期刊文献+

基于Merkle哈希树的可验证密文检索方案 被引量:8

A Verifiable Ciphertext Retrieval Scheme Based on Merkle Hash Tree
下载PDF
导出
摘要 在半诚实且好奇的云服务器模型下,为通过构建安全倒排索引和认证数据结构,达到快速检索密文和验证服务器行为的目的,文章提出一个基于Merkle哈希树的可验证密文检索方案。方案使用Lucene搜索引擎工具包,通过改进传统明文索引结构得到适于密文检索的安全倒排索引,以保证检索的效率和安全性。此外,文章基于Merkle哈希树结构实现了检索结果的完整性和正确性验证。实验分析表明,文章方案不仅满足用户对外包私密数据的高效检索和数据安全要求,而且能准确且高效地验证云服务器可能存在的篡改、删除和伪造等不法行为。 In the model of the semi-honest and curious server, in order to achieve the purpose of fast retrieval of ciphertext and verification of server behaviors by constructing the secure inverted index and the authentication data structure, this paper proposes a verifiable ciphertext retrieval scheme based on Merkle Hash tree. The scheme uses the Lucene search engine to o lk it to improve the traditional plaintext index structure to get the secure inverted index which is suitable fo r the ciphertext retrieval, which ensures the efficiency and security of retrieval. In addition, this paper implements the verification of the completeness and correctness of the retrieval results based on M erkle Hash tree structure. Experimental analysis shows that this scheme not only satisfies the userfs efficient retrieval requirement on outsourced private data and data security requirement, but also can accurately and efficiently verify the illegal acts of tampering, deletion, forgery and others that exist on cloud server.
出处 《信息网络安全》 CSCD 2017年第4期1-8,共8页 Netinfo Security
基金 国家自然科学基金[61602118 61572010 61472074] 福建省自然科学基金[2015J01240] 福建省教育厅科技项目[JK2014009] 福州市科技计划项目[2014-G-80] 福建师范大学校创新团队[IRTL1207]
关键词 云存储 可搜索加密 倒排索引 Merkle哈希树 完整性验证 cloud storage searchable encryption inverted index Merkle Hash tree integrity checking
  • 相关文献

参考文献5

二级参考文献127

  • 1Amazon. Amazon S3. http://aws.amazon.com/s3/.
  • 2Windows azure, http://www.microsoft.com/windowsazure/.
  • 3Weber T. Cloud computing after Amazon and Sony: Ready for primetime? 2011. http://www.bbc.co.uk/news/business-13451990.
  • 4Song D, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proc. of the 2000 IEEE Syrup. on Security and Privacy. Berkeley: IEEE Computer Society, 2000.44-55. [doi: 10. 1109/SECPRI.2000.848445].
  • 5Waters B, Balfanz D, Durfee G, Smetters D. Building an encrypted and searchable audit log. In: Proc. of the 1 lth Annual Network and Distributed System Security Symp. San Diego: The Internet Society, 2004. http://www.isoc.org/isoc/conferences/ndss/04/ proceedings/.
  • 6Goh E. Secure Indexes. In: Cryptology ePrint Archive. 2003. http://eprint.iacr.org/2OO3/216.pdf.
  • 7Golle P, Staddon J, Waters B. Secure conjunctive keyword search over encrypted data. In: Proc. of the 2nd Int'l Conf. on Applied Cryptography and Network Security (ACNS). Berlin, Heidelberg: Springer-Verlag, 2004. 31-45. [doi: 10.1007/978-3-540-24852- 1_3].
  • 8Wang C, Cao N, Li J, Ren K, Lou WJ. Secure ranked keyword search over encrypted cloud data. In: Proc. of the IEEE 30th Int'l Conf. on Distributed Computing Systems (ICDCS). Genoa: IEEE Computer Society, 2010. 253-262. [doi: 10.1109/ICDCS. 2010.34].
  • 9Li J, Wang Q, Wang C, Cao M, Ren K, Lou WJ. Fuzzy keyword search over encrypted data in cloud computing. In: Proc. of the IEEE INFOCOM Mini-Conf. San Diego: IEEE Computer Society, 2010. 1-5. [doi: 10.1109/INFCOM.2010.5462196].
  • 10Li M, Yu S, Cao N Lou W. Authorized private keyword search over encrypted data in cloud computing. In: Proc. of the IEEE Int'l Conf. on Distributed Computing Systems (ICDCS). Minneapolis: IEEE Computer Society, 2011. 383-392. [doi: 10.1109/ICDCS. 2011.55].

共引文献185

同被引文献64

引证文献8

二级引证文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部