期刊文献+

基于改进DGHV算法的云存储密文全文检索研究 被引量:3

Research on Ciphertext Full-text Retrieval of Cloud Storage Based on Improved DGHV Algorithm
下载PDF
导出
摘要 为了有效解决云存储中用户数据的机密性问题,文章提出一种基于同态加密的云存储密文全文检索方法。文章首先介绍了同态加密,并研究了基于DGHV算法的密文检索方案。接着提出一种基于改进DGHV算法的方案用于云存储密文全文检索。该方案采用两个密钥对明文关键词进行同态加密,一个为只有用户知道的用户密钥,另一个为用户与云服务器共享的检索密钥。用户检索文件时,云服务器只需利用检索密钥就能对文件进行全文检索,而用户密钥始终仅保留在用户手中,云服务器无法获取,也就无法解密出用户的明文数据。该方案可以在第三方服务器不可信的云存储场景下实现高效的检索,保证了用户数据的机密性。 In order to solve the confidentiality problem of user data in cloud storage effectively,this paper presents a ciphertext full-text retrieval method of cloud storage based on homomorphic encryption.This paper first introduces homomorphic encryption and studies the ciphertext retrieval scheme based on DGHV algorithm.A scheme based on improved DGHV algorithm is then proposed in this paper for ciphertext full-text retrieval of cloud storage.The scheme uses two keys to perform homomorphic encryption on the plaintext keywords.One is a user key that only the user knows,and the other is a retrieval key shared by the user and the cloud server.When a user retrieves a file,the cloud server can perform a full-text retrieval operation on the files only by using the retrieval key,while the user key is always retained only on the user5s side,and the cloud server cannot obtain it to decrypt the ciphertext data of the user.The scheme can realize efficient retrieval under the third-party server untrusted cloud storage scenario,and ensure the confidentiality of user data.
作者 秦中元 韩尹 朱雪金 QIN Zhongyuan;HAN Yin;ZHU Xuejin(School of Cyberspace Security,Southeast University,Nanjing Jiangsu 210096,China;School of Information Engineering,Southeast University,Nanjing Jiangsu 210096,China)
出处 《信息网络安全》 CSCD 北大核心 2019年第1期8-15,共8页 Netinfo Security
基金 江苏省自然科学基金[bk20161099]
关键词 同态加密 云存储 密文检索 DGHV算法 homomorphic encryption cloud storage ciphertext retrieval DGHV algorithm
  • 相关文献

参考文献8

二级参考文献111

  • 1吴吉义,沈千里,章剑林,沈忠华,平玲娣.云计算:从云安全到可信云[J].计算机研究与发展,2011,48(S1):229-233. 被引量:54
  • 2向广利,陈莘萌,马捷,张俊红.实数范围上的同态加密机制[J].计算机工程与应用,2005,41(20):12-14. 被引量:18
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.

共引文献1227

同被引文献12

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部