期刊文献+

云环境下个人医疗信息的密文检索方法研究 被引量:1

CIPHERTEXT RETRIEVAL METHOD OF PERSONAL MEDICAL INFORMATION IN CLOUD ENVIRONMENT
下载PDF
导出
摘要 针对云环境下个人医疗信息检索时出现的隐私问题,设计一种带有身份认证的公钥密文检索方法。采用RSA加密算法与SHA哈希算法对检索的关键词进行加密,先利用SHA对不同的关键词生成hash值,以防止检索时将关键词暴露给云服务器,接着用RSA公钥对关键词的hash值进行加密,并保存关键词密文。用户检索时,先用自己的私钥对采用相同SHA哈希算法生成的关键词hash值加密,同时加入用私钥对身份加密的数字签名信息,并一起上传云服务器。服务器检索时,利用用户的公钥进行解密,得到身份验证和关键词hash值。服务器先对身份进行认证,认证通过后再用公钥对关键词hash值加密,然后与保存的关键词密文进行匹配,相同则返回密文数据,不同则提示查询出错。此外对个人医疗数据的其他字段采用DES与RSA的混合加密方式。该方法不仅保障了系统的性能,而且有效地保护了用户数据的机密性与隐私性。 Aiming at the privacy problem of personal medical information retrieval in cloud environment,this paper designs a method of public key ciphertext retrieval with identity authentication. The RSA encryption algorithm and the SHA hash algorithm are used to encrypt the search keywords. SHA is used to generate hash values for different keywords to prevent the keywords from being exposed to the cloud server,and then use the RSA public key to encrypt the hash value of the keyword and save the keyword ciphertext. When the user retrieves,he encrypts the keyword hash with the same SHA hash algorithm with his own private key. At the same time,it adds a private key to the identity of the encrypted digital signature information,and uploads the cloud server. When the server retrieves,we use the user 's public key to decrypt and get authentication and keyword hash. The server first authenticates the identity,until the authentication passes,and we encrypt the keyword hash with the public key. Then we match the keyword with the saved ciphertext,the same is returned cipher text data,and different suggested that the query error. In addition,the other fields of personal medical data,we use DES and RSA mixed encryption. This method not only ensures the performance of the system,but also effectively protects the confidentiality and privacy of user data.
出处 《计算机应用与软件》 2017年第9期166-169,共4页 Computer Applications and Software
关键词 云环境 个人医疗信息 密文检索 身份认证 Cloud environment Personal medical information Ciphertext retrieval Identity authentication
  • 相关文献

参考文献5

二级参考文献73

  • 1Amazon. Amazon S3. http://aws.amazon.com/s3/.
  • 2Windows azure, http://www.microsoft.com/windowsazure/.
  • 3Weber T. Cloud computing after Amazon and Sony: Ready for primetime? 2011. http://www.bbc.co.uk/news/business-13451990.
  • 4Song D, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proc. of the 2000 IEEE Syrup. on Security and Privacy. Berkeley: IEEE Computer Society, 2000.44-55. [doi: 10. 1109/SECPRI.2000.848445].
  • 5Waters B, Balfanz D, Durfee G, Smetters D. Building an encrypted and searchable audit log. In: Proc. of the 1 lth Annual Network and Distributed System Security Symp. San Diego: The Internet Society, 2004. http://www.isoc.org/isoc/conferences/ndss/04/ proceedings/.
  • 6Goh E. Secure Indexes. In: Cryptology ePrint Archive. 2003. http://eprint.iacr.org/2OO3/216.pdf.
  • 7Golle P, Staddon J, Waters B. Secure conjunctive keyword search over encrypted data. In: Proc. of the 2nd Int'l Conf. on Applied Cryptography and Network Security (ACNS). Berlin, Heidelberg: Springer-Verlag, 2004. 31-45. [doi: 10.1007/978-3-540-24852- 1_3].
  • 8Wang C, Cao N, Li J, Ren K, Lou WJ. Secure ranked keyword search over encrypted cloud data. In: Proc. of the IEEE 30th Int'l Conf. on Distributed Computing Systems (ICDCS). Genoa: IEEE Computer Society, 2010. 253-262. [doi: 10.1109/ICDCS. 2010.34].
  • 9Li J, Wang Q, Wang C, Cao M, Ren K, Lou WJ. Fuzzy keyword search over encrypted data in cloud computing. In: Proc. of the IEEE INFOCOM Mini-Conf. San Diego: IEEE Computer Society, 2010. 1-5. [doi: 10.1109/INFCOM.2010.5462196].
  • 10Li M, Yu S, Cao N Lou W. Authorized private keyword search over encrypted data in cloud computing. In: Proc. of the IEEE Int'l Conf. on Distributed Computing Systems (ICDCS). Minneapolis: IEEE Computer Society, 2011. 383-392. [doi: 10.1109/ICDCS. 2011.55].

共引文献147

同被引文献17

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部