高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

一种基于云存储的多服务器多关键词可搜索加密方案

黄海平 杜建澎 戴华 王汝传

黄海平, 杜建澎, 戴华, 王汝传. 一种基于云存储的多服务器多关键词可搜索加密方案[J]. 电子与信息学报, 2017, 39(2): 389-396. doi: 10.11999/JEIT160338
引用本文: 黄海平, 杜建澎, 戴华, 王汝传. 一种基于云存储的多服务器多关键词可搜索加密方案[J]. 电子与信息学报, 2017, 39(2): 389-396. doi: 10.11999/JEIT160338
HUANG Haiping, DU Jianpeng, DAI Hua, WANG Ruchuan. Multi-sever Multi-keyword Searchable Encryption Scheme Based on Cloud Storage[J]. Journal of Electronics & Information Technology, 2017, 39(2): 389-396. doi: 10.11999/JEIT160338
Citation: HUANG Haiping, DU Jianpeng, DAI Hua, WANG Ruchuan. Multi-sever Multi-keyword Searchable Encryption Scheme Based on Cloud Storage[J]. Journal of Electronics & Information Technology, 2017, 39(2): 389-396. doi: 10.11999/JEIT160338

一种基于云存储的多服务器多关键词可搜索加密方案

doi: 10.11999/JEIT160338
基金项目: 

国家自然科学基金(61373017, 61373138, 61300240, 61672297),国家博士后基金(2015M570468, 2016T90485),江苏省自然科学基金(BK20151511),江苏省六大人才高峰项目(DZXX- 017),江苏省无线传感网高技术研究重点实验室基金(WSNLBZY 201516),江苏省研究生培养创新工程项目(KYLX15_0853)

Multi-sever Multi-keyword Searchable Encryption Scheme Based on Cloud Storage

Funds: 

The National Natural Science Foundation of China (61373017, 61373138, 61300240, 61672297), The National Postdoctoral Foundation of China (2015M570468, 2016T90485), The Natural Science Foundation of Jiangsu Province (BK20151511), The Six Major Talent Peak Foundation in Jiangsu Province (DZXX-017), The High Technology Research Key Laboratory of Wireless Sensor Network Foundation of Jiangsu Province (WSNLBZY 201516), The Graduate Education Innovation Project of Jiangsu Province (KYLX15_0853)

  • 摘要: 在可搜索加密的云服务中,数据拥有者往往更希望将数据文件以密文的形式分别存储到多个云服务器,从而提高授权用户对云端数据的检索效率以及对大型数据的处理能力。基于此,该文提出一种基于云存储的多服务器多关键词多用户可搜索加密方案,该方案被证明是IND-CKA(adaptive Chosen Keyword Attack)安全的,且同时具备关键词陷门的安全性。相对于单服务器可搜索加密,该方案在保证数据机密性的前提下能够对其进行高效检索,并能够在关键字索引中不完全包含所检索的多个关键词或者不存在某个文件包含所有被检索的多个关键词的情况下,更精确地进行检索。
  • SONG X D, WAGNER D, and PERRIG A. Practical techniques for searches on encrypted data[C]. IEEE Symposium on Security and Privacy, Berkeley, USA, 2000: 44-55.
    BONEH D and FRANKLIN M. Identity-based encryption from the weil pairing[C]. Advances in Cryptology-CRYPTO 2001-21st Annual International Cryptology Conference, California, USA, 2001: 213-229.
    BONEH D, CRESCENZO G, OSTROVSKY R, et al. Public key encryption with keyword search[C]. Proceedings of EUROCRYPT 2004, Interlaken, Switzerland, 2004: 506-522.
    KAMARA S, PAPAMANTHOU C, and ROEDER T. Dynamic searchable symmetric encryption[C]. CCS 2012 19th ACM Conference on Computer and Communications Security, Raleigh, USA, 2012: 965-976.
    RHEE H S, PARK J H, SUSILO W, et al. Improved searchable public key encryption with designated tester[C]. ASIACCS09 Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia, 2009: 376-379.
    HU C and LIU P. A secure searchable public key encryption scheme with a designated tester against keyword guessing attacks and its extension[C]. Communications in Computer and Information Science, Jinan, China, 2011: 131-136.
    ZIRTOL KOBRA AMIRI, NOROOZI MAHNAZ, and ESLAMI ZIBA. Multi-user searchable encryption scheme with general access structure[C]. 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI), Tehran, Iran, 2015: 399-404.
    LI J, LI J, CHEN X, et al. Privacy-Preserving data utilization in hybrid clouds[J]. Future Generation Computer Systems, 2014, 30(1): 98-106. doi: 10.1016/j.future.2013.06.011.
    CUI B, LIU Z, and WANG L. Key-Aggregate Searchable Encryption (KASE) for group data sharing via cloud storage[J]. IEEE Transactions on Computers, 2015, 65(8): 2374-2385. doi: 10.1109/TC.2015.2389959.
    PENG Yanguo, CUI Jiangtao, PENG Changgen, et al. Certificateless public key encryption with keyword search[J]. China Communications, 2014, 11(11): 100-113. doi: 10.1109 /CC.2014.7004528.
    GOLLE P, STADDON J, and WATERS B. Secure conjunctive keyword search over encrypted data[C]. International Conference on Applied Cryptography and Network Security, Huangshan, China, 2004: 31-45.
    YANG Yang, MA Maode, and LIN Bogang. Proxy re-encryption conjunctive keyword search against keyword guessing attack[C]. Computing, Communications and IT Applications Conference (ComComAp), Hong Kong, China, 2013: 125-130.
    KERSCHBAUM F. Secure conjunctive keyword searches for unstructured text[C]. International Conference on Network and System Security, Milan, Italia, 2011: 285-289.
    XIA Zhihua, WANG Xinhui, SUN Xingming, el al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(2): 340-352. doi: 10.1109/ TPDS.2015.2401003.
  • 加载中
计量
  • 文章访问数:  1866
  • HTML全文浏览量:  359
  • PDF下载量:  619
  • 被引次数: 0
出版历程
  • 收稿日期:  2016-04-07
  • 修回日期:  2016-09-01
  • 刊出日期:  2017-02-19

目录

    /

    返回文章
    返回