A Novel User Model Based on Searchable Encryption Scheme

被引:0
|
作者
Lu, Youjing [1 ]
Xie, Qingqing [1 ]
Wang, Liangmin [2 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Hefei, Peoples R China
[2] Anhui Univ, Coinnovat Ctr Informat Support & Assurance Techno, Hefei, Peoples R China
关键词
component; cloud computing; searchable encryption; data integrity; user management;
D O I
10.1109/CBD.2015.47
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
with the development of cloud computing and cloud storage technology, the privacy disclosure of the query and the destruction of data integrity on the outsourced data are two increasingly serious security issues in the cloud services. In order to resolve these two problems, we propose a novel user model based on searchable encryption scheme. And the model introduces a trusted third authority (TA), which is independent from the honest but curious cloud server. It allows multi-keyword search and informs data integrity verify results on the cipher text and outsourced data to users simultaneously. Finally, we demonstrate that the new scheme we proposed can enable the user has capability of searchable encryption and integrity verify on the outsourced data, reducing the users' computation overhead.
引用
收藏
页码:247 / 253
页数:7
相关论文
共 50 条
  • [1] Multi-user and Keyword-based Searchable Encryption Scheme
    Zhang, Ya-ling
    Liu, Li-jun
    Wang, Shang-ping
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 223 - 227
  • [2] Searchable Attribute-based Encryption Scheme for Dynamic User Groups
    Wang J.-W.
    Ning J.-T.
    Xu S.-M.
    Yin X.-C.
    Chen H.-X.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (04): : 1907 - 1925
  • [3] Secure and lightweight multi user searchable encryption scheme
    Andola, Nitish
    Prakash, Sourabh
    Venkatesan, S.
    Verma, Shekhar
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 35 (02) : 1239 - 1251
  • [4] A discretionary searchable encryption scheme in multi-user settings
    Li, Zhen
    Jiang, Han
    Zhao, Minghao
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2313 - 2322
  • [5] Certificateless Searchable Encryption Scheme in Multi-User Environment
    Feng, Tao
    Si, Jiewen
    CRYPTOGRAPHY, 2022, 6 (04)
  • [6] Certificateless Authentication Searchable Encryption Scheme for Multi-user
    Zhang Yulei
    Wen Long
    Wang Haohao
    Zhang Yongjie
    Wang Caifen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (05) : 1094 - 1101
  • [7] A Novel Proximity Based Searchable Encryption Scheme Using Referential Dissimilarity
    Mallaiah, Kurra
    Pande, Prateek
    Ramachandram, S.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 253 - 261
  • [8] Anonymous Searchable Encryption Scheme for Multi-User Databases
    Varadharajan, Vijayaraghavan
    Mani, Raghubansh
    Nallusamy, Rajarathnam
    PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2013), 2013, : 225 - 232
  • [9] Blockchain searchable encryption scheme for multi-user environment
    Zhai, Sheping
    Zhang, Ruiting
    Yang, Rui
    Cao, Yongqiang
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2024, 51 (04): : 151 - 169
  • [10] A Searchable Symmetric Encryption Scheme Based on SRE
    Huang Y.
    Yu B.
    Li S.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (12): : 2725 - 2736