云环境下密文数据的连接关键词检索技术研究
发布时间:2021-04-28 21:07
随着云计算、大数据等新兴信息技术的迅速发展,大量资源密集型计算任务被外包到云服务器。云计算模式给用户提供高质量数据服务的同时,也大大减轻了资源受限用户对数据的计算和存储开销。然而,云环境下数据所有权与管理权分离成为常态,这使得传统针对明文数据的检索方法无法直接应用于云环境下密文数据的检索。因此,如何实现云环境下密文数据的高效检索已经成为云计算安全领域的研究热点之一。可搜索加密技术通过建立以关键词为核心的数据索引来实现密文的高效检索,得到了学术界和产业界的广泛关注。现有的可搜索加密方案主要围绕以下三方面展开研究:首先,研究高效密文检索方法,降低通信和计算复杂度,实现对大规模数据集的快速检索;其次,研究前/后向安全的密文检索方法,支持动态数据的安全检索;最后,研究多模式密文检索方法,设计符合实际检索场景的查询方案。连接关键词检索作为多模式检索的典型方式之一,在效率和安全性方面仍然存在不足之处。首先,在多用户数据检索场景中,授权用户执行数据检索时受到文档解密权限的限制,从而导致服务器返回的检索结果中可能存在用户无法解密的数据,这无疑增加了系统的通信和计算开销;其次,在动态数据检索场景中,现有...
【文章来源】:西安电子科技大学陕西省 211工程院校 教育部直属院校
【文章页数】:103 页
【学位级别】:博士
【文章目录】:
摘要
ABSTRACT
List of Abbreviations
Chapter 1 Introduction
1.1 Background
1.2 Related Work
1.3 Contributions
1.4 Organization
Chapter 2 Preliminaries
2.1 Bilinear Pairings
2.2 Anonymous Attribute-based Encryption
2.3 Additive Homomorphic Encryption
2.4 Polynomial Representation of Sets
2.5 Searchable Symmetric Encryption
2.6 Conclusion
Chapter 3 Conjunctive Keyword Search in Multi-user Setting
3.1 Overview
3.2 Problem Formulation
3.2.1 System Model
3.2.2 Single-owner/Multi-user Searchable Encryption (SMSE)
3.2.3 Design Goals
3.3 SMSE Scheme with Fast Decryption
3.3.1 High Description
3.3.2 Server-side Match Technique for Anonymous ABE
3.3.3 Our Construction
3.4 Analysis of Our Proposed Scheme
3.4.1 Security Analysis
3.4.2 Comparison
3.5 Performance Evaluation
3.6 Conclusion
Chapter 4 Conjunctive Keyword Search with Forward Security
4.1 Overview
4.2 Problem Formulation
4.2.1 Dynamic Searchable Encryption
4.2.2 Security Definition
4.3 The Forward Oblivious Cross-Tags FOXT Construction
4.3.1 High Description
4.3.2 Basic Construction
4.3.3 Enhanced Construction
4.4 Analysis of Our Proposed Scheme
4.4.1 Security Analysis
4.4.2 Comparison
4.5 Performance Evaluation
4.6 Conclusion
Chapter 5 Conjunctive Keyword Search Scheme with Search Pattern Hidden
5.1 Overview
5.2 Problem Formulation
5.2.1 System Model
5.2.2 Searchable Encryption with Search Pattern Hidden
5.3 Analysis of Wang et al.’s Scheme
5.3.1 Overview of the Scheme
5.3.2 Analysis of the Scheme
5.4 Our Proposed Scheme
5.4.1 Multiplicative Homomorphic Operation
5.4.2 Overview of Our Construction
5.4.3 The Concrete Construction
5.5 Analysis of Our Proposed Scheme
5.5.1 Security Analysis
5.5.2 Comparison
5.6 Performance Evaluation
5.7 Summary
Chapter 6 Conclusion and Future Work
6.1 Summary
6.2 Future Work
Bibliography
Acknowledgement
作者简介
本文编号:3166175
【文章来源】:西安电子科技大学陕西省 211工程院校 教育部直属院校
【文章页数】:103 页
【学位级别】:博士
【文章目录】:
摘要
ABSTRACT
List of Abbreviations
Chapter 1 Introduction
1.1 Background
1.2 Related Work
1.3 Contributions
1.4 Organization
Chapter 2 Preliminaries
2.1 Bilinear Pairings
2.2 Anonymous Attribute-based Encryption
2.3 Additive Homomorphic Encryption
2.4 Polynomial Representation of Sets
2.5 Searchable Symmetric Encryption
2.6 Conclusion
Chapter 3 Conjunctive Keyword Search in Multi-user Setting
3.1 Overview
3.2 Problem Formulation
3.2.1 System Model
3.2.2 Single-owner/Multi-user Searchable Encryption (SMSE)
3.2.3 Design Goals
3.3 SMSE Scheme with Fast Decryption
3.3.1 High Description
3.3.2 Server-side Match Technique for Anonymous ABE
3.3.3 Our Construction
3.4 Analysis of Our Proposed Scheme
3.4.1 Security Analysis
3.4.2 Comparison
3.5 Performance Evaluation
3.6 Conclusion
Chapter 4 Conjunctive Keyword Search with Forward Security
4.1 Overview
4.2 Problem Formulation
4.2.1 Dynamic Searchable Encryption
4.2.2 Security Definition
4.3 The Forward Oblivious Cross-Tags FOXT Construction
4.3.1 High Description
4.3.2 Basic Construction
4.3.3 Enhanced Construction
4.4 Analysis of Our Proposed Scheme
4.4.1 Security Analysis
4.4.2 Comparison
4.5 Performance Evaluation
4.6 Conclusion
Chapter 5 Conjunctive Keyword Search Scheme with Search Pattern Hidden
5.1 Overview
5.2 Problem Formulation
5.2.1 System Model
5.2.2 Searchable Encryption with Search Pattern Hidden
5.3 Analysis of Wang et al.’s Scheme
5.3.1 Overview of the Scheme
5.3.2 Analysis of the Scheme
5.4 Our Proposed Scheme
5.4.1 Multiplicative Homomorphic Operation
5.4.2 Overview of Our Construction
5.4.3 The Concrete Construction
5.5 Analysis of Our Proposed Scheme
5.5.1 Security Analysis
5.5.2 Comparison
5.6 Performance Evaluation
5.7 Summary
Chapter 6 Conclusion and Future Work
6.1 Summary
6.2 Future Work
Bibliography
Acknowledgement
作者简介
本文编号:3166175
本文链接:https://www.wllwen.com/kejilunwen/ruanjiangongchenglunwen/3166175.html