A Novel User Model Based on Searchable Encryption Scheme

被引:0
|
作者
Lu, Youjing [1 ]
Xie, Qingqing [1 ]
Wang, Liangmin [2 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Hefei, Peoples R China
[2] Anhui Univ, Coinnovat Ctr Informat Support & Assurance Techno, Hefei, Peoples R China
关键词
component; cloud computing; searchable encryption; data integrity; user management;
D O I
10.1109/CBD.2015.47
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
with the development of cloud computing and cloud storage technology, the privacy disclosure of the query and the destruction of data integrity on the outsourced data are two increasingly serious security issues in the cloud services. In order to resolve these two problems, we propose a novel user model based on searchable encryption scheme. And the model introduces a trusted third authority (TA), which is independent from the honest but curious cloud server. It allows multi-keyword search and informs data integrity verify results on the cipher text and outsourced data to users simultaneously. Finally, we demonstrate that the new scheme we proposed can enable the user has capability of searchable encryption and integrity verify on the outsourced data, reducing the users' computation overhead.
引用
收藏
页码:247 / 253
页数:7
相关论文
共 50 条
  • [21] A multi-user searchable encryption scheme with keyword authorization in a cloud storage
    Deng, Zuojie
    Li, Kenli
    Li, Keqin
    Zhou, Jingli
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 72 : 208 - 218
  • [22] IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications
    Wang, Guofeng
    Liu, Chuanyi
    Dong, Yingfei
    Han, Peiyi
    Pan, Hezhong
    Fang, Binxing
    IEEE ACCESS, 2018, 6 : 2908 - 2921
  • [23] Towards Multi-user Searchable Encryption Scheme with Support for SQL Queries
    Li, Mingyue
    Du, Ruizhong
    Jia, Chunfu
    MOBILE NETWORKS & APPLICATIONS, 2022, 27 (01): : 417 - 430
  • [24] Blockchain searchable encryption scheme for multi-user power data sharing
    Yang, Rui
    Zhang, Ruiting
    Zhai, Sheping
    Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control, 2024, 52 (22): : 116 - 128
  • [25] Towards Multi-user Searchable Encryption Scheme with Support for SQL Queries
    Li, Mingyue
    Du, Ruizhong
    Jia, Chunfu
    Mobile Networks and Applications, 2022, 27 (01) : 417 - 430
  • [26] Multi-User Searchable Encryption Scheme With Constant-Size Keys
    Chang, YuJui
    Wu, JaLing
    2017 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICE COMPUTING (SC2 2017), 2017, : 98 - 103
  • [27] Towards Multi-user Searchable Encryption Scheme with Support for SQL Queries
    Mingyue Li
    Ruizhong Du
    Chunfu Jia
    Mobile Networks and Applications, 2022, 27 : 417 - 430
  • [28] Cryptanalysis of an Asymmetric Searchable Encryption Scheme
    Zare, Fahimeh
    Mala, Hamid
    2017 14TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2017, : 82 - 85
  • [29] An Improved Asymmetric Searchable Encryption Scheme
    Wu, Qi
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 39 - 44
  • [30] Keyword Searchable Encryption Scheme based on Blockchain in Cloud Environment
    Yang, Yanyan
    Hu, Mingsheng
    Cheng, Yage
    Liu, Xinxin
    Ma, Wei
    2020 3RD INTERNATIONAL CONFERENCE ON SMART BLOCKCHAIN (SMARTBLOCK), 2020, : 29 - 32