期刊文献+

基于布隆过滤器属性基的多关键词可搜索方案 被引量:1

An Attribute-based Multi-keyword Searchable Scheme Based on Bloom Filters
下载PDF
导出
摘要 在云计算环境下,基于属性加密的多关键词可搜索加密能够同时实现对加密数据的访问控制和加密数据可搜索。为提高密文检索效率、降低关键词索引代价,本文提出一种基于布隆过滤器属性基的多关键词搜索方案。首先,对于文件关键词集合,利用布隆过滤器生成对应于关键词集合的固定长度索引向量,从而降低关键词索引的存储复杂度。然后,为防止敌手对索引的统计分析,利用置换将索引向量中元素随机化,同时利用属性加密技术将此置换进行共享,只有合法用户才能获取此置换并构建查询关键词的陷门。最后,通过安全性分析和实验分析,表明本文方案的安全性、高效性和实用性。 Under the cloud computing environment,the attribute-based encryption multi-keyword searchable encryption can realize access control and searchability of encrypted data at the same time.For improving the retrieval efficiency of encrypted databases and reducing the cost of file keyword retrieval index storage,this article proposes an attribute-based multi-keyword search scheme based on Bloom filters.First,for the keywords set of a file,the Bloom filter is used to generate a fixed length index vector corresponding to the keyword set,so as to reduce the storage complexity of the keyword index.Besides,in order to prevent the adversary from obtaining the keywords information by means of statistical analysis of the index,this paper uses a permutation to randomize the elements of the index vector,and uses the attribute-based encryption to share the permutation.Thus,only legitimate users can obtain the permutation and construct a trapdoor for querying keywords with the permutation.Finally,through the security analysis and experimental analysis,the security,efficiency and practicability of this scheme are showed.
作者 张晓敏 ZHANG Xiao-min(Department of Culture and Technology, Party School of Shaanxi Provincial Committee of C.P.C (Shaanxi Academy of Governance), Xi’an 710061, China)
出处 《计算机与现代化》 2021年第8期104-111,共8页 Computer and Modernization
基金 陕西省社科联合作项目(20FN-221)。
关键词 云计算 属性加密 布隆过滤器 置换 关键词搜索 cloud computing attribute-based encryption Bloom filter permutation keyword search
  • 相关文献

参考文献5

二级参考文献56

  • 1Amazon. Amazon S3. http://aws.amazon.com/s3/.
  • 2Windows azure, http://www.microsoft.com/windowsazure/.
  • 3Weber T. Cloud computing after Amazon and Sony: Ready for primetime? 2011. http://www.bbc.co.uk/news/business-13451990.
  • 4Song D, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proc. of the 2000 IEEE Syrup. on Security and Privacy. Berkeley: IEEE Computer Society, 2000.44-55. [doi: 10. 1109/SECPRI.2000.848445].
  • 5Waters B, Balfanz D, Durfee G, Smetters D. Building an encrypted and searchable audit log. In: Proc. of the 1 lth Annual Network and Distributed System Security Symp. San Diego: The Internet Society, 2004. http://www.isoc.org/isoc/conferences/ndss/04/ proceedings/.
  • 6Goh E. Secure Indexes. In: Cryptology ePrint Archive. 2003. http://eprint.iacr.org/2OO3/216.pdf.
  • 7Golle P, Staddon J, Waters B. Secure conjunctive keyword search over encrypted data. In: Proc. of the 2nd Int'l Conf. on Applied Cryptography and Network Security (ACNS). Berlin, Heidelberg: Springer-Verlag, 2004. 31-45. [doi: 10.1007/978-3-540-24852- 1_3].
  • 8Wang C, Cao N, Li J, Ren K, Lou WJ. Secure ranked keyword search over encrypted cloud data. In: Proc. of the IEEE 30th Int'l Conf. on Distributed Computing Systems (ICDCS). Genoa: IEEE Computer Society, 2010. 253-262. [doi: 10.1109/ICDCS. 2010.34].
  • 9Li J, Wang Q, Wang C, Cao M, Ren K, Lou WJ. Fuzzy keyword search over encrypted data in cloud computing. In: Proc. of the IEEE INFOCOM Mini-Conf. San Diego: IEEE Computer Society, 2010. 1-5. [doi: 10.1109/INFCOM.2010.5462196].
  • 10Li M, Yu S, Cao N Lou W. Authorized private keyword search over encrypted data in cloud computing. In: Proc. of the IEEE Int'l Conf. on Distributed Computing Systems (ICDCS). Minneapolis: IEEE Computer Society, 2011. 383-392. [doi: 10.1109/ICDCS. 2011.55].

共引文献81

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部