当前位置:主页 > 科技论文 > 软件论文 >

云计算中可搜索加密方案的研究

发布时间:2019-07-03 18:04
【摘要】:云计算作为新兴产业,在近几年得到迅速发展。越来越多的个人用户或企业机构愿意将本地数据存放到云端服务器,从而享受云端所提供的庞大的计算资源、按需的低成本网络访问、以及便捷的数据存储服务。同时还避免了本地数据管理和系统维护的麻烦。云计算虽然有很多优势,但其安全问题也一直是人们所担心的。为了保护用户数据的隐私性,数据在上传之前通常先加密,以密文的形式存储到云端。在数据加密的情况下,若按照用户需要去搜索特定的文件,普通的明文搜索方法则变得不再适用。为解决这一问题,可搜索加密应运而生,并成为近年来云安全领域的研究热点。本文对云计算中可搜索加密技术进行了研究,同时提出3个不同的方案:(1)基于倒排矩阵,提出了一个保护隐私性的可搜索加密方案。构造加密的倒排矩阵索引结构,将索引和密文一同上传给云服务器,凭借关键词搜索陷门实现密文的安全搜索。安全性证明和实验分析表明了该方案的安全性和高效性。(2)考虑到云服务器可能存在恶意行为,会导致返回给用户的密文集合不完整或不正确,为此提出一个可验证的可搜索加密方案。方案中给出了一个可验证机制,来防止云服务器对用户的欺骗。同时,使用倒排索引结构,实现了最优的搜索效率,即次线性搜索。通过安全性分析,证明了该方案满足自适应安全性和可靠性。实验结果显示方案的搜索效率较高,验证代价较小。(3)为了提高用户的搜索体验,提出一个可验证的连接关键词排名搜索方案。该方案同时实现了连接关键词次线性搜索、相关度排序、结果可验证的功能。在自适应语义安全性和可靠性的定义下证明了方案的安全性。通过性能分析说明了方案具有搜索高效,验证开销小等优势。
[Abstract]:Cloud computing, as a new industry, has been developed rapidly in recent years. More and more individual users or enterprises are willing to store local data on cloud servers, thus enjoying the huge computing resources provided by the cloud, on-demand low-cost network access, and convenient data storage services. At the same time, it also avoids the trouble of local data management and system maintenance. Although cloud computing has many advantages, its security has always been a concern. In order to protect the privacy of user data, the data is usually encrypted before uploading and stored in the cloud in the form of ciphertext. In the case of data encryption, if the user needs to search for specific files, the ordinary clear text search method is no longer applicable. In order to solve this problem, searchable encryption emerges as the times require, and has become a hot research topic in the field of cloud security in recent years. In this paper, the search encryption technology in cloud computing is studied, and three different schemes are proposed: (1) based on inverted matrix, a searchable encryption scheme to protect privacy is proposed. The encrypted inverted matrix index structure is constructed, the index and ciphertext are uploaded to the cloud server together, and the secure search of ciphertext is realized by keyword search trap door. The security proof and experimental analysis show that the scheme is secure and efficient. (2) considering that the cloud server may have malicious behavior, the ciphertext set returned to the user is incomplete or incorrect, so a verifiable searchable encryption scheme is proposed. A verifiable mechanism is proposed to prevent cloud servers from deceiving users. At the same time, the inverted index structure is used to realize the optimal search efficiency, that is, sublinear search. Through security analysis, it is proved that the scheme satisfies adaptive security and reliability. The experimental results show that the search efficiency of the scheme is high and the verification cost is low. (3) in order to improve the search experience of users, a verifiable search scheme for connection keyword ranking is proposed. At the same time, the scheme realizes the function of connection key sublinear search, correlation sorting and verifiable results. The security of the scheme is proved under the definition of adaptive semantic security and reliability. The performance analysis shows that the scheme has the advantages of high search efficiency and low verification cost.
【学位授予单位】:青岛大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TP309.7

【参考文献】

相关期刊论文 前2条

1 王尚平;刘利军;张亚玲;;可验证的基于词典的可搜索加密方案[J];软件学报;2016年05期

2 李经纬;贾春福;刘哲理;李进;李敏;;可搜索加密技术研究综述[J];软件学报;2015年01期



本文编号:2509575

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/ruanjiangongchenglunwen/2509575.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户10f1e***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com