云计算中模糊可搜索加密方案的分析-analysis of fuzzy searchable encryption scheme in cloud computing.docxVIP

  • 10
  • 0
  • 约5.75万字
  • 约 55页
  • 2018-06-05 发布于上海
  • 举报

云计算中模糊可搜索加密方案的分析-analysis of fuzzy searchable encryption scheme in cloud computing.docx

云计算中模糊可搜索加密方案的分析-analysis of fuzzy searchable encryption scheme in cloud computing

摘要随着云计算的普及,越来越多的用户将自己的敏感数据外包存储到云服务器上.通 过外包数据到云服务器上,用户在减轻数据管理负担的同时还可以享受到高质量的数 据存储服务.由于云环境下,服务器不是完全可信的,为了保护不可信服务器上用户敏 感数据的隐私性,数据上传之前要进行加密.这使得对密文数据的高效检索成为一个 具有挑战性的问题.一个最普遍的解决方法就是可搜索加密,可搜索加密技术允许服 务器对用户的加密数据进行检索而服务器不会获得任何明文信息.设计一个高效的可 搜索加密方案对提高系统可用性有至关重要的作用.本文在对现有可搜索加密方案进 行深入研究的基础上,提出了一个云计算中可验证的模糊关键词检索方案.本文的主 要工作有以下几方面:1. 研究了现有的各种可搜索加密方案,重点研究了对称可搜索加密方案,总结了现 有方案的不足.2. 基于半可信但好奇的服务器 (semi-honest-but-curious) 模型, 首次研究了可验证模糊 关键词搜索的问题,并基于符号树提出了一个新的高效的可验证的模糊关键词搜 索方案.该方案不仅支持模糊关键词搜索,而且获得搜索结果的可验证性.3. 通过严格的安全性分析,证明了提出的方案在半可信但好奇的服务器模型下是安 全的并且可以正确有效地实现可验证的模糊关键词搜索.对方案进行了仿真,结 果表明我们的方法是高效的.关键词: 云计算 可搜索加密 可验证模糊搜索 数据隐私AbstractAs cloud computing becomes prevalent, more and more sensitive data is being centralized into the cloud by users. By outsourcing their data in the cloud, users can obtain high quality data storage services, while reducing the burden of data storage and maintenance. To maintain the confidentiality of sensitive user data against untrusted servers, the data should be encrypted before they are uploaded. However, this raises a new challenge for performing search over the encrypted data efficiently. one of the most popular solutions is searchable encryption, which allows server to search on the user’s encrypted data while preventing the server from learn any plaintext information. It is important to design an efficient searchable encryption scheme for improving the system usability. Based on deep analysis and research on the exist searchable encryption schemes, this paper proposes a efficient verifiable fuzzy keyword search over en- crypted data in cloud computing. The main points of this paper are as follows:The paper studied the exist searchable encryption schemes and focused on the symmetric searchable setting, and then summarizes the advantages of the exist schemes.Based on the semi-honest-but-curious server model, in the paper,for the first time we for- malize the problem of verifiable fuzzy keyword search over encrypted data. we propose a new verifiable fuzzy keywo

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档