a smart
home system with confidentiality services. The authors proposed a lightweight encryption
scheme for smart homes called lightweight encryption for smart home (LES), which is
based on stateful IBE [153] combining IBE and stateful DH encryption scheme, encouraged
to be used for resource-constrained devices. As an identity-based scheme, the public keys
used for the scheme are merely identity strings, hence they do not need any certificates.
The proposed scheme separates key encryption and data encryption in such a way that
key encryption is performed less frequently. The authors provided a security definition
for LES, and analyzed the security of the proposed scheme showing that it is IND-CPA
secure in the random oracle model. The computational efficiency in the scheme comes from
using the state, which is calculated only once between a smart home device and a user per
communication. Numerical evaluation shows that in comparison to a stateless version of
IBE, the encryption schemes accelerate nearly 10 times in the proposed scheme.
IBE for Smart City Information System—In the work of [86], the authors propose a
generic broadcast encryption scheme which is identity-based, and is from a generic anony-
mous IBE construction, providing confidentiality and anonymity simultaneously against
chosen ciphertext attacks under DBDH assumption. The scheme also utilizes the strong one-
time security notion for signature scheme (this captures the intuition that an adversary can
request a signature σ on any single message m one time, after which the adversary should
not be able to forge a pair of valid signature on another message; furthermore, the strong
Sensors 2022, 22, 7567 25 of 50

security requires that the adversary cannot generate a valid, but different, signature σ0 on
the same message m). The proposed generic identity-based broadcast encryption (IBBE) has
a desirable property that its public parameter size and private key size are constant and that
its decryption cost is independent of the number of receivers. Furthermore, the ciphertext is
linear with the size of the receivers. Due to these characteristics, the proposed construction
is deemed to be appropriate for smart city information systems. The security model of the
proposed scheme builds on the IND-CCA (indistinguishability under chosen-ciphertext
attacks), ANO-CCA (anonymity under chosen-ciphertext attacks) and WROB-CCA (weakly
robust against chosen-ciphertext attacks) models. However, it should be noted that the
construction is proven in the random oracle model.

5.3. IBE for Healthcare and Cloud Applications


IBE-based encrypted traffic analytic for cloud computing—The work of [87] used
the concept of IBE with an equality test (IBEET) to propose a scheme for malware detection
and the verifiability of encrypted data. The flow metadata, which includes the inbound and
outbound bytes and packets along with the source and destination ports and flow duration
in seconds, is used to compute a trapdoor for the detection of malware in encrypted
data. The proposed technique builds on the work of [154] to allow the trapdoor function
generation based on the flow metadata and byte distribution of encrypted data, where the
metadata is sent to a remote MAP (malware analytic provider) server for verification. Based
on the decision of the MAP server, which relies on the machine learning classifier-generated
matches for a standard handshake scheme, the ciphertext is either forwarded to the cloud
server for storage or rejected. Thus, the MAP server is presumed to possess the database
records of standard handshake parameters and generated signatures between a client and
the server.
Data Sharing in e-Healthcare Systems—The paper [88] proposes a secure data sharing
scheme for e-healthcare systems based on IBE with signatures to enable data sharing based
on a user’s public identity. The scheme also ensures that data sharing is encrypted and
authenticated such that only authorized uses are allowed to exchange any data. The data
sharing is encrypted using AES, and authenticated using the BLS signature scheme (Boneh–
Lynn–Shacham signature scheme that allows users to verify that a signature is authentic) [155].
The proposed protocol is divided into four algorithms, namely KeyGen, Extract, Encrypt
& Sign, and Verify & Decrypt. The scheme only differs from original IBE scheme in
the incorporation of AES, ensuring encrypted health information and verified recovered
health data. The authors also showed the practicality of the proposed system through the
computation times of encryption and signing, and decryption and verification on different
platforms including the Arm Cortex Processor.
Data Sharing for Mobile Healthcare Social Networks—The article [89] presented a
secure data sharing and profile matching scheme for the mobile healthcare social networks
(MHSNs) in cloud computing. The users are able to outsource their encrypted health
records to cloud storage with an identity-based broadcast encryption technique, and share
them with a group of doctors in a secure and efficient manner. The authors also present an
attribute-based conditional data re-encryption construction which—should the pre-defined
conditions in the ciphertext be satisfied—allows doctors to authorize the cloud platform to
transform the ciphertext into a new ciphertext for any specialists that are authorized by the
patient. The scheme also provides a profile matching mechanism in MHSN based on IBE
with an equality test [154], where users can find friends and achieve authorization for the
encrypted health records, with resistance against a keywords guessing attacks. The scheme
is shown to be collusion-resistant against colluding doctors, while the scheme is also a
one-way chosen-ciphertext-secure against a chosen identity attack.

5.4. IBE for Blockchain Privacy and Authentication


IBE and Blockchain-Based Authentication—The paper [90] proposes an improved
key distribution scheme by integrating the techniques of blockchain [156] into the secure
Sensors 2022, 22, 7567 26 of 50

key issuing of IBE. The scheme implements mutual identity authentication between the
communicating parties through integrating blockchain in the key issuing process. Users are
treated as nodes of a blockchain, and are divided into the roles of supervision, production
and protection nodes. The authentication process consists of key issuing and identity
authentication to establish a secure communication channel. Furthermore, the role of the
nodes are changed from time to time to effectively reduce the attack probability, where
the change in roles is carried out through a consensus mechanism using the proof of vote
(PoV). To prevent any network attacks, the scheme employs timestamps, random numbers
and a hash algorithm in the process of identification. The analysis shows that the proposed
scheme can effectively resist network replay attacks and DoS attacks, guaranteeing integrity
and authenticity.
Data Privacy for Permissioned Blockchains—The authors in [91] presented a practi-
cal scheme by adding IBE to blockchain systems, effectively improving the data privacy
for non-transaction applications. The proposed approach has a high security level which
can prevent both disguised and passive attacks, offering functionality, effectiveness and
practicality in many applications for non-transactional scenarios. For many applications
related to the real-world economy, such as quality tracking, copyright and supply chain
finance, only data transfer is mainly needed which means that operations in consensus
are primarily the consolidation of data. The authors first constructed a simple ID-based
encryption privacy protection scheme that can be well applied to non-transaction scenarios
in permissioned blockchains. In the proposed scheme, a user’s public key is generated
through their identity, which simplifies the management and distribution of certificates
in traditional PKI systems. Any new user joining the permissioned blockchain can obtain
the encrypted key directly through their unique identity, which offers convenience in
comparison to PKI systems.

5.5. IBE for Keyword Search and Biometric Verification


Dual Trapdoor IBE with Keyword Search—The work in [92] addresses an efficient
search over encrypted data where previous schemes focus on supporting efficient and
complex queries for the private key holder, while the authority cannot efficiently search the
encrypted data. The authors introduced a new primitive named dual trapdoor identity-
based encryption with keyword search (DTIBEKS), where the authority can use a peculiar
means of producing an additional trapdoor allowing it to search for any identity’s encrypted
data. The security of the proposed scheme is proven without random oracles, and is based
on the methodology of dual system encryption [157]. The proposed scheme can be easily
transformed into identity-based encryption with fuzzy keyword search by adopting a
method similar to [158]. In the proposed primitive, two forms of trapdoors are considered,
namely ‘identity-keyword trapdoor’ and ‘keyword trapdoor’, where the keyword trapdoor
enables the cloud server to search for which data contain a given keyword regardless of
who owns the data.
Biometric Identity Verification—The article [93] described the first generic construc-
tion for multimodal biometric IBE considering two distance measures at the same time.
In order to have a high recognition rate, and thus an increased possibility of decryption—
even in the case of white noise—the proposed construction is based on two different
biometric IBE systems encoding the same message. The scheme combines a fuzzy IBE-type
scheme, which allows the use of biometric attributes as the identity instead of an arbitrary
string, and the distance-based encryption (DBE) [159] with minimum overhead in terms
of public parameters, ciphertext and private key size. Here, the authors described an IBE
scheme denoted as ordFIBE, which is restricted for biometrics that can be represented as an
ordered/grouped set of features. The proposed system can also be implemented as an ABE
scheme, since the attributes of users can be grouped/ordered. If some of the attributes at
the sender’s side do not match those on the receiver side, then due to the error-tolerance of
the scheme, the receiver is still able to decrypt the ciphertext. The security of the scheme
Sensors 2022, 22, 7567 27 of 50

is analyzed under both the ROM and in standard model, and the efficiency is improved
using an online/offline encryption scheme.

6. Searchable Encryption
SE allows a user to encrypt and send a message to an information receiver who can
reassign it to a third party for searching the encrypted message for keywords without
compromising the security of the encrypted message contents. A review of the significant
literature on SE in terms of applications for the last decade is provided in Table 4. In the
following, we review some works on the application of SE in the IoT domain.

6.1. SE for Fog and Cloud Applications


Probably Secure SE for Cloud Storage—The work in [94] addressed searchable en-
cryption in cloud storage systems. The work first analyzed the security of a multi-user
searchable encryption scheme presented by Wu et al. in [160] and it is shown that this
scheme does not satisfy the invisibility of trapdoors. More precisely, it is shown that since
the test algorithm can be executed by anyone, the challenger can guess the keyword trap-
door in at most two tests. Furthermore, the authors proposed a probably secure multi-user
multi-keyword searchable encryption scheme, expanding the work presented in [161],
which is a file-centric multi-keyword aggregate keyword searchable encryption scheme
for IIoT, but suffers from the shortcoming of a data owner losing control over data due
to the encryption execution at the same time. The presented scheme solves the problem
of [161] by satisfying the indiscernibility of trapdoors against adaptive chosen keywords in
the random oracle model.
Cross-Lingual Multi-Keyword Search over Encrypted Data—The authors in [95]
proposed a cross-lingual multi-keyword rank search (CLRSE) scheme which eliminates the
language barriers and achieves semantic extension using the Open Multilingual Wordnet
(OMW) [162]. The authors explored the problem of cross-lingual multi-keyword ranked
search over encrypted cloud data, where the cross-lingual target query is built upon OMW.
Through flexible keyword and language preference settings, as well as the automated
calculation of preference scores for extended keywords for the semantic, the proposed
scheme achieves intelligent and personalized sorting search and improves the accuracy of
top-k search results. The proposed CLRSE scheme operates in different phases, including
initialization, document outsourcing, cross-lingual query construction, trapdoor generation
and top-k rank search. The security analysis of the scheme considers the confidentiality of
the outsourced data, unlinkability of the query and privacy preservation as the key aspects.
Attribute-Based SE for Reliable Smart Grid—The paper [96] introduced an attribute-
based online/offline searchable encryption scheme where the encryption and trapdoor
generation algorithms are separated into two different phases, and the message encryption
and attribute control policy are performed in the offline phase. The authors combined the
online/offline encryption scheme of [163] and the searchable scheme of [164] to propose
this scheme. Based on the user’s attributes, the scheme provides secure data access to
authorized users while protecting unauthorized users from accessing the data. The scheme
thus achieves the properties of secure searchable ciphertext privacy, keyword privacy
and a secure data access control. The proposed scheme offers the benefit of reducing the
computation cost utilizing the online/offline phases. The proposed scheme is shown to be
secure against both chosen plaintext and chosen keyword attacks.
Fog-Based Healthcare in IoT Networks—The work in [97] proposed a fog-supported
hybrid infrastructure where distributed fogs are deployed between IoT devices and cloud
servers, providing temporary data storage, computation and analysis and network services.
The authors designed a keyword searchable encryption scheme in the healthcare-related
IoT–Fog–Cloud architecture, which ensures the security requirement that both data and
keywords are protected from the cloud and the fog. The authors designed a fine-grained
access control framework wherein a user should obtain their query capability authorization
from a trusted authority and the fog through checking their attributes. To overcome the
Sensors 2022, 22, 7567 28 of 50

issue of resource-constrained IoT devices, the majority of the heavy computations of the
proposed scheme are transferred to the fog and cloud, whereas only a small part is reserved
for the users. The security analysis of the scheme demonstrates it to be secure under
IND-CK-CCA attacks and to satisfy the trapdoor indistinguishability.
Dynamic SE with Privacy Protection—The authors in [98] proposed a scheme to in-
crease efficiency where the cloud is used to generate and store IoT-aggregated files. Forward
privacy is achieved through a sublinear search efficiency by keeping an increasing counter
for each keyword at an IoT gateway. The proposed scheme achieves forward privacy
through the combination of locally stored state information and lightweight cryptography,
whereas the cloud server is unaware of whether a newly added file consists of certain
keywords except when the keyword is queried again. The proposed approach encrypts the
combined increasing counter and the keyword together, making the server unable to link
the keyword with the newly added file to any keywords in the cloud without knowing the
secret key. In addition, a secure pseudo-random function is used to hide the connections
with the generated tuples with the consecutive counter values.

Table 4. Significant literature for SE in the last decade.

Ref. Year Author Significance Publisher


[104] 2020 K. Zhang et al. Lightweight SE for Industrial IoT IEEE
[165] 2018 J. Ning et al. Analysis of Passive Attacks on SE IEEE
[166] 2017 G. S. Poh et al. Detailed Review of SSE Schemes ACM
[13] 2017 R. Zhang et al. SE for Healthcare Clouds IEEE
[102] 2018 L. Wu et al. SE for Cloud-Based IoT Elsevier
[101] 2017 M. Ma et al. Certificateless SE for Industrial IoT IEEE
[12] 2016 W. Yunling et al. Survey on Main Techniques of SE Springer
Survey on Provably Secure SE
[167] 2014 C. Bösch et al. ACM
Schemes
Dynamic SE Scheme for Small
[168] 2013 E. Stefanov et al. Cryptology
Leakage and Efficiency

6.2. SE for Secure Data Sharing


Searchable Encryption for Data Sharing—The paper [99] presented a scheme that
enables authorized users to retrieve encrypted documents and verify the search results
using a single aggregate key. The semi-honest-but-curious server is considered as a compu-
tationally bounded adversary, who may execute only a fraction of honest search operations.
In the proposed verifiable searchable encryption with aggregate keys (VSEAK) scheme,
the search keys and verification tokens are aggregated into one single key, avoiding the
communication of massive key sets. The user is able to use the aggregate key to not only
generate a single trapdoor as a keyword search query, but also to verify whether the server
just conducts a part of computing for the search request. Thus, the data owner only needs
to distribute a single aggregate key to other users to selectively share both search and
verification privileges over their document sets. A majority of the user’s computations and
storage are confidentially passed to the cloud server. Furthermore, an advanced scheme
extending the work to multi-owner settings is also given which further reduces the users’
storage overheads.
Combining ABE and SE for Data Sharing—The authors in [100] proposed a protocol
based on the combination of SSE [169] and ABE [18] such that the main advantages of both
are used. While the symmetric key needed for decryption is protected via a CP-ABE scheme,
a user can directly search over the encrypted data through an SSE scheme. The considered
threat model assumes that hardware integrity, physical security, network infrastructure
and cryptographic security are all functioning in their standard way. Multiple users can
efficiently and securely share files through the proposed protocol, and it can be considered
Sensors 2022, 22, 7567 29 of 50

as an independent contribution to the field of hybrid encryption since it combines both


SSE and ABE schemes. In the proposed design, the authors separated the revocation
functionality from the actual ABE scheme by proposing to use Intel’s Software Guard
Extensions (SGX) to host a revocation authority in a trusted execution environment.

6.3. SE for IoT Applications


SE for Industrial IoT—The article [101] proposed the design of a secure channel-free
certificateless searchable public key encryption with a multiple keywords scheme for IIoT
deployment. The system model is composed of four standard entities including a cloud
server, a data owner, a data receiver and a key generation center (KGC). The security of
the proposed scheme is demonstrated in the random oracle model against two types of
adversaries, where one adversary is given the power to choose a random public key instead
of any user’s public key, while the second adversary is allowed to learn the system master
key, where the security model is based on the indistinguishability of the chosen keyword
attacks under the intractability of the standard BDH problem. The utility of this scheme
is also demonstrated through its performance in terms of computational efficiency and
communication cost.
SE for Cloud-Based IoT—The work in [102] proposed a secure and efficient searchable
encryption protocol using the trapdoor permutation function. The protocol is designed for
cloud-based IoT, and compared to existing protocols, it incurs a lower computation cost
at the expense of a higher storage cost. The protocol achieves inside keyword-guessing
attacks (KGAs) resilience, forward privacy and file-injection attack resilience. This protocol
uses neither bilinear pairing operation nor map-to-point hash operations, while the search
time of the protocol is only dependent on the database update times. The system model is
comprised of only three entities, namely the data sender (DS), data receiver (DR) and the
cloud server (CS) where, apart from the traditional roles of DR and CS, DS is responsible for
initializing the system, creating keyword indexes for files, and encrypting and uploading
data. The computation and security parameters are compared to existing works based
on bilinear pairing operation, the map-to-point, exponentiation, keyed hash function and
scalar point multiplication.
Multi-user SE for Home IoT System—The authors in [103] proposed a multi-user
searchable encrypted voice scheme for voice systems based on home IoT systems, which
enables users to send their voice commands to servers and retrieve each other’s voices.
The proposed scheme employs long short-term memory (LSTM) networks algorithm to
convert one user’s voice into another in order to improve the performance for multi-user
retrieval. For enhanced security, the authors adopted an obfuscation function to hide the
feature of the voice and DH algorithm to exchange parameters between users. The voice is
divided into answers and queries where the answer part is encrypted and the query part is
converted into features. The proposed scheme uses AES for encryption and decryption,
where the small calculation overhead and suitability for large data blocks are the advantages
while the key needs to be negotiated in advance and transmitted through a secure channel.
The use of LSTM improves the precision and recall rate of the search while, to prevent
the restoration of voice features, the obfuscation function helps process the mel frequency
cepstral coefficients’ (MFCCs) features.
Lightweight SE for Industrial IoT—The paper [104] proposed a lightweight search-
able attribute-based encryption scheme that can significantly reduce the computing cost of
IoT devices with the provision of multiple-keyword searching for data users. The proposed
scheme is also extended to multi-authority scenarios to effectively generate and manage the
public/secret keys in the distributed IoT environments. The proposed scheme is motivated
by Green’s scheme [170] and Yang’s work [171], where the multi-keyword search in a
distributed IoT environment was adopted. The proposed schemes offer the advantages of
flexible access control, data confidentiality, lightweight decryption, accurate data retrieval
and scalable key management. One of the scheme’s strengths lies in the preservation of
the constant size of public parameters which do not vary with the number of attributes.
Sensors 2022, 22, 7567 30 of 50

Although the ciphertext of both the schemes is larger than most of the existing schemes,
it does not affect the user experience since the ciphertext uploaded to the cloud does not
require extra storage at IoT devices.

6.4. SE for Blockchain Privacy


SE for Permissioned Blockchains—The work in [105] built on the premise that ex-
isting approaches to search queries assume that the cloud server is “trusted-but-curious”
or “honest-but-curious”, and to ensure greater levels of security, it should be considered
malicious. The authors proposed an amalgamation of SE and permitted blockchains such
that the client can place complete trust in the cloud server and the services it has to offer.
The work presents a privacy-preserving framework that facilitates keyword search over
the encrypted data stored on the blockchain network. Based on probabilistic trapdoors to
resist distinguishability attacks and ensure high levels of security and privacy, the authors
presented a privacy-preserving SE framework that facilitates the search over encrypted
data stored on the permissioned and distributed ledger, i.e., hyperledger fabric [172], where
the search over the blockchain is based on the SE scheme presented in [173]. Since the
index table by default reveals the frequency of occurrence of an encrypted word within a
document leading to a statistical analysis attack, the proposed algorithm masks these values
to mitigate the risk of an attack and only reveals the presence/absence of an encrypted
keyword in a document.
SE for Health Record Sharing—The authors in [106] proposed a blockchain-based
searchable encryption scheme for EHRs, where the index for EHRs is constructed through
complex logic expressions and stored in the blockchain so that a data user can utilize these
expressions to search the index. This gives the data owners full control over who has
access to their EHRs, and the integrity and traceability of the data index is ensured through
blockchain technology. In the proposed scheme, the real EHRs are stored on a public cloud
server in encrypted form and users must be authenticated by the data owner to access
these records. The scheme supports the complex query that allows healthcare agents to
request permission to access and interact with the medical records, where the application
uses a smart contract based on Ethereum [174]. The proposed scheme only focuses on the
query accuracy, while it does not consider access to the data records. However, this can be
achieved through existing file sharing schemes such as those based on ABE for fine-grained
access control.

6.5. SE for Neural Networks and Geo-Referenced Data


Encrypted Searchable Neural Networks—The work in [107] proposed interpretable
encrypted searchable neural networks to explore probabilistic query, balanced index tree
construction and an automatic weight update in an encrypted cloud environment, resulting
in an intelligent SE model. The probabilistic learning was used to obtain search ranking
for searchable index, and a probabilistic query is performed based on the ciphertext index,
which significantly reduces the computational complexity. More precisely, apart from the
initial weight index generated by data owners, all the other automatic update operations
are completed in an encrypted cloud environment, resulting in a lower computation, com-
munication and storage overhead. The authors proposed a combination of adversarial
learning [175] and automatic weight update in response to a user’s query of the latest
dataset. Furthermore, to enable automatic weight update, a combination of backpropaga-
tion neural network [176] and Hopfield neural network [177] was proposed. Based on the
neural network, the scheme sorts the network and employs probabilistic learning to obtain
the query ranking for an encrypted searchable index.
SE for Geo-Referenced Data—The authors in [108] presented different techniques
to achieve range queries in SE, enhancing performance and reducing information leak-
age. The focus is on the case of one and two-dimensional range queries to an encrypted
geo-referenced database in a client–server architecture. The authors provide techniques
for SE to reduce the communication and computational costs of range queries based on
Sensors 2022, 22, 7567 31 of 50

over-covers, and to reduce information leakage under a symmetric key cryptographic


scheme. The problem of searching encrypted data in the context of project CLARUS [178] is
considered, which originally provides a framework for user-centered privacy and security
in the cloud. For all the considered SSE schemes, the OXT scheme by Cash et al. [179] was
chosen due to its suitability for static databases and highly efficient Boolean search causing
moderate and quantifiable leakage to the server. In the considered data model, the client
delegates an encrypted version of its dataset to the server, and afterwards, it retrieves a
subset of the outsourced dataset through queries where query locations are considered to
be rectangles.

7. Predicate Encryption
PE is a novel cryptographic primitive that provides accurate fine-grained access to
encrypted data. In contrast to traditional public-key cryptographic systems, it has been
widely adopted in point-to-point communication systems. A cryptographic system such as
PE discerns the justification of information only being available to the users with access
rights, providing more fine-grained control over the ciphertext. A review of the significant
literature on PE in terms of applications over the last decade is provided in Table 5. In the
following, we review some works on the application of PE in the IoT domain.

7.1. PE for Fog and Cloud Applications


Privacy-Preserving Search in Cloud Storage—The article [42] proposed a variant of
symmetric predicate encryption which provides controllable privacy-preserving search
functionalities including revocable delegated search and un-decryptable delegated search.
These functionalities enable the owner of cloud storage to easily control the lifetimes and
search privileges of cloud data. The proposed scheme is based on the work of [41], and in-
troduces two new features including revocable delegated search and an un-decryptable
delegated search. Here, the revocable delegated search makes it possible for the secret key
owner to control the lifetime of the delegation, while due to the un-decryptable delegated
search, a delegated person cannot decrypt the returned matched ciphertexts despite having
the delegated search privilege. The considered system has three main roles, namely the
secret key owner who wants to store sensitive data in the cloud and controls the encryption;
a cloud storage service provider that stores data in the form of ciphertexts; and a delegated
person who can obtain and decrypt the returned matched ciphertexts. The security of
the proposed scheme is proven in detail through semantic security, attribute hiding and
key confidentiality.
PE with Equality Testing in Cloud Computing—The work in [109] presented the
concept of attribute-hiding PE with an equality test by incorporating the notions of public-
key encryption with the equality test and PE. Building on the idea, the authors presented
an AH-PE-ET scheme that features constant pairing computations and minimal costs for
decryption and testing. In the proposed scheme, a data receiver can calculate a trapdoor
using their private key and deliver this trapdoor to an untrusted cloud server, who com-
pares the ciphertexts from one receiver to the other receiver’s ciphertexts. The information
about the provided trapdoor as well as the attributes associated with the ciphertexts are
not disclosed to the cloud server during the comparison. The proposed scheme enables the
cloud server to conduct an equivalence test on ciphertexts under various access policies.
The scheme supports attribute-hiding as well as a more expressive access control. The
authors also provide a rigorous comparison with existing ABE-ET schemes, in particular
with [180,181], in terms of storage and communication cost, computation cost, functionality,
security level and hardness assumption.
PE with Fine-Grained Search in Cloud Storage—The authors in [110] proposed an
efficient predicate encryption scheme and showed how to use it to implement a public
key encryption with fine-grained searchable (PEFKS) capability mechanism. Furthermore,
by combining PEFKS and PE into an integral encryption system, the authors are able
to propose a privacy-preserving framework supporting an efficient predicate encryption
Sensors 2022, 22, 7567 32 of 50

with fine-grained searchable capability. The proposed scheme is computationally efficient


since, for each attribute in the ciphertext and user’s key, there is only one group element
and for each attribute in the decryption algorithm, only one pairing operation is required.
The proposed PEFKS can not only search for the presence of multiple keywords in the
ciphertext, but it can also evaluate the logical relations of these keywords. The efficiency of
the proposed scheme is compared with the seminal works of [38,182], and shows that the
scheme achieves a higher efficiency.
Enabled/Disabled PE in Clouds—The article [111] proposed an enabled/disabled
predicate encryption scheme that provides time-release services and data self-destruction.
Given these characteristics, the receiver can set the readable and unreadable time of the
files to be sent to the receiver, where the receiver can only read the file after the readable
time. The structure of the file is destroyed after the unreadable time and the file then
becomes unreadable. The time-release and data self-destruction properties are integrated
with a predicate encryption that is based on the PE with the inner-product scheme of [183].
The proposed scheme can prevent the attacker from obtaining the ciphertext and performing
crypt-analysis using any form of attacks on the ciphertext after the disabled time. Based on
the proposed scheme, an extended scheme is also presented which, along with time-release
services and data self-destruction, provides long message encryption and an undecryptable
search. In the extended scheme, the length of the encrypted messages does not depend on
the order of the group and the cloud server can only obtain the matched ciphertexts after
the search.

Table 5. Significant IoT-related literature for PE in the last decade.

Ref. Year Author Significance Publisher


[184] 2021 Y. F. Tseng et al. Efficient PE for IoT IEEE
Attribute Hiding PE for Cloud
[109] 2018 J. Sun et al. IEEE
Computing
PE-Based Anomaly Detection in e-
[116] 2018 S. Xu et al. IEEE
Health
[114] 2017 C-I Fan et al. PE for OSNs IEEE
[110] 2016 X. A. Wang et al. PE-Based Search for Cloud Storage Elsevier
[111] 2016 S-Y Huang et al. PE for Clouds Elsevier
[113] 2016 W. Liu et al. Public-Index PE for Mobile Access Springer
PE-Based Controlled Search in Cloud
[42] 2013 C-I Fan et al. Elsevier
Storage

Data Preprocessing for Fog Privacy—The authors in [112] proposed a privacy-preserving


data preprocessing scheme for fog computing in 5G network security. Specifically, the scheme is
presented from the perspective of the quality of protection (QoP), aiming to preserve the
security service option learned from attributes and to enable fog nodes to supply different
levels of privacy protection services with different security demands from users. In the
presented scheme, the end users have the options to contribute a list of attributes for their
desired level of security protection. The proposed scheme intends to preserve the privacy
of user data, by enabling fog nodes to supply different levels of privacy protection services
with different security demands from users. The fog nodes are introduced to perform a
privacy-preserving data preprocessing scheme for QoP. End users will conduct predicate
encryption over these attributes, and fog nodes will provide the encrypted data with
an additional and enhanced protection service based on the output run by the predicate
utility function. The double-protected data will eventually be forwarded to and stored in a
remote cloud.
Sensors 2022, 22, 7567 33 of 50

7.2. PE for Social and Mobile Networks


Online/Offline PE for Mobile Access Control—The work of [113] proposed a general
online/offline framework to address the expensive algebraic operations in public index
predicate encryption (PIPE). The authors first proposed a generic transformation from a
large universe PIPE which is secure against a chosen plaintext attack to online/offline PIPE
under the same security model. To address the issue of generating a ciphertext without any
knowledge of the associated ciphertext attributes in the offline phase, the authors presented
a solution by identifying an attribute-malleability property in many LU-PIPE schemes.
It is shown that with public-malleability, the security of the resulting OO-PIPE can be
tightly reduced to the CPA security of the underlying LU-PIPE. Furthermore, the authors
designed a generic transformation for CPA-secure LU-PIPE to OO-PIPE secure against an
adaptive chosen ciphertext attack under the assumption that the underlying LU-PIPE has
the specific properties of attribute-malleability and public-verifiability. To circumvent the
issue of the online/offline mechanism implying forgery, the authors employed a universally
collision-resistant chameleon hash [185]. The encryptor can replace the randomly encrypted
ciphertext attribute in the offline phase with the target ciphertext attribute in the online
phase, while an attacker cannot make such malleation.
Multireceiver PE for Social Networks—The article [114] proposed a multireceiver
predicate encryption (MRPE) scheme that is tailored for the online social networks (OSN)
platform. In this scheme, the sender shares encrypted messages with a set of authorized
receivers who can decrypt them, whereas the OSN provider can retrieve commercial
keywords from the encrypted messages for advertisers, which improves the accuracy of
advertisement without revealing the contents of the messages. The public parameters are
defined by a third party, and the encryption process can be performed with a set of receivers.
Since the public parameters are independent of the receivers, the length of ciphertexts can
be compressed. Furthermore, the scheme allows each user to choose a part of their own
secret value, while sharing the same public parameters. Here, the OSN provider is capable
of finding corresponding keywords and producing customized advertisements.

7.3. PE for e-Health Networks and Authentication


Application of PE to Anonymous Authentication—The authors in [115] proposed an
extension of predicate encryption named ‘delegate predicate encryption’ (DPE), where the
user generates an encryption capability of a set of attributes, and then sends this capability
to an encryption proxy. Using this capability, the proxy can encrypt an arbitrary message
using these attributes without knowing anything about them. The proposed construction
also satisfies the property named delegation transparency to the decryptor, which states
that the receiver cannot tell whether a ciphertext is directly encrypted or via an encryption
proxy. Thus, the anonymity of the provider and the authentication rules are well protected.
The security requirement for DPE is defined by measuring the adversary’s advantage in
winning a game, which is based on an extension of the game presented in [38] by adding the
delegate encryption key query and a delegate encryption key corresponding to ciphertext
in the challenge phase.
Anomaly Detection in e-Health Networks—The paper [116] proposed a PE scheme
for anomaly detection in networks applied to e-Health applications. Apart from the
trusted authority, the system model consists of three distinct entities, namely a sender
(provider); a receiver (examiner) which examines the critical component of a packet by
validating the attribute vector with the predicate vector; and the malicious attacker, who
forges the sensitive attributes of the created packets and deliberately falsifies sender’s
packets with the contaminated elements. The contributions of the proposed scheme are
measured in terms of confidentiality, privacy, efficiency and anomaly detection. The major
contribution of this work comes from the use of the session key as a message in the
encryption operation of PE system, which achieves information privacy and efficient
cryptographic computation since, as compared to symmetric key encryption, here the
session key is not pre-shared between the communicating parties. A case study in the form
Sensors 2022, 22, 7567 34 of 50

of evaluating an e-Health communication network is provided, where the performance of


the proposed scheme is presented in terms of computational and communication overhead
as well as anomaly detection.

8. Functional Encryption
FE is a public-key encryption scheme with different decryption keys allowing a user
to learn specific functions of the encrypted data. The control that FE offers over which
functions are allowed to be computed on the data by which user immensely benefits the
data owner in multiple cases. A review of the significant literature on FE in terms of
applications for the last decade is provided in Table 6. In the following, we review some
works on the application of FE in the IoT domain.

8.1. FE for Data Sharing and Classification


Proxy Re-Cryptography for Cloud Data Sharing—Based on the work on proxy re-
encryption called deterministic finite Automata-based functional proxy re-encryption
(DFA-based FPRE) [186], the authors in [117] presented an outsourcing decryption scheme
to increase the flexibility of users by delegating their decryption rights to a semi-trusted
proxy. Based on the proposed construction, the decryption phase utilizes only one expo-
nential operation instead of 12 pairing operations of the original work of [186], resulting
in improved efficiency. This is due to the fact that the computation of bilinear pairings
was considered a prohibitively expensive operation [187]. Only the user who has a DFA
associated with their secret key can accept the key associated with the ciphertext and can
efficiently access the encrypted data through the help of a semi-trusted proxy.
Data Ordering using FE—The work in [118] proposed an improvised FE scheme for
encrypted data ordering that takes as input multiple ciphertexts and orders them at the
server site without compromising the data privacy. To achieve this, the authors formalized
an order function using multi-input FE with obfuscation. Although data ordering can
be achieved through order-preserving encryption (OPE) [188] and probabilistic predicate
encryption [38], these approaches suffer from data privacy and efficiency issues and are
not suitable for ordering operations at the server site. The proposed approach, MIFEO,
runs the order function on multiple ciphertexts, and arranges them in an ordered set of
ciphertexts. To use MIFOE in practical scenarios with existing cryptographic mechanisms, all
incoming ciphertexts must be extended by associating an additional layer of encryption.
Private Data Classification using FE—The authors in [119] used an instantiation of
IPFE to perform the classification of encrypted data. The proposed method utilizes the fully
secure FE for inner product functionality under the DDH assumption as given in [189].
Based on this, a multi-class prediction algorithm with encrypted input data is described.
More specifically, the data item over which the prediction must be made is encrypted.
From the encrypted data, integer inner products are extracted and are used afterwards to
produce the class of the input data item. In the context of ML algorithms, the inner product
can be viewed as a linear binary classifier. The learning process is kept secret and only
the linear classifier’s coefficients are shared with the authority. Apart from the servers
and users who have information to be kept secret but want to release classification results,
a third party called the authority is introduced which handles the generation of FE keys
and overlooks the process. The studied method ensures that the original image cannot be
found from the inner product values.

8.2. FE for Machine Learning Applications


Privacy-enhanced ML with FE—The work in [120] introduced open source cryp-
tographic libraries for FE. It presents, in detail, how FE can be used to build efficient
privacy-preserving machine learning models, and provides an implementation of three
prediction services that can be applied on the encrypted data. The paper addressed the
lack of implementations of practical FE schemes that enable computation over encrypted
data. Two full-fledged FE cryptographic libraries, named GoFE and CiFEr, are presented,
Sensors 2022, 22, 7567 35 of 50

which allow the library user to choose the underlying primitives when instantiating an FE
scheme. Here, GoFE is implemented in GO, while CiFEr is implemented in C and aims at
a lower level, possibly IoT-related applications. The three prediction services which are
implemented using the developed libraries consist of an online privacy-friendly predictor
of cardiovascular diseases, anonymous traffic heatmap service and image classification on
encrypted data.

Table 6. Significant IoT-related literature for FE in the last decade.

Ref. Year Author Significance Publisher


[190] 2015 P. Ananth et al. FE for Turing Machines Springer
[191] 2015 K. Wrona Military Perspective on Securing the IoT IEEE
[123] 2018 O. Stan et al. Tax Calculations Using FE IEEE
[124] 2020 Y-B Son et al. Energy Trading using Blockchain and FE MDPI
[125] 2019 J-H Im et al. Electricity Billing Using FE MDPI
[126] 2020 H. Cui et al. Outsourcing FE Using Blockchain IEEE
[129] 2015 D. Sharma et al. FE in IoT e-Health Springer
[117] 2016 H. Abdalla et al. FE for Public Cloud Data Sharing IEEE
[118] 2018 D. Sharma et al. Data Ordering with FE IEEE
[119] 2017 D. Ligier et al. Private Data Classification Using FE Springer
[120] 2019 T. Marc et al. Private ML Using FE Springer
Privacy-Preserving Federated Learning
[121] 2019 R. Xu et al. ACM
using FE
[122] 2019 R. Xu et al. Training NNs with Encrypted data IEEE

Privacy-Preserving Federated Learning—In general, approaches that offer privacy


guarantees incur a large number of communication rounds, substantially increasing the
training time for FL systems. The authors in [121] proposed an approach for privacy-
preserving FL employing a secure multi-party computation protocol based on FE, where
a differential privacy mechanism is employed that defines a protocol from a multiparty
FE scheme to mitigate the risk that curious aggregators and colluding participants will
infer private information. The authors adopted the MIFE scheme of [192] with some
modifications due to its computational efficiency. The approach also demonstrates a
solution to the dynamic participant group issue, showing robustness to participant dropout
or addition. To benchmark the performance, a convolutional neural network (CNN) was
trained with the same topology as in [193] to classify the MNIST dataset of handwritten
digits [194]. The evaluation results show that it can reduce the training time by 68% and
the data transfer volume by 93% on average while providing a similar model performance
and privacy guarantees as some existing approaches.
Training Neural Networks over Encrypted Data—In the context of ML networks, it
is beneficial to have a well-designed privacy preserving framework that does not require
cloud and data owners to reveal their training models or information on the sensitive data.
The work of [122] addressed this scenario where neural networks are trained over encrypted
data without the overhead involved with interactive communication protocols, while
supporting predictive analytics in a privacy-preserving way. The authors also constructed
an FE scheme for basic arithmetic computations, termed FEBO, to support the requirements
of the proposed approach. The intermediate data are not ciphertext in the hidden layers of
the model, which intuitively indicates that the proposed approach can be expected to be
more efficient than HE-based schemes. It should be noted that for training scenarios in ML,
the HE-based approach does not allow the server to learn the prediction result, which the
FE-based approach does.
Sensors 2022, 22, 7567 36 of 50

8.3. FE for Smart Cities


Tax Calculations in Smart Cities—The work in [123] investigated how Inner-Product
FE (IPFE) [189] can enable the design of a tax calculation system with built-in privacy.
Based on FE, the authors proposed a new private-by-design taxation service for smart
factories. They also proposed the application of this general approach for the use case
of carbon tax where instantiations and experimental results under DDH and decision
composite residuosity (DCR) assumptions are presented. The authors presented a carbon
tax model for industries, taking into account the different fuel sources for the electricity
they use, while keeping the amount of emissions that are produced private. The system
architecture consists of the smart factory whose tax is calculated, a tax service entity in
charge of the service proposing the taxation, and a qualified authority who not only is
responsible for setting up the whole taxation strategy but also serves as the encryption
key manager. The authors provided an IPFE construct based on [189] showing that for
the subject computation of carbon tax, the inner-product primitive is sufficient since the
assumed model is linear.
Energy Trading in Smart Grids using FE—The authors in [124] proposed a peer-
to-peer energy trading system on blockchains where the bids are encrypted and peer
matching is performed on the encrypted bids by an FE-based smart contract. The system
guarantees that the information encoded in the encrypted bids is protected but the peer
matching transactions are performed by the nodes in a publicly verifiable manner through
smart contracts. The proposed P2P energy trading system is based on a private Ethereum
blockchain. The authors focused on achieving two goals, namely the transparency of the
peer matching process and the confidentiality of the matching information. The system used
the practical function hiding IPFE proposed in [195]. The prosumers remain anonymous
to each other whereas the utility company knows their identity for accounting and billing
purposes. Furthermore, the matching peers cannot repudiate their bids after the matching
is complete. The feasibility of the proposed scheme is verified by implementing a prototype
involving smart meters.
Electricity Billing Using FE—Detailed power consumption data raise serious privacy
concerns since personal data can be inferred from the energy usage profiles measured by
smart metres. The article [125] proposes a privacy-preserving electricity billing method that
does not sacrifice data quality for privacy, based on a novel use of FE. The proposed scheme
is based on the scheme of [195], which develops on the function-hiding inner product
encryption similar to the work in [196], and allows a smart metre to send the provider
all of the measured data with full granularity and without privacy leaks. The smart
metre encrypts the measured consumption and sends them to the electricity provider, who
possesses a restricted decryption key, using which it can obtain the total consumption.
The proposed system does not require any special purpose hardware and can be realized
through a mere software update of the smart metre. Furthermore, it does not render the
previous methods obsolete; rather, it can be combined for advanced services.
Decryption Outsourcing using Blockchains—Since most FE schemes are built from
bilinear pairings for which the computation is very expensive, a major issue in most FE
schemes is efficiency. The paper [126] aims to design an FE with payable outsourced
decryption (FEPOD). Leveraging the transactions involving cryptocurrencies supported
by the blockchain technology, the payments in the FEPOD scheme are achieved through a
blockchain-based cryptocurrency. This enables the data owner to pay a third party who
correctly completes the outsourced decryption. However, there is always the issue of
fairness between the user and the proxy, i.e., the user may refuse to pay even if they obtain
a valid result. The proposed work is different from the works presented in [197] and [198]
where [197] presents a fair exchange protocol to enable the exchange of a cryptocurrency
payment for a receipt, whereas [198] addresses the need to integrate the FEOD scheme
into the Bitcoin platform. The authors proposed a notion of FEPOD which allows anybody
to check the correctness of the answer for the outsourcing computation task provided by
Sensors 2022, 22, 7567 37 of 50

an untrusted third party such that the payment can be processed through a blockchain-
based cryptocurrency.
FE for UAV-Integrated Heterogeneous Networks—The work in [127] proposed the
use of FE in UAV-enabled HetNets to secure data against intrusion attacks. The process
of implementing FE is proposed in two phases: first between UE and macro base station
(MBS) and second between MBS and UE through UAVs. The work mainly focuses on the
activation of an intrusion monitoring process and attacker ejection. Furthermore, a Bayesian
game model was proposed to accurately detect the attacks with low overhead. Following
the standard construction of FE, the work mainly proposes to secure the communication
between the three parties, although no concrete construction is provided, and the security
validation is proposed to be conducted through the AVISPA tool [199].

8.4. FE for Biometric Authentication, Healthcare and Cloud Applications


Language Search over Encrypted Cloud Data—The authors in [128] proposed the de-
sign of a novel privacy-preserving FE-based search mechanism over encrypted cloud data.
The proposed new primitive supports an extreme expressive search mode, which is the
regular language search. To facilitate this, the authors defined a new notion called search-
able deterministic finite automata-based FE, which is a generalization of PEKS [39,200].
In the proposed construction, any system user can describe data to be shared with regular
language in an encrypted form, where the language description can be arbitrary length.
A valid data receiver can generate and deliver a search token represented as a DFA to a
cloud server, such that the cloud server can locate the corresponding ciphertexts and return
them to the data receiver. In the search phase, the server does not know anything about the
search contents and the underlying data.
FE for e-Health IoT Systems—To perform central processing, IoT systems require
an automation tool or service at the central site which possesses collected data without
compromising data security and privacy. The paper [129] presents a framework for the
efficient utilization of centralized data while protecting data confidentiality and privacy
in IoT infrastructure. The authors proposed a framework for the network layer of the
IoT infrastructure to secure centralized data as well as utilize them for various analytical
reasoning. Through the use of CP-ABE, privacy preservation with the access control of
centralized data is proposed while with FE, various analytical functions can be executed
on the encrypted data. A key feature of the proposed scheme is that since there is no
dependency of any ciphertext on any function, the insertion of new ciphertexts as well as
new functions is possible. On the other hand, a key limitation comes from the use of double
encryption, where to create the FE ciphertext, already encrypted data (CP-ABE ciphertext)
are used as the payload.
User-Centric Biometric Authentication—The work in [130] proposed a user-centric
biometric authentication scheme that enables end users to encrypt their own templates
with a newly proposed light-weight encryption scheme. During the authentication pro-
cess, all the templates remain encrypted and the server never sees them in their plain
form. However, the server is able to determine whether the distance of two encrypted
templates is within a pre-defined threshold. Under the scenario of both passive and active
attacks, no critical information of the templates is revealed. The proposed scheme follows a
compute-then-compare approach where the newly proposed primitive, threshold predicate
encryption (TPE), can encrypt two vectors in such a way that the inner product of those
vectors can be evaluated and compared to a pre-defined threshold. TPE uses similar tech-
niques as in [201], however, the computational models as well as the security requirements
are quite different. The proposed TPE can be used as a building block for various distance
metrics involving encrypted data.

8.5. FE for Rights Managements and Searchable Encryption


Secure Digital Rights Management—The work in [131] proposed a novel Digital
Rights Management (DRM) scheme based on a DFA-based FPRE scheme [186] which has
Sensors 2022, 22, 7567 38 of 50

been proven to be secure against CCA in the standard model. In the proposed scheme,
a user with secret keys associated with their DFA accepts the ciphertext-associated string
and can quite efficiently access the encrypted content with the help of the cloud service
provider. The authors leveraged the DFA-based FPRE scheme to realize fine-grained
access control over encrypted contents among a set of users, protecting the contents stored
in a semi-trusted cloud environment and allowing flexibility in specifying the access
rights of individual users. Through the use of computation outsourcing, the issue of high
computation at the user side is also addressed. The work follows the scheme of [202] which
allows the delegated key server to immediately revoke the attributes and malicious users.
Searchable Encryption using Multi-Input FE—The authors in [132] proposed a se-
cure and efficient searchable encryption scheme supporting multi-keyword search in a
single-owner multi-user settings. The scheme is mainly applicable in cases where the
number of keywords is limited but the number of files is large, such as sharing a compre-
hensive knowledge base in a certain field. In the proposed scheme, the cloud server is able
to complete search processes with search tokens consisting of only two items, resulting
in a significantly decreased communication and transportation overhead. The scheme
achieves an efficient multi-keyword search through the use of an inverted index structure
and super-incremental sequence. Furthermore, the scheme avoids per-query interaction
between the data owner and data user, hence the data owner does not need to stay online
for data users to search in their archives.

9. Open Challenges and Research Trends


Beyond the traditional secure computing methodologies, the developing domain of
functional encryption has proven to be a promising avenue. Although crucial, contributions
to cryptography design and implementation still need to be taken into account for further
research projects. The main issues and interesting research paths for FE-based secure
computing, in the majority of the IoT realm, are briefly discussed in this section.
Inherent Factors affecting IoT Security—security threats are a common issue that
can seriously harm network infrastructure. IoT systems are vulnerable to security threats
for a variety of reasons, including a the low processing power of smart devices, wire-
less connectivity, system openness and the physical accessibility of sensors, actuators
and objects [203,204]. As a result, the three pieces of IoT hardware that may be exposed
to frequent attacks are RFIDs, WSNs and clouds. Here, RFIDs are found to be the most
susceptible technology since they are utilized in identifying and monitoring both people
and items [205]. Furthermore, although IoT devices are manufactured with ease of use and
connectivity in mind, they become vulnerable over time as attackers find new security
issues to exploit. Regular patches and updates are needed to prevent these devices being
exploited over time.
Need for Secure Programming Protocol—The majority of IoT devices are weak and
susceptible to different types of malware due to their ease of accessibility and the lim-
ited computational resources at their disposal. Owing to a lack of transport encryption
protocols, unsecured web interfaces, insufficient software security and authorization, this
issue keeps on affecting and compromising the security of IoT nodes [206]. Thus, a de-
vice authentication and digital certificates approach can be adopted as a solution. More
recently, the National Institute of Standards and Technology (NIST) released its recom-
mendations [207] for device manufacturers to establish a security baseline. Furthermore,
the traditional network reprogramming method has an authentication issue since it merely
uses a data dissemination protocol to send codes in the network without running any
authentication protocol [208], compromising network security. This requires the nodes
to be aware of the validity of every code in order to avoid any malicious installation and
to establish a secure programming protocol. A rogue node pretending to be a legitimate
node in order to perform malicious activities poses another threat related to system and
identity management.
Sensors 2022, 22, 7567 39 of 50

Threat Identification, Remediation and Multi-Key Attacks—The development


of lightweight cryptography for devices with limited resources is largely dictated by the
key size and blocklength. The cipher text size increases with an increase in the key size,
asking for more processing resources. One of the main problems concerning IoT security
is a multi-key attack, which allows attackers to decrypt data using more than one key.
In the event that the attackers obtain the key, the secrecy property may be jeopardized.
The IoT system must identify and deploy countermeasures in order to address a security
attack, and to continue functioning effectively [209]. In particular, after the system has been
deployed, it must also be able to respond to new, unforeseen threats. These operations
must be carried out lightly due to the constrained resources of IoT devices, and should
utilize real-time calculations in order to contribute to a dependable and responsive system.
For this objective to be successfully achieved, there is a need for procedures that teach
developers to incorporate firewalls and intrusion prevention systems.
Tighter Security Guarantees for FE—Any secure computing protocols must address
the crucial challenges of security and privacy assurances. The security of the underlying
FE schemes determines how safe an FE-based secure computation can be performed.
Existing FE methods with workable formulations often defend against the decisional Diffie–
Hellman (DDH) assumption or selective indistinguishability under chosen-plaintext attack
(IND-CPA). Even if such FE architectures meet security requirements in the majority of
situations, they could not satisfy application circumstances, including those involving
military applications, where strict security criteria/guarantees need to be met.
Third-Party Infrastructures for FE Schemes—Majority of FE schemes and related
cryptographic primitives including ABE or PE rely on a trusted third-party authority
(TPA) to supply a key service, with the exception of decentralized FE schemes. To en-
able the TPA-related FE-based secure computation protocols in the Internet environment,
there are not a lot of generally accepted TPA infrastructures, apart from the commonly
used certificate authority (CA) infrastructure [210]. The deployment of FE-based privacy-
preserving applications in the actual Internet environment can be made easier, and the
adoption of privacy-preserving applications can be hastened with the help of a transparent
and generally trusted TPA infrastructure [211]. The implementation of such FE-based
mechanisms will be more reliable with such an infrastructure for accountability and trans-
parency. Although blockchains are perceived to eliminate the need for a TPA to enforce
exclusion rights, and provide a system of universal access to knowledge and discover-
ability, recent works have started to look at the inclusion of TPAs. For example, the work
of [212] proposed a framework that provides the transparency and trustworthiness of
TPA and third-party facilities using blockchain techniques for emerging crypto-based
privacy-preserving applications.
Protection in Post-Quantum Era—Recent advances in quantum computers are pro-
jected to impose severe threats to the security of widely used public-key cryptosystems
and the communications that make use of it. It is therefore necessary to explore new
post-quantum cryptographic algorithms and investigate architectures against strong attack-
ers, especially those employing quantum computing [213]. Recent research works have
investigated the application of potential post-quantum key encapsulation mechanisms
and the digital signature algorithms identified in current NIST proposals [214]. There is
always a risk of sensitive information being leaked as the function result in FE processing
is communicated to the presumably sincere but inquisitive coordinator [121]. Therefore, it
is necessary to investigate more robust security and privacy guarantees for safe computing
protocols based on FE, including those for the post-quantum period.
In future works, we look to explore and utilize additional FE schemes, particularly
multi-client and multi-input schemes that enable a broad range of applications such as
querying encrypted databases, computing over encrypted data streams, and multi-client
computation delegation. Furthermore, we intended to build and test function-hiding
methods that will allow for privacy-preserving requests to prediction services.
Sensors 2022, 22, 7567 40 of 50

10. Conclusions
In this survey, we looked at a variety of application areas where FE and various
underlying cryptographic primitives have been used to enhance the security and integrity
of user data including their identity and access rights, among others. We first presented
a brief introduction to some of these primitives, including ABE, IBE, SE, PE and FE itself.
After the overview of some of these potential applications, particularly those based on IoT
sensors, we surveyed the recent literature utilizing these different cryptosystems in the
aforementioned application areas. Although a lot of these schemes have been developed
to address the broader areas of IoT and cloud computing, research in areas such as ML
and biometric identification using state-of-the-art sensors is also being looked into by
researchers. We aimed to provide the reader with a recent view of the developments
in this growing area of research from the point of view of applications, such that it can
inspire further interest. It should be noted that all the aforementioned primitives are
provably secure and provide unquestionable security, which generally causes an efficiency
barrier for various applications. For example, in a typical ABE implementation, the size
of ciphertext is proportional to the number of attributes associated with the access policy,
and the decryption time is proportional to the number of attributes used during decryption.
Similarly, most current ABKS schemes incur large computation costs in the encryption and
keyword search operations. In particular, when implementing an ABKS system inherited
from ABE technology, the size of the ciphertext is proportional (at least linearly) to the
number of attributes associated with the access policy. Future work should consider this
important aspect in terms of trade-off between the security and efficiency for different
cryptographic primitives, under various applications, and explore how the primitives
might need to be modified to suit the application.

Author Contributions: Conceptualization, K.S. and T.Z.; methodology, K.S.; investigation, K.S. and
E.-u.-H.Q.; resources, T.Z.; writing—original draft preparation, K.S.; writing—review and editing,
K.S., T.Z. and E.-u.-H.Q.; supervision, T.Z.; project administration, K.S.; funding acquisition, T.Z. and
E.-u.-H.Q. All authors have read and agreed to the published version of the manuscript.
Funding: This work was supported by Security Research Center at Naif Arab University for Security
Sciences (Project No. SRC-PR2-01).
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: Not applicable.
Acknowledgments: The authors would like to express their profound gratitude to the Vice Presidency
for Scientific Research at Naif Arab University for Security Sciences for their kind encouragement of
this work.
Conflicts of Interest: The authors declare no conflict of interest.

Abbreviations
List of abbreviations used in this work:
Acronym Description Acronym Description
AA Attribute Authority KGC Key Generation Center
AABE Attribute-Based Encryption KP-ABE Key-Policy ABE
Attribute-Based Encryption
ABKS LSTM Long Short-Term Memory
with Keyword Search
ABS Attribute-Based Signature MAC Message Authentication Code
AES Advanced Encryption Standard MAP Malware Analytic Provider
ASPE Asymmetric PE MANETs Mobile Ad Hoc Networks
CA Certificate Authority MBS Macro Base Station
CAA Central Attribute Authority CCA Chosen Ciphertext Attack
Sensors 2022, 22, 7567 41 of 50

Mel Frequency Cepstral Mobile Healthcare Social


MFCC MHSN
Coefficients Network
CCA2 Adaptive CCA MiTM Man in The Middle
CNN Convolutional Neural Network ML Machine Learning
Message Queue Telemetry
CP-ABE Ciphertext-Policy ABE MQTT
Transport
CPA Chosen Plaintext Attack MRPE Multireceiver PE
CSP Cloud Service Provider OPE Order-Preserving Encryption
CSS Cloud Storage Service OSNs Online Social Networks
D2D Device to Device PE Predicate Encryption
DABE Decentralized ABE PIPE Public Index PE
Decisional Bilinear Public Key Encryption with
DBDH PEKS
Diffie–Hellman Keyword Search
DBE Distance-Based Encryption PKG Public Key Generator
DO Data Owner NTT Number Theoretic Transform
DU Data User RLWE Ring Learning with Errors
DPE Delegate PE PKI Public Key Infrastructure
DRM Digital Rights Management PoV Proof of Vote
Proxy Re-Encryption with
ECC Elliptic Curve Cryptography PRES
Keyword Search
EHRs Electronic Health Records QoP Quality of Protection
FPGA Field Programmable Gate Array KGAs Keyword Guessing Attacks
GID Global Identity QoS Quality of Service
FE Functional Encryption SDE Searchable Data Encryption
FHE Fully Homomorphic Encryption SDN Software Defined Networking
FVM Functional Virtual Machine SE Searchable Encryption
HABE Hierarchical ABE SSE Symmetric SE
HE Homomorphic Encryption SPE Symmetric PE
Identity-Based Broadcast Secure Multi-Party
IBBE SMC
Encryption Computation
IBC Identity-Based Cryptography TMN Tactical Mobile Network
IBE Identity-Based Encryption TPE Threshold PE
IBSC Identity-Based Signcryption TTP Trusted Third Party
ICN Information-Centric Networking UAV Unmanned Aerial Vehicle
IoT Internet of Things IPFE Inner Product FE
User Management and Wireless Sensor and
UMCM WSAN
Container Management Actuator Network
SOK Sakai, Ohgishi and Kasahara ROM Read-Only Memory
Message Queue Telemetry Modified Bilinear Diffie-
MQTT MBDHE
Transport Hellman Exponent

References
1. Atzori, L.; Iera, A.; Morabito, G. The internet of things: A survey. Comput. Netw. 2010, 54, 2787–2805. [CrossRef]
2. Gaubatz, G.; Kaps, J.P.; Sunar, B. Public key cryptography in sensor networks—Revisited. In European Workshop on Security in
Ad-Hoc and Sensor Networks; Springer: Berlin/Heidelberg, Germany, 2004; pp. 2–18.
3. Galbraith, S.D. Mathematics of Public Key Cryptography; Cambridge University Press: Cambridge, UK, 2012.
4. Boneh, D.; Sahai, A.; Waters, B. Functional encryption: Definitions and challenges. In Theory of Cryptography, Proceedings of the 8th
Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, 28–30 March 2011; Springer: Berlin/Heidelberg, Germany, 2011;
pp. 253–273.
5. Abdalla, M.; Catalano, D.; Gay, R.; Ursu, B. Inner-product functional encryption with fine-grained access control. In Advances
in Cryptology—ASIACRYPT 2020, Proceedings of the 26th International Conference on the Theory and Application of Cryptology and
Information Security, Daejeon, Korea, 7–11 December 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 467–497.
6. Lee, C.C.; Chung, P.S.; Hwang, M.S. A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments.
IJ Netw. Secur. 2013, 15, 231–240.
7. Moffat, S.; Hammoudeh, M.; Hegarty, R. A survey on ciphertext-policy attribute-based encryption (CP-ABE) approaches to data
security on mobile devices and its application to IoT. In Proceedings of the International Conference on Future Networks and
Distributed Systems, Cambridge, UK, 19–20 July 2017.
Sensors 2022, 22, 7567 42 of 50

8. Balamurugan, B.; Krishna, P.V. Extensive survey on usage of attribute based encryption in cloud. J. Emerg. Technol. Web Intell.
2014, 6, 263–272.
9. Zhao, S.; Aggarwal, A.; Frost, R.; Bai, X. A survey of applications of identity-based cryptography in mobile ad hoc networks.
IEEE Commun. Surv. Tutor. 2011, 14, 380–400. [CrossRef]
10. Phaneendra, H. Identity-based cryptography and comparison with traditional public key encryption: A survey. Int. J. Comput.
Sci. Inf. Technol. 2014, 5, 5521–5525.
11. Li, F.; Khan, M.K. A survey of identity-based signcryption. IETE Tech. Rev. 2011, 28, 265–272. [CrossRef]
12. Wang, Y.; Wang, J.; Chen, X. Secure searchable encryption: A survey. J. Commun. Inf. Netw. 2016, 1, 52–65. [CrossRef]
13. Zhang, R.; Xue, R.; Liu, L. Searchable encryption for healthcare clouds: A survey. IEEE Trans. Serv. Comput. 2017, 11, 978–996.
[CrossRef]
14. Handa, R.; Krishna, C.R.; Aggarwal, N. Searchable encryption: A survey on privacy-preserving search schemes on encrypted
outsourced data. Concurr. Comput. Pract. Exp. 2019, 31, e5201. [CrossRef]
15. Mascia, C.; Sala, M.; Villa, I. A survey on Functional Encryption. arXiv 2021, arXiv:2106.06306.
16. Moher, D.; Liberati, A.; Tetzlaff, J.; Altman, D.G.; Group, P. Preferred reporting items for systematic reviews and meta-analyses:
the PRISMA statement. Ann. Intern. Med. 2009, 151, 264–269. [CrossRef] [PubMed]
17. Sahai, A.; Waters, B. Fuzzy identity-based encryption. In Proceedings of the Annual International Conference on the Theory and
Applications of Cryptographic Techniques, Aarhus, Denmark, 22–26 May 2005; Springer: Berlin/Heidelberg, Germany, 2005;
pp. 457–473.
18. Bethencourt, J.; Sahai, A.; Waters, B. Ciphertext-policy attribute-based encryption. In Proceedings of the 2007 IEEE Symposium
on Security and Privacy (SP’07), Oakland, CA, USA, 22–23 May 2007; IEEE: Piscataway, NJ, USA, 2007; pp. 321–334.
19. Cheung, L.; Newport, C. Provably secure ciphertext policy ABE. In Proceedings of the 14th ACM Conference on Computer and
Communications Security, Alexandria, VA, USA, 31 October–2 November 2007; pp. 456–465.
20. Goyal, V.; Jain, A.; Pandey, O.; Sahai, A. Bounded ciphertext policy attribute based encryption. In Proceedings of the International
Colloquium on Automata, Languages and Programming, Reykjyavik, Iceland, 7–11 July 2008; Springer: Berlin/Heidelberg,
Germany, 2008; pp. 579–591.
21. Liang, X.; Cao, Z.; Lin, H.; Xing, D. Provably secure and efficient bounded ciphertext policy attribute based encryption. In
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia,
10–12 March 2009; pp. 343–352.
22. Waters, B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Proceedings
of the International Workshop on Public Key Cryptography; Springer: Berlin/Heidelberg, Germany, 2011; pp. 53–70.
23. Goyal, V.; Pandey, O.; Sahai, A.; Waters, B. Attribute-based encryption for fine-grained access control of encrypted data. In
Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 30 October–
3 November 2006; pp. 89–98.
24. Whitten, A.; Tygar, J.D. Why Johnny Ca not Encrypt: A Usability Evaluation of PGP 5.0. In Proceedings of the USENIX Security
Symposium, Washington, DC, USA, 23–26 August 1999; Volume 348, pp. 169–184.
25. Sheng, S.; Broderick, L.; Koranda, C.A.; Hyland, J.J. Why johnny still can’t encrypt: Evaluating the usability of email encryption
software. In Proceedings of the Symposium On Usable Privacy and Security, Pittsburgh, PA, USA, 12–14 July 2006, ACM: New
York, NY, USA, 2006; pp. 3–4.
26. Shamir, A. Identity-based cryptosystems and signature schemes. In Proceedings of the Workshop on the Theory and Application
of Cryptographic Techniques, Paris, France, 9–11 April 1984, Springer: Berlin/Heidelberg, Germany, 1984; pp. 47–53.
27. Boneh, D.; Franklin, M. Identity-based encryption from the Weil pairing. In Proceedings of the Annual International Cryptology
Conference, Santa Barbara, CA, USA, 19–23 August 2001; Springer: Berlin/Heidelberg, Germany, 2001; pp. 213–229.
28. Cocks, C. An identity based encryption scheme based on quadratic residues. In Proceedings of the IMA International Conference
on Cryptography and Coding, Cirencester, UK, 17–19 December 2001; Springer: Berlin/Heidelberg, Germany, 2001; pp. 360–363.
29. Park, J.H.; Lee, K.; Lee, D.H. Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups. IACR
Cryptol. ePrint Arch. 2016, 2016, 500.
30. Liu, J.; Ke, L. New efficient identity based encryption without pairings. J. Ambient Intell. Humaniz. Comput. 2019, 10, 1561–1570.
[CrossRef]
31. Yao, A.C. Protocols for secure computations. In Proceedings of the 23rd Annual Symposium on Foundations of Computer
Science (SFCS 1982) NW, Washington, DC, USA, 3–5 November 1982; IEEE: Piscataway, NJ, USA, 1982; pp. 160–164.
32. Gentry, C. Fully homomorphic encryption using ideal lattices. In Proceedings of the Forty-First Annual ACM Symposium on
Theory of Computing, Bethesda, MD, USA, 31 May–2 June 2009; pp. 169–178.
33. Song, D.X.; Wagner, D.; Perrig, A. Practical techniques for searches on encrypted data. In Proceedings of the 2000 IEEE
Symposium on Security and Privacy, S&P, Berkeley, CA, USA, 14–17 May 2000; IEEE: Piscataway, NJ, USA, 2000; pp. 44–55.
34. Curtmola, R.; Garay, J.; Kamara, S.; Ostrovsky, R. Searchable symmetric encryption: Improved definitions and efficient
constructions. J. Comput. Secur. 2011, 19, 895–934. [CrossRef]
35. Ibrahim, A.; Jin, H.; Yassin, A.A.; Zou, D. Secure rank-ordered search of multi-keyword trapdoor over encrypted cloud data. In
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, Guilin, China, 6–8 December 2012; IEEE: Piscataway,
NJ, USA, 2012; pp. 263–270.
Sensors 2022, 22, 7567 43 of 50

36. Chen, X.; Huang, X.; Li, J.; Ma, J.; Lou, W.; Wong, D.S. New algorithms for secure outsourcing of large-scale systems of linear
equations. IEEE Trans. Inf. Forensics Secur. 2014, 10, 69–78. [CrossRef]
37. Sun, W.; Wang, B.; Cao, N.; Li, M.; Lou, W.; Hou, Y.T.; Li, H. Privacy-preserving multi-keyword text search in the cloud supporting
similarity-based ranking. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications
Security, Hangzhou, China, 8–10 May 2013, pp. 71–82.
38. Katz, J.; Sahai, A.; Waters, B. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In
Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul,
Turkey, 13–17 April 2008; Springer: Berlin/Heidelberg, Germany, 2008; pp. 146–162.
39. Boneh, D.; Waters, B. Conjunctive, subset, and range queries on encrypted data. In Proceedings of the Theory of Cryptography
Conference, Amsterdam, The Netherlands, 21–24 February 2007; Springer: Berlin/Heidelberg, Germany, 2007; pp. 535–554.
40. Kawai, Y.; Takashima, K. Predicate-and attribute-hiding inner product encryption in a public key setting. In Proceedings of the
International Conference on Pairing-Based Cryptography, Beijing, China, 22–24 November 2013; Springer: Berlin/Heidelberg,
Germany, 2013; pp. 113–130.
41. Blundo, C.; Iovino, V.; Persiano, G. Private-key hidden vector encryption with key confidentiality. In Proceedings of the Interna-
tional Conference on Cryptology and Network Security, Kanazawa, Japan, 12–14 December 2009; Springer: Berlin/Heidelberg,
Germany, 2009; pp. 259–277.
42. Fan, C.I.; Huang, S.Y. Controllable privacy preserving search based on symmetric predicate encryption in cloud storage. Future
Gener. Comput. Syst. 2013, 29, 1716–1724. [CrossRef]
43. Gay, R.; Méaux, P.; Wee, H. Predicate encryption for multi-dimensional range queries from lattices. In Proceedings of
the IACR International Workshop on Public Key Cryptography, Gaithersburg, MD, USA, 30 March–1 April 2015; Springer:
Berlin/Heidelberg, Germany, 2015; pp. 752–776.
44. Boneh, D.; Sahai, A.; Waters, B. Functional encryption: A new vision for public-key cryptography. Commun. ACM 2012, 55, 56–64.
[CrossRef]
45. Whitmore, A.; Agarwal, A.; Da Xu, L. The Internet of Things—A survey of topics and trends. Inf. Syst. Front. 2015, 17, 261–274.
[CrossRef]
46. Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.D.; Katz, R.; Konwinski, A.; Lee, G.; Patterson, D.; Rabkin, A.; Stoica, I.; et al. A view
of cloud computing. Commun. ACM 2010, 53, 50–58. [CrossRef]
47. Bonomi, F.; Milito, R.; Zhu, J.; Addepalli, S. Fog computing and its role in the internet of things. In Proceedings of the First
Edition of the MCC Workshop on Mobile Cloud Computing, Helsinki, Finland, 17 August 2012; pp. 13–16.
48. Ali, M.; Dhamotharan, R.; Khan, E.; Khan, S.U.; Vasilakos, A.V.; Li, K.; Zomaya, A.Y. SeDaSC: Secure data sharing in clouds. IEEE
Syst. J. 2015, 11, 395–404. [CrossRef]
49. Özkar, M.; Sandıkkaya, M.T. A Survey on Security & Privacy Design in e-Health. In Proceedings of the 2020 5th International
Conference on Computer Science and Engineering (UBMK), Diyarbakır, Turkey, 9–11 September 2020; IEEE: Piscataway, NJ, USA,
2020; pp. 208–213.
50. Alam, M.R.; Reaz, M.B.I.; Ali, M.A.M. A review of smart homes—Past, present, and future. IEEE Trans. Syst. Man Cybern. Part C
2012, 42, 1190–1203. [CrossRef]
51. Albino, V.; Berardi, U.; Dangelico, R.M. Smart cities: Definitions, dimensions, performance, and initiatives. J. Urban Technol. 2015,
22, 3–21. [CrossRef]
52. Feng, Q.; He, D.; Zeadally, S.; Khan, M.K.; Kumar, N. A survey on privacy protection in blockchain system. J. Netw. Comput. Appl.
2019, 126, 45–58. [CrossRef]
53. Li, X.; Jiang, P.; Chen, T.; Luo, X.; Wen, Q. A survey on the security of blockchain systems. Future Gener. Comput. Syst. 2020,
107, 841–853. [CrossRef]
54. Jordan, M.I.; Mitchell, T.M. Machine learning: Trends, perspectives, and prospects. Science 2015, 349, 255–260. [CrossRef]
55. Yang, Q.; Liu, Y.; Chen, T.; Tong, Y. Federated machine learning: Concept and applications. ACM Trans. Intell. Syst. Technol. 2019,
10, 1–19. [CrossRef]
56. Unar, J.; Seng, W.C.; Abbasi, A. A review of biometric technology along with trends and prospects. Pattern Recognit. 2014,
47, 2673–2688. [CrossRef]
57. Liyanage, M.; Salo, J.; Braeken, A.; Kumar, T.; Seneviratne, S.; Ylianttila, M. 5G privacy: Scenarios and solutions. In Proceedings
of the 2018 IEEE 5G World Forum (5GWF), Santa Clara, CA, USA, 9–11 July 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 197–203.
58. Zheleva, E.; Getoor, L. Privacy in social networks: A survey. In Social Network Data Analytics; Springer: Berlin/Heidelberg,
Germany, 2011; pp. 277–306.
59. Ambrosin, M.; Anzanpour, A.; Conti, M.; Dargahi, T.; Moosavi, S.R.; Rahmani, A.M.; Liljeberg, P. On the feasibility of attribute-
based encryption on internet of things devices. IEEE Micro 2016, 36, 25–35. [CrossRef]
60. Girgenti, B.; Perazzo, P.; Vallati, C.; Righetti, F.; Dini, G.; Anastasi, G. On the feasibility of attribute-based encryption on constrained
IoT devices for smart systems. In Proceedings of the IEEE International Conference on Smart Computing (SMARTCOMP),
Washington, DC, USA, 12–15 June 2019; pp. 225–232.
61. Oualha, N.; Nguyen, K.T. Lightweight attribute-based encryption for the internet of things. In Proceedings of the IEEE
International Conference on Computer Communication and Networks (ICCCN), Waikoloa, HI, USA, 1–4 August 2016; pp. 1–6.
Sensors 2022, 22, 7567 44 of 50

62. Garg, H.; Dave, M. Securing User Access at IoT Middleware Using Attribute Based Access Control. In Proceedings of the
International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kanpur, India, 6–8 July 2019;
pp. 1–6.
63. Kurniawan, A.; Kyas, M. Securing Machine Learning Engines in IoT Applications with Attribute-Based Encryption. In
Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI), Shenzhen, China, 1–3 July 2019;
pp. 30–34.
64. Rahulamathavan, Y.; Phan, R.C.W.; Rajarajan, M.; Misra, S.; Kondoz, A. Privacy-preserving blockchain based IoT ecosystem
using attribute-based encryption. In Proceedings of the 2017 IEEE International Conference on Advanced Networks and
Telecommunications Systems (ANTS), Odisha, India, 17–20 December 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 1–6.
65. Singh, M.; Rajan, M.; Shivraj, V.; Balamuralidhar, P. Secure MQTT for Internet of Things (IoT). In Proceedings of the IEEE
International Conference on Communication Systems and Network Technologies, Gwalior, India, 4–6 April 2015; pp. 746–751.
66. Belguith, S.; Kaaniche, N.; Mohamed, M.; Russello, G. C-ABSC: Cooperative attribute based signcryption scheme for internet of
things applications. In Proceedings of the IEEE International Conference on Services Computing (SCC), San Francisco, CA, USA,
2–7 July 2018, pp. 245–248.
67. Ion, M.; Zhang, J.; Schooler, E.M. Toward content-centric privacy in ICN: Attribute-based encryption and routing. In Proceedings
of the ACM SIGCOMM Workshop on Information-Centric Networking, Hong Kong, China, 12 August 2013; pp. 39–40.
68. La Manna, M.; Perazzo, P.; Rasori, M.; Dini, G. fABElous: An attribute-based scheme for industrial internet of things. In
Proceedings of the IEEE International Conference on Smart Computing (SMARTCOMP), Washington, DC, USA, 12–15 June 2019;
pp. 33–38.
69. Alrawais, A.; Alhothaily, A.; Hu, C.; Xing, X.; Cheng, X. An attribute-based encryption scheme to secure fog communications.
IEEE Access 2017, 5, 9131–9138. [CrossRef]
70. Huang, Q.; Yang, Y.; Wang, L. Secure data access control with ciphertext update and computation outsourcing in fog computing
for Internet of Things. IEEE Access 2017, 5, 12941–12950. [CrossRef]
71. Li, J.; Zhang, Y.; Chen, X.; Xiang, Y. Secure attribute-based data sharing for resource-limited users in cloud computing. Elsevier
Comput. Secur. 2018, 72, 1–12. [CrossRef]
72. Meamari, E.; Guo, H.; Shen, C.C.; Zhang, R. Data User-Based Attribute Based Encryption. In Proceedings of the 54th IEEE
Annual Conference on Information Sciences and Systems (CISS), Princeton, NJ, USA, 18–20 March 2020; pp. 1–5.
73. Wang, H.; Dong, X.; Cao, Z.; Li, D. Secure and efficient attribute-based encryption with keyword search. Comput. J.-Br. Comput.
Soc. 2018, 61, 1133–1142. [CrossRef]
74. Zhang, Q.; Wang, G.; Liu, Q.; Peng, T. Attribute-based encryption with personalized search. In Proceedings of the IEEE
International Symposium on Parallel and Distributed Processing with Applications and IEEE International Conference on
Ubiquitous Computing and Communications (ISPA/IUCC), Guangzhou, China, 12–15 December 2017; pp. 1172–1178.
75. Luo, J.; Dong, Q.; Huang, D.; Kang, M. Attribute Based Encryption for Information Sharing on Tactical Mobile Networks.
In Proceedings of the MILCOM 2018—2018 IEEE Military Communications Conference (MILCOM), Los Angeles, CA, USA,
29–31 October 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–9.
76. Zheng, D.; Wu, A.; Zhang, Y.; Zhao, Q. Efficient and privacy-preserving medical data sharing in Internet of Things with limited
computing power. IEEE Access 2018, 6, 28019–28027. [CrossRef]
77. Thatmann, D.; Raschke, P.; Küpper, A. Please, No More GUIs!: A User Study, Prototype Development and Evaluation on the
Integration of Attribute-Based Encryption in a Hospital Environment. In Proceedings of the IEEE Annual Computer Software
and Applications Conference (COMPSAC), Atlanta, GA, USA, 10–14 June 2016; Volume 2, pp. 496–502.
78. Rasori, M.; Perazzo, P.; Dini, G. ABE-Cities: An attribute-based encryption system for smart cities. In Proceedings of the IEEE
International Conference on Smart Computing (SMARTCOMP), Taormina, Italy, 18–20 June 2018; pp. 65–72.
79. Salman, O.; Abdallah, S.; Elhajj, I.H.; Chehab, A.; Kayssi, A. Identity-based authentication scheme for the Internet of Things. In
Proceedings of the IEEE Symposium on Computers and Communication (ISCC), Messina, Italy, 27–30 June 2016; pp. 1109–1111.
80. Güneysu, T.; Oder, T. Towards lightweight identity-based encryption for the post-quantum-secure Internet of Things. In Proceed-
ings of the 2017 18th International Symposium on Quality Electronic Design (ISQED), Santa Clara, CA, USA, 14–15 March 2017;
IEEE: Piscataway, NJ, USA, 2017; pp. 319–324.
81. Jiang, L.; Li, T.; Li, X.; Atiquzzaman, M.; Ahmad, H.; Wang, X. Anonymous communication via anonymous identity-based
encryption and its application in IoT. Wirel. Commun. Mob. Comput. 2018, 2018, 6809796. [CrossRef]
82. Mao, Y.; Li, J.; Chen, M.R.; Liu, J.; Xie, C.; Zhan, Y. Fully secure fuzzy identity-based encryption for secure IoT communications.
Comput. Stand. Interfaces 2016, 44, 117–121. [CrossRef]
83. Sankaran, S. Lightweight security framework for IoTs using identity based cryptography. In Proceedings of the 2016 International
Conference on Advances in Computing, Communications and Informatics (ICACCI), Jaipur, India, 21–24 September 2016; IEEE:
Piscataway, NJ, USA, 2016; pp. 880–886.
84. Karati, A.; Islam, S.H.; Biswas, G.; Bhuiyan, M.Z.A.; Vijayakumar, P.; Karuppiah, M. Provably secure identity-based signcryption
scheme for crowdsourced industrial Internet of Things environments. IEEE Internet Things J. 2017, 5, 2904–2914. [CrossRef]
85. Al Salami, S.; Baek, J.; Salah, K.; Damiani, E. Lightweight encryption for smart home. In Proceedings of the 11th International
Conference on Availability, Reliability and Security (ARES), Salzburg, Austria, 31 August–2 September 2016; pp. 382–388.
Sensors 2022, 22, 7567 45 of 50

86. He, K.; Weng, J.; Mao, Y.; Yuan, H. Anonymous identity-based broadcast encryption technology for smart city information system.
Pers. Ubiquitous Comput. 2017, 21, 841–853. [CrossRef]
87. Alornyo, S.; Asante, M.; Hu, X.; Mireku, K.K. Encrypted Traffic Analytic using Identity Based Encryption with Equality Test for
Cloud Computing. In Proceedings of the IEEE 7th International Conference on Adaptive Science & Technology (ICAST), Accra,
Ghana, 22–24 August 2018; pp. 1–4.
88. Sudarsono, A.; Yuliana, M.; Darwito, H.A. A secure data sharing using identity-based encryption scheme for e-healthcare
system. In Proceedings of the 3rd International Conference on Science in Information Technology (ICSITech), Bandung, Indonesia,
25–26 October 2017; pp. 429–434.
89. Huang, Q.; Yue, W.; He, Y.; Yang, Y. Secure identity-based data sharing and profile matching for mobile healthcare social networks
in cloud computing. IEEE Access 2018, 6, 36584–36594. [CrossRef]
90. Zhou, B.; Li, H.; Xu, L. An authentication scheme using identity-based encryption & blockchain. In Proceedings of the 2018
IEEE Symposium on Computers and Communications (ISCC), Natal, Brazil, 25–28 June 2018; IEEE: Piscataway, NJ, USA, 2018;
pp. 00556–00561.
91. Zhang, M.; Wang, S.; Zhang, P.; He, L.; Li, X.; Zhou, S. Protecting Data Privacy for Permissioned Blockchains using Identity-Based
Encryption. In Proceedings of the 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control
Conference (ITNEC), Chengdu, China, 15–17 March 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 602–605.
92. Liu, J.; Lai, J.; Huang, X. Dual trapdoor identity-based encryption with keyword search. Soft Comput. 2017, 21, 2599–2607.
[CrossRef]
93. Sarier, N.D. Multimodal biometric identity based encryption. Future Gener. Comput. Syst. 2018, 80, 112–125. [CrossRef]
94. Li, S.; Wang, F.; Shi, T.; Kuang, J. Probably secure multi-user multi-keyword searchable encryption scheme in cloud storage. In
Proceedings of the 3rd IEEE Information Technology, Networking, Electronic and Automation Control Conference (ITNEC),
Chengdu, China, 15–17 March 2019; pp. 1368–1372.
95. Liu, X.; Guan, Z.; Du, X.; Wu, L.; Abedin, Z.U.; Guizani, M. Achieving secure and efficient cloud search services: Cross-lingual
multi-keyword rank search over encrypted cloud data. In Proceedings of the IEEE International Conference on Communications
(ICC), Shanghai, China, 20–24 May 2019, pp. 1–6.
96. Eltayieb, N.; Elhabob, R.; Hassan, A.; Li, F. An efficient attribute-based online/offline searchable encryption and its application in
cloud-based reliable smart grid. J. Syst. Archit. 2019, 98, 165–172. [CrossRef]
97. Li, H.; Jing, T. A Lightweight fine-grained searchable encryption scheme in fog-based healthcare IoT networks. Wirel. Commun.
Mob. Comput. 2019, 2019, 1019767. [CrossRef]
98. Ocansey, S.K.; Ametepe, W.; Li, X.W.; Wang, C. Dynamic searchable encryption with privacy protection for cloud computing. Int.
J. Commun. Syst. 2018, 31, e3403. [CrossRef]
99. Liu, Z.; Li, T.; Li, P.; Jia, C.; Li, J. Verifiable searchable encryption with aggregate keys for data sharing system. Future Gener.
Comput. Syst. 2018, 78, 778–788. [CrossRef]
100. Michalas, A. The lord of the shares: Combining attribute-based encryption and searchable encryption for flexible data sharing. In
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, Limassol, Cyprus, 8–12 April 2019; pp. 146–155.
101. Ma, M.; He, D.; Kumar, N.; Choo, K.K.R.; Chen, J. Certificateless searchable public key encryption scheme for industrial internet
of things. IEEE Trans. Ind. Inform. 2017, 14, 759–767. [CrossRef]
102. Wu, L.; Chen, B.; Choo, K.K.R.; He, D. Efficient and secure searchable encryption protocol for cloud-based Internet of Things.
J. Parallel Distrib. Comput. 2018, 111, 152–161. [CrossRef]
103. Li, W.; Xiao, Y.; Tang, C.; Huang, X.; Xue, J. Multi-user searchable encryption voice in home IoT system. Internet Things 2020,
11, 100180. [CrossRef]
104. Zhang, K.; Long, J.; Wang, X.; Dai, H.N.; Liang, K.; Imran, M. Lightweight searchable encryption protocol for industrial internet
of things. IEEE Trans. Ind. Inform. 2020, 17, 4248–4259. [CrossRef]
105. Tahir, S.; Rajarajan, M. Privacy-preserving searchable encryption framework for permissioned blockchain networks. In
Proceedings of the IEEE International Conferences on Internet of Things, Green Computing and Communications, Cyber, Physical
and Social Computing, and Smart Data, Halifax, NS, Canada, 30 July–3 August 2018; pp. 1628–1633.
106. Chen, L.; Lee, W.K.; Chang, C.C.; Choo, K.K.R.; Zhang, N. Blockchain based searchable encryption for electronic health record
sharing. Future Gener. Comput. Syst. 2019, 95, 420–429. [CrossRef]
107. Chen, K.; Lin, Z.; Wan, J.; Xu, C. Interpretable Encrypted Searchable Neural Networks. In Proceedings of the International
Conference on Machine Learning for Cyber Security, Xi’an, China, 19–21 September 2019; Springer: Berlin/Heidelberg, Germany,
2019; pp. 279–289.
108. Farràs, O.; Ribes-González, J. Searchable encryption for geo-referenced data. In Proceedings of the 2016 Mediterranean Ad Hoc
Networking Workshop (Med-Hoc-Net), Vilanova i la Geltru, Spain, 20–22 June 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1–8.
109. Sun, J.; Bao, Y.; Nie, X.; Xiong, H. Attribute-hiding predicate encryption with equality test in cloud computing. IEEE Access 2018,
6, 31621–31629. [CrossRef]
110. Wang, X.A.; Xhafa, F.; Cai, W.; Ma, J.; Wei, F. Efficient privacy preserving predicate encryption with fine-grained searchable
capability for Cloud storage. Comput. Electr. Eng. 2016, 56, 871–883. [CrossRef]
111. Huang, S.Y.; Fan, C.I.; Tseng, Y.F. Enabled/disabled predicate encryption in clouds. Future Gener. Comput. Syst. 2016, 62, 148–160.
[CrossRef]
Sensors 2022, 22, 7567 46 of 50

112. Xu, S.; Qian, Y.; Hu, R.Q. Privacy-preserving data preprocessing for fog computing in 5g network security. In Proceedings of the
2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018; IEEE:
Piscataway, NJ, USA, 2018; pp. 1–6.
113. Liu, W.; Liu, J.; Wu, Q.; Qin, B.; Liang, K. Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access
Control. In Proceedings of the European Symposium on Research in Computer Security, Heraklion, Greece, 26–30 September
2016; Springer: Berlin/Heidelberg, Germany, 2016; pp. 588–605.
114. Fan, C.I.; Tseng, Y.F.; Huang, J.J.; Chen, S.F.; Kikuchi, H. Multireceiver predicate encryption for online social networks. IEEE
Trans. Signal Inf. Process. Netw. 2017, 3, 388–403. [CrossRef]
115. Wei, R.; Ye, D. Delegate predicate encryption and its application to anonymous authentication. In Proceedings of the 4th
International Symposium on Information, Computer, and Communications Security, Sydney, Australia, 10–12 March 2009;
pp. 372–375.
116. Xu, S.; Ye, F. A predicate encryption based anomaly detection scheme for e-Health communications network. In Proceedings of
the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; IEEE: Piscataway, NJ,
USA, 2018; pp. 1–6.
117. Abdallai, H.; Hu, X.; Wahaballa, A.; Eltayieb, N.; Ramadan, M.; Zhiguang, Q. Efficient functional encryption and proxy re-
cryptography for secure public cloud data sharing. In Proceedings of the 2016 IEEE International Conference of Online Analysis
and Computing Science (ICOACS), Chongqing, China, 28–29 May 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 367–370.
118. Sharma, D.; Jinwala, D.C. Encrypted data ordering with functional encryption. In Proceedings of the 2018 4th International
Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India, 15–17 March 2018; IEEE: Piscataway, NJ,
USA, 2018; pp. 1–8.
119. Ligier, D.; Carpov, S.; Fontaine, C.; Sirdey, R. Privacy Preserving Data Classification using Inner-product Functional Encryption.
In Proceedings of the ICISSP, Porto, Portugal, 19–21 February 2017; pp. 423–430.
120. Marc, T.; Stopar, M.; Hartman, J.; Bizjak, M.; Modic, J. Privacy-Enhanced Machine Learning with Functional Encryption. In
Proceedings of the European Symposium on Research in Computer Security, Luxembourg, 23–27 September 2019; Springer:
Berlin/Heidelberg, Germany, 2019; pp. 3–21.
121. Xu, R.; Baracaldo, N.; Zhou, Y.; Anwar, A.; Ludwig, H. Hybridalpha: An efficient approach for privacy-preserving federated
learning. In Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, London, UK, 15 November 2019;
pp. 13–23.
122. Xu, R.; Joshi, J.B.; Li, C. Cryptonn: Training neural networks over encrypted data. In Proceedings of the 2019 IEEE 39th
International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA, 7–10 July 2019; IEEE: Piscataway, NJ,
USA, 2019; pp. 1199–1209.
123. Stant, O.; Sirdey, R.; Gouy-Pailler, C.; Blanchart, P.; BenHamida, A.; Zayani, M.H. Privacy-Preserving Tax Calculations in
Smart Cities by Means of Inner-Product Functional Encryption. In Proceedings of the 2018 2nd Cyber Security in Networking
Conference (CSNet), Paris, France, 24–26 October 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–8.
124. Son, Y.B.; Im, J.H.; Kwon, H.Y.; Jeon, S.Y.; Lee, M.K. Privacy-Preserving Peer-to-Peer Energy Trading in Blockchain-Enabled Smart
Grids Using Functional Encryption. Energies 2020, 13, 1321. [CrossRef]
125. Im, J.H.; Kwon, H.Y.; Jeon, S.Y.; Lee, M.K. Privacy-Preserving Electricity Billing System Using Functional Encryption. Energies
2019, 12, 1237. [CrossRef]
126. Cui, H.; Wan, Z.; Wei, X.; Nepal, S.; Yi, X. Pay as you decrypt: Decryption outsourcing for functional encryption using blockchain.
IEEE Trans. Inf. Forensics Secur. 2020, 15, 3227–3238. [CrossRef]
127. Sharma, D.; Rashid, A.; Gupta, S.; Gupta, S.K. A functional encryption technique in uav integrated hetnet: A proposed model.
Int. J. Simul.-Sci. Technol. 2019, 20, 7.1–7.7. [CrossRef]
128. Liang, K.; Huang, X.; Guo, F.; Liu, J.K. Privacy-preserving and regular language search over encrypted cloud data. IEEE Trans.
Inf. Forensics Secur. 2016, 11, 2365–2376. [CrossRef]
129. Sharma, D.; Jinwala, D. Functional encryption in IoT e-health care system. In Proceedings of the International Conference on
Information Systems Security, Kolkata, India, 16–20 December 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 345–363.
130. Zhou, K.; Ren, J. PassBio: Privacy-preserving user-centric biometric authentication. IEEE Trans. Inf. Forensics Secur. 2018,
13, 3050–3063. [CrossRef]
131. Abdalla, H.; Hu, X.; Wahaballa, A.; Ali, A.A.; Ramadan, M.; Qin, Z. Integrating the Functional Encryption and Proxy Re-
cryptography to Secure DRM Scheme. IJ Netw. Secur. 2017, 19, 27–38.
132. Liang, Y.; Cao, Z.; Dong, X.; Shen, J. Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product
Functional Encryption. In Proceedings of the International Conference on Information and Communications Security, Lille,
France, 29–31 October 2018; Springer: Berlin/Heidelberg, Germany, 2018; pp. 377–392.
133. Yao, X.; Chen, Z.; Tian, Y. A lightweight attribute-based encryption scheme for the Internet of Things. Future Gener. Comput. Syst.
2015, 49, 104–112. [CrossRef]
134. Touati, L.; Challal, Y.; Bouabdallah, A. C-CP-ABE: Cooperative ciphertext policy attribute-based encryption for the internet of
things. In Proceedings of the IEEE International Conference on Advanced Networking Distributed Systems and Applications,
Bejaia, Algeria, 17–19 June 2014; pp. 64–69.
Sensors 2022, 22, 7567 47 of 50

135. Rasori, M.; La Manna, M.; Perazzo, P.; Dini, G. A Survey on Attribute-Based Encryption Schemes Suitable for the Internet of
Things. IEEE Internet Things J. 2022, 9, 8269–8290. [CrossRef]
136. Imam, R.; Kumar, K.; Raza, S.M.; Sadaf, R.; Anwer, F.; Fatima, N.; Nadeem, M.; Abbas, M.; Rahman, O. A systematic literature
review of attribute based encryption in health services. J. King Saud Univ.-Comput. Inf. Sci. 2022, in press.
137. Zhang, Y.; Nakanishi, R.; Sasabe, M.; Kasahara, S. Combining IOTA and Attribute-Based Encryption for Access Control in the
Internet of Things. Sensors 2021, 21, 5053. [CrossRef] [PubMed]
138. Tan, S.Y.; Yeow, K.W.; Hwang, S.O. Enhancement of a lightweight attribute-based encryption scheme for the Internet of Things.
IEEE Internet Things J. 2019, 6, 6384–6395. [CrossRef]
139. Kumar Premkamal, P.; Pja, A.; Kumar, P.S. Attribute based encryption in cloud computing: A survey, gap analysis, and future
directions. J. Netw. Comput. Appl. 2018, 108, 37–52.
140. Locke, D. MQ Telemetry Transport (MQTT) v3. 1 protocol specification. IBM Dev. Tech. Libr. 2010, 15.
141. Adiga, B.; Balamuralidhar, P.; Rajan, M.; Shastry, R.; Shivraj, V. An identity based encryption using elliptic curve cryptography
for secure m2m communication. In Proceedings of the First International Conference on Security of Internet of Things, Kollam,
India, 17–19 August 2012; pp. 68–74.
142. Belguith, S.; Kaaniche, N.; Laurent, M.; Jemai, A.; Attia, R. Constant-size threshold attribute based signcryption for cloud
applications. In Proceedings of the International Conference on Security and Cryptography (SECRYPT), Madrid, Spain,
24–26 July 2017, pp. 212–225.
143. Guo, F.; Mu, Y.; Chen, Z. Identity-based online/offline encryption. In Proceedings of the International Conference on Financial
Cryptography and Data Security, Cozumel, Mexico, 28–31 January 2008; Springer: Berlin/Heidelberg, Germany, 2008; pp. 247–261.
144. Kreutz, D.; Ramos, F.M.; Verissimo, P.E.; Rothenberg, C.E.; Azodolmolky, S.; Uhlig, S. Software-defined networking: A
comprehensive survey. Proc. IEEE 2014, 103, 14–76. [CrossRef]
145. Lyubashevsky, V.; Peikert, C.; Regev, O. On ideal lattices and learning with errors over rings. In Proceedings of the Annual
International Conference on the Theory and Applications of Cryptographic Techniques, Monaco and Nice, France, 30 May–3 June
2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 1–23.
146. Roy, S.S.; Vercauteren, F.; Mentens, N.; Chen, D.D.; Verbauwhede, I. Compact ring-LWE cryptoprocessor. In Proceedings of the
International Workshop on Cryptographic Hardware and Embedded Systems, Busan, Korea, 23–26 September 2014; Springer:
Berlin/Heidelberg, Germany, 2014; pp. 371–391.
147. Jia, X.; Hu, N.; Su, S.; Yin, S.; Zhao, Y.; Cheng, X.; Zhang, C. IRBA: An identity-based cross-domain authentication scheme for the
internet of things. Electronics 2020, 9, 634. [CrossRef]
148. Farjana, N.; Roy, S.; Mahi, M.; Nayeen, J.; Whaiduzzaman, M. An identity-based encryption scheme for data security in
fog computing. In Proceedings of the International Joint Conference on Computational Intelligence, Budapest, Hungary,
2–4 November 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 215–226.
149. Kim, J.Y.; Hu, W.; Sarkar, D.; Jha, S. ESIoT: Enabling secure management of the internet of things. In Proceedings of the 10th
ACM Conference on Security and Privacy in Wireless and Mobile Networks, Boston, MA, USA, 18–20 July 2017; pp. 219–229.
150. Li, F.; Xiong, P. Practical secure communication for integrating wireless sensor networks into the internet of things. IEEE Sens. J.
2013, 13, 3677–3684. [CrossRef]
151. Gentry, C. Practical identity-based encryption without random oracles. In Proceedings of the Annual International Confer-
ence on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, 28 May–1 June 2006; Springer:
Berlin/Heidelberg, Germany, 2006; pp. 445–464.
152. Sakai, R.; Kasahara, M. Cryptosystems based on pairings. In Proceedings of the Symposium on Cryptography and Information
Security-SCIS’00, Okinawa, Japan, 26–28 January 2000.
153. Phong, L.T.; Matsuoka, H.; Ogata, W. Stateful identity-based encryption scheme: Faster encryption and decryption. In
Proceedings of the ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, 18–20 March 2008;
pp. 381–388.
154. Ma, S. Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 2016, 328, 389–402. [CrossRef]
155. Boneh, D.; Lynn, B.; Shacham, H. Short signatures from the Weil pairing. J. Cryptol. 2004, 17, 297–319. [CrossRef]
156. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System; Technical Report; Manubot. 2009. Available online: https:
//bitcoin.org/bitcoin.pdf (accessed on 25 July 2022).
157. Waters, B. Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. In Proceedings of the Annual
International Cryptology Conference, Santa Barbara, CA, USA, 16–20 August 2009; Springer: Berlin/Heidelberg, Germany, 2009;
pp. 619–636.
158. Li, J.; Wang, Q.; Wang, C.; Cao, N.; Ren, K.; Lou, W. Fuzzy keyword search over encrypted data in cloud computing. In
Proceedings of the IEEE INFOCOM, San Diego, CA, USA, 14–19 March 2010; pp. 1–5.
159. Guo, F.; Susilo, W.; Mu, Y. Distance-based encryption: How to embed fuzziness in biometric-based encryption. IEEE Trans. Inf.
Forensics Secur. 2015, 11, 247–257. [CrossRef]
160. Wu, Q. Uni-Sender Multi-Receiver searchable encryption. In Proceedings of the 2nd IEEE International Conference on Computer
and Communications (ICCC), Chengdu, China, 14–17 October 2016; pp. 223–226.
161. Zhou, R.; Zhang, X.; Du, X.; Wang, X.; Yang, G.; Guizani, M. File-centric multi-key aggregate keyword searchable encryption for
industrial internet of things. IEEE Trans. Ind. Inform. 2018, 14, 3648–3658. [CrossRef]
Sensors 2022, 22, 7567 48 of 50

162. Bond, F.; Foster, R. Linking and extending an open multilingual wordnet. In Proceedings of the 51st Annual Meeting of the
Association for Computational Linguistics (Volume 1: Long Papers), Sofia, Bulgaria, 4–9 August 2013; pp. 1352–1362.
163. Hohenberger, S.; Waters, B. Online/offline attribute-based encryption. In Proceedings of the International Workshop on Public
Key Cryptography, Buenos Aires, Argentina, 26–28 March 2014; Springer: Berlin/Heidelberg, Germany, 2014; pp. 293–310.
164. Wang, C.; Li, W.; Li, Y.; Xu, X. A ciphertext-policy attribute-based encryption scheme supporting keyword search function.
In Proceedings of the International Symposium on Cyberspace Safety and Security, Zhangjiajle, China, 13–15 November 2013;
Springer: Berlin/Heidelberg, Germany, 2013; pp. 377–386.
165. Ning, J.; Xu, J.; Liang, K.; Zhang, F.; Chang, E.C. Passive attacks against searchable encryption. IEEE Trans. Inf. Forensics Secur.
2018, 14, 789–802. [CrossRef]
166. Poh, G.S.; Chin, J.J.; Yau, W.C.; Choo, K.K.R.; Mohamad, M.S. Searchable symmetric encryption: Designs and challenges. ACM
Comput. Surv. 2017, 50, 1–37. [CrossRef]
167. Bösch, C.; Hartel, P.; Jonker, W.; Peter, A. A survey of provably secure searchable encryption. ACM Comput. Surv. 2014, 47, 1–51.
[CrossRef]
168. Stefanov, E.; Papamanthou, C.; Shi, E. Practical dynamic searchable encryption with small leakage. Cryptol. ePrint Arch. 2013.
Available online: https://eprint.iacr.org/2013/832.pdf (accessed on 25 July 2012).
169. Kamara, S.; Papamanthou, C.; Roeder, T. Dynamic searchable symmetric encryption. In Proceedings of the 2012 ACM Conference
on Computer and Communications Security, Raleigh, NC, USA, 16–18 October 2012; pp. 965–976.
170. Green, M.; Hohenberger, S.; Waters, B. Outsourcing the decryption of abe ciphertexts. In Proceedings of the USENIX Security
Symposium, San Francisco, CA, USA, 8–12 August 2011; Volume 2011.
171. Yang, Y.; Liu, X.; Zheng, X.; Rong, C.; Guo, W. Efficient traceable authorization search system for secure cloud storage. IEEE
Trans. Cloud Comput. 2018, 8, 819–832. [CrossRef]
172. Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; De Caro, A.; Enyeart, D.; Ferris, C.; Laventman, G.; Manevich,
Y.; et al. Hyperledger fabric: A distributed operating system for permissioned blockchains. In Proceedings of the 13th EuroSys
Conference, Porto, Portugal, 23–26 April 2018; pp. 1–15.
173. Tahir, S.; Ruj, S.; Rahulamathavan, Y.; Rajarajan, M.; Glackin, C. A new secure and lightweight searchable encryption scheme over
encrypted cloud data. IEEE Trans. Emerg. Top. Comput. 2017, 7, 530–544. [CrossRef]
174. Wood, G. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 2014, 151, 1–32.
175. Goodfellow, I.; Pouget-Abadie, J.; Mirza, M.; Xu, B.; Warde-Farley, D.; Ozair, S.; Courville, A.; Bengio, Y. Generative adversarial
nets. In Proceedings of the Advances in Neural Information Processing Systems, Montreal, QC, Canada, 8–13 December 2014;
pp. 2672–2680.
176. Hinton, G.; Osindero, S.; Welling, M.; Teh, Y.W. Unsupervised discovery of nonlinear structure using contrastive backpropagation.
Cogn. Sci. 2006, 30, 725–731. [CrossRef] [PubMed]
177. Park, J.; Kim, Y.; Eom, I.; Lee, K. Economic load dispatch for piecewise quadratic cost function using Hopfield neural network.
IEEE Trans. Power Syst. 1993, 8, 1030–1038. [CrossRef]
178. González, J.R. CLARUS: User-Centered Privacy and Security in the Cloud. In Proceedings of the 2nd URV Doctoral Workshop in
Computer Science and Mathematics, Tarragona, Spain, 13 November 2015; Publicacions Universitat Rovira i Virgili: Catalunya,
Spain, 2015; p. 29.
179. Cash, D.; Jarecki, S.; Jutla, C.; Krawczyk, H.; Roşu, M.C.; Steiner, M. Highly-scalable searchable symmetric encryption with
support for boolean queries. In Proceedings of the Annual Cryptology Conference, Santa Barbara, CA, USA, 18–22 August 2013;
Springer: Berlin/Heidelberg, Germany, 2013, pp. 353–373.
180. Wang, Q.; Peng, L.; Xiong, H.; Sun, J.; Qin, Z. Ciphertext-policy attribute-based encryption with delegated equality test in cloud
computing. IEEE Access 2017, 6, 760–771. [CrossRef]
181. Zhu, H.; Wang, L.; Ahmad, H.; Niu, X. Key-policy attribute-based encryption with equality test in cloud computing. IEEE Access
2017, 5, 20428–20439. [CrossRef]
182. Lewko, A.; Okamoto, T.; Sahai, A.; Takashima, K.; Waters, B. Fully secure functional encryption: Attribute-based encryption and
(hierarchical) inner product encryption. In Proceedings of the Annual International Conference on the Theory and Applications
of Cryptographic Techniques, Monaco and Nice, France, 30 May–3 June 2010; Springer: Berlin/Heidelberg, Germany, 2010;
pp. 62–91.
183. Park, J.H. Inner-product encryption under standard assumptions. Des. Codes Cryptogr. 2011, 58, 235–257. [CrossRef]
184. Tseng, Y.F.; Gao, S.J. Efficient Subset Predicate Encryption for Internet of Things. In Proceedings of the 2021 IEEE Conference on
Dependable and Secure Computing (DSC), Fukushima, Japan, 30 January–2 February 2021; IEEE: Piscataway, NJ, USA, 2021;
pp. 1–2.
185. Chen, X.; Zhang, F.; Kim, K. Chameleon hashing without key exposure. In Proceedings of the International Conference on
Information Security, Palo Alto, CA, USA, 27–29 September 2004; Springer: Berlin/Heidelberg, Germany, 2004; pp. 87–98.
186. Liang, K.; Au, M.H.; Liu, J.K.; Susilo, W.; Wong, D.S.; Yang, G.; Phuong, T.V.X.; Xie, Q. A DFA-based functional proxy re-encryption
scheme for secure public cloud data sharing. IEEE Trans. Inf. Forensics Secur. 2014, 9, 1667–1680. [CrossRef]
187. He, D.; Chen, J.; Zhang, R. An efficient identity-based blind signature scheme without bilinear pairings. Comput. Electr. Eng.
2011, 37, 444–450. [CrossRef]
Sensors 2022, 22, 7567 49 of 50

188. Agrawal, R.; Kiernan, J.; Srikant, R.; Xu, Y. Order preserving encryption for numeric data. In Proceedings of the 2004 ACM
SIGMOD International Conference on Management of Data, Paris, France, 13–18 June 2004; pp. 563–574.
189. Agrawal, S.; Libert, B.; Stehlé, D. Fully secure functional encryption for inner products, from standard assumptions. In Proceedings
of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 14–18 August 2016; Springer: Berlin/Heidelberg,
Germany, 2016; pp. 333–362.
190. Ananth, P.; Sahai, A. Functional encryption for turing machines. In Proceedings of the Theory of Cryptography Conference,
Beijing, China, 31 October–3 November 2016; Springer: Berlin/Heidelberg, Germany, 2016; pp. 125–153.
191. Wrona, K. Securing the Internet of Things a military perspective. In Proceedings of the 2015 IEEE 2nd World Forum on Internet
of Things (WF-IoT), Milan, Italy, 14–16 December 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 502–507.
192. Abdalla, M.; Catalano, D.; Fiore, D.; Gay, R.; Ursu, B. Multi-input functional encryption for inner products: Function-hiding
realizations and constructions without pairings. In Proceedings of the Annual International Cryptology Conference, Santa
Barbara, CA, USA, 19–23 August 2018; Springer: Berlin/Heidelberg, Germany, 2018; pp. 597–627.
193. Truex, S.; Baracaldo, N.; Anwar, A.; Steinke, T.; Ludwig, H.; Zhang, R.; Zhou, Y. A hybrid approach to privacy-preserving federated
learning. In Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, London, UK, 15 November 2019;
pp. 1–11.
194. LeCun, Y.; Cortes, C.; Burges, C. MNIST Handwritten Digit Database. 2010, Volume 7, p. 23. Available online: http:
//yann.Lecun.Com/exdb/mnist (accessed on 15 November 2021).
195. Kim, S.; Lewi, K.; Mandal, A.; Montgomery, H.; Roy, A.; Wu, D.J. Function-hiding inner product encryption is practical. In
Proceedings of the International Conference on Security and Cryptography for Networks, Amalfi, Italy, 5–7 September 2018;
Springer: Berlin/Heidelberg, Germany, 2018; pp. 544–562.
196. Bishop, A.; Jain, A.; Kowalczyk, L. Function-hiding inner product encryption. In Proceedings of the International Conference on
the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, 29 November–3 December 2015;
Springer: Berlin/Heidelberg, Germany, 2015; pp. 470–491.
197. Liu, J.; Li, W.; Karame, G.O.; Asokan, N. Toward fairness of cryptocurrency payments. IEEE Secur. Priv. 2018, 16, 81–89.
[CrossRef]
198. Zhang, Y.; Deng, R.H.; Liu, X.; Zheng, D. Blockchain based efficient and robust fair payment for outsourcing services in cloud
computing. Inf. Sci. 2018, 462, 262–277. [CrossRef]
199. Arm, o A.; Basin, D.; Boichut, Y.; Chevalier, Y.; Compagna, L.; Cuéllar, J.; Drielsma, P.H.; Heám, P.C.; Kouchnarenko, O.; Mantovani,
J.; et al. The AVISPA tool for the automated validation of internet security protocols and applications. In Proceedings of the
International Conference on Computer Aided Verification, San Francisco, CA, USA, 18–24 July 2005; Springer: Berlin/Heidelberg,
Germany, 2005; pp. 281–285.
200. Zheng, Q.; Xu, S.; Ateniese, G. VABKS: Verifiable attribute-based keyword search over outsourced encrypted data. In Proceedings
of the IEEE INFOCOM 2014—IEEE Conference on Computer Communications, Toronto, ON, Canada, 27 April–2 May, 2014;
IEEE: Piscataway, NJ, USA, 2014; pp. 522–530.
201. Wang, Q.; Hu, S.; Ren, K.; He, M.; Du, M.; Wang, Z. CloudBI: Practical privacy-preserving outsourcing of biometric identification in
the cloud. In Proceedings of the European Symposium on Research in Computer Security, Vienna, Austria, 21–25 September 2015;
Springer: Berlin/Heidelberg, Germany, 2015; pp. 186–205.
202. Huang, Q.; Ma, Z.; Yang, Y.; Niu, X.; Fu, J. Attribute based DRM scheme with dynamic usage control in cloud computing. China
Commun. 2014, 11, 50–63. [CrossRef]
203. Stankovic, J.A. Research directions for the internet of things. IEEE Internet Things J. 2014, 1, 3–9. [CrossRef]
204. Naru, E.R.; Saini, H.; Sharma, M. A recent review on lightweight cryptography in IoT. In Proceedings of the 2017 International
Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 10–11 February 2017; IEEE:
Piscataway, NJ, USA, 2017; pp. 887–890.
205. Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions.
Future Gener. Comput. Syst. 2013, 29, 1645–1660. [CrossRef]
206. Lee, I.; Lee, K. The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Bus. Horiz. 2015,
58, 431–440. [CrossRef]
207. Fagan, M.; Megas, K.; Scarfone, K.; Smith, M. Recommendations for IoT Device Manufacturers: Foundational Activities and Core Device
Cybersecurity Capability Baseline, 2nd ed.; Technical Report; National Institute of Standards and Technology: Gaithersburg, MD,
USA, 2020.
208. Kanuparthi, A.; Karri, R.; Addepalli, S. Hardware and embedded security in the context of internet of things. In Proceedings of
the 2013 ACM workshop on Security, Privacy & Dependability for Cyber Vehicles, Berlin, Germany, 4 November 2013; pp. 61–64.
209. Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of things: A survey on enabling technologies,
protocols, and applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [CrossRef]
210. Li, B.; Lin, J.; Li, F.; Wang, Q.; Li, Q.; Jing, J.; Wang, C. Certificate transparency in the wild: Exploring the reliability of
monitors. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK,
11–15 November 2019; pp. 2505–2520.
211. Xu, R.; Joshi, J. Trustworthy and transparent third-party authority. ACM Trans. Internet Technol. 2020, 20, 1–23. [CrossRef]
Sensors 2022, 22, 7567 50 of 50

212. Xu, R.; Li, C.; Joshi, J. Blockchain-based Transparency Framework for Privacy Preserving Third-party Services. IEEE Trans.
Dependable Secur. Comput. 2022. [CrossRef]
213. Rahman, M.S.; Hossam-E-Haider, M. Quantum IoT: A quantum approach in IoT security maintenance. In Proceedings of the 2019
International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), Dhaka, Bangladesh, 10–12 January
2019; IEEE: Piscataway, NJ, USA, 2019; pp. 269–272.
214. Schöffel, M.; Lauer, F.; Rheinländer, C.C.; Wehn, N. Secure IoT in the Era of Quantum Computers—Where Are the Bottlenecks?
Sensors 2022, 22, 2484. [CrossRef]

You might also like