期刊文献+

分级管理权限匿名多用户云加密搜索方案 被引量:2

Anonymous Multi-user Searchable Encryption Scheme with Hierarchial Permission Management
下载PDF
导出
摘要 针对目前云计算环境下多用户加密搜索方案存在的问题,首先提出了一个基本的多用户加密搜索方案,然后将这个基本方案延伸为匿名的分级管理权限的多用户加密搜索方案。与已有的大多数方案相比,该方案不仅实现了对关键字信息的保护,也实现了对用户身份隐私的保护;同时数据拥有者可以直接控制用户查询权限,而不是云端服务器。此外,通过采用一种特殊的查询密钥生成规则,实现了分级管理用户的查询权限。安全分析表明该方案是安全的,同时性能分析及实验数据表明该方案是实际可行的。 To deal with the existing problems of multi-user searchable encryption schemes in the cloud computing,we firstly proposed a basic multi-user searchable encryption scheme,and then extended this basic scheme to a multi-user searchable encryption scheme with anonymous hierarchical permission management.Compared with existing schemes,our scheme not only achieves privacy preserving in both of the searching content and users' identities,but also allows the data owner to directly control the dynamic updating of query permission.Additionally,our scheme realizes the hierarchical users' query permission management by adopting a specific query key generation rule.The security of our scheme was illustrated by security analysis.Performance evaluation and experimental result show that our scheme is practical and feasible.
出处 《计算机科学》 CSCD 北大核心 2016年第2期159-162,174,共5页 Computer Science
关键词 查询 匿名查询 多用户加密搜索 分级管理权限 earch Anonymous query Multi-user searchable encryption Hierarchical permission management
  • 相关文献

参考文献4

二级参考文献82

  • 1杨铭熙,罗蛟,李腊元.多源网络编码签名[J].China Communications,2010,7(1):131-137. 被引量:8
  • 2Amazon. Amazon S3. http://aws.amazon.com/s3/.
  • 3Windows azure, http://www.microsoft.com/windowsazure/.
  • 4Weber T. Cloud computing after Amazon and Sony: Ready for primetime? 2011. http://www.bbc.co.uk/news/business-13451990.
  • 5Song D, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proc. of the 2000 IEEE Syrup. on Security and Privacy. Berkeley: IEEE Computer Society, 2000.44-55. [doi: 10. 1109/SECPRI.2000.848445].
  • 6Waters B, Balfanz D, Durfee G, Smetters D. Building an encrypted and searchable audit log. In: Proc. of the 1 lth Annual Network and Distributed System Security Symp. San Diego: The Internet Society, 2004. http://www.isoc.org/isoc/conferences/ndss/04/ proceedings/.
  • 7Goh E. Secure Indexes. In: Cryptology ePrint Archive. 2003. http://eprint.iacr.org/2OO3/216.pdf.
  • 8Golle P, Staddon J, Waters B. Secure conjunctive keyword search over encrypted data. In: Proc. of the 2nd Int'l Conf. on Applied Cryptography and Network Security (ACNS). Berlin, Heidelberg: Springer-Verlag, 2004. 31-45. [doi: 10.1007/978-3-540-24852- 1_3].
  • 9Wang C, Cao N, Li J, Ren K, Lou WJ. Secure ranked keyword search over encrypted cloud data. In: Proc. of the IEEE 30th Int'l Conf. on Distributed Computing Systems (ICDCS). Genoa: IEEE Computer Society, 2010. 253-262. [doi: 10.1109/ICDCS. 2010.34].
  • 10Li J, Wang Q, Wang C, Cao M, Ren K, Lou WJ. Fuzzy keyword search over encrypted data in cloud computing. In: Proc. of the IEEE INFOCOM Mini-Conf. San Diego: IEEE Computer Society, 2010. 1-5. [doi: 10.1109/INFCOM.2010.5462196].

共引文献96

同被引文献12

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部