A Novel User Model Based on Searchable Encryption Scheme

被引:0
|
作者
Lu, Youjing [1 ]
Xie, Qingqing [1 ]
Wang, Liangmin [2 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Hefei, Peoples R China
[2] Anhui Univ, Coinnovat Ctr Informat Support & Assurance Techno, Hefei, Peoples R China
关键词
component; cloud computing; searchable encryption; data integrity; user management;
D O I
10.1109/CBD.2015.47
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
with the development of cloud computing and cloud storage technology, the privacy disclosure of the query and the destruction of data integrity on the outsourced data are two increasingly serious security issues in the cloud services. In order to resolve these two problems, we propose a novel user model based on searchable encryption scheme. And the model introduces a trusted third authority (TA), which is independent from the honest but curious cloud server. It allows multi-keyword search and informs data integrity verify results on the cipher text and outsourced data to users simultaneously. Finally, we demonstrate that the new scheme we proposed can enable the user has capability of searchable encryption and integrity verify on the outsourced data, reducing the users' computation overhead.
引用
收藏
页码:247 / 253
页数:7
相关论文
共 50 条
  • [31] Blockchain-Based Searchable Encryption Scheme With Fair Payment
    Yan, Xixi
    Yuan, Xiaohan
    Ye, Qing
    Tang, Yongli
    IEEE ACCESS, 2020, 8 : 109687 - 109706
  • [32] Verifiable attribute-based searchable encryption scheme based on blockchain
    Yan X.
    Yuan X.
    Tang Y.
    Chen Y.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (02): : 187 - 198
  • [33] Searchable Encryption Scheme of Genomic Data Based on Suffix Tree
    Qin S.-Y.
    Zhou F.-C.
    Liu L.
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2019, 40 (04): : 461 - 466
  • [34] A Blockchain Based Searchable Encryption Scheme for Multiple Cloud Storage
    Zhang, Chao
    Fu, Shaojing
    Ao, Weijun
    CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 585 - 600
  • [35] An optimized dynamic attribute-based searchable encryption scheme
    Khan, Shahzad
    Khan, Shawal
    Waheed, Abdul
    Mehmood, Gulzar
    Zareei, Mahdi
    Alanazi, Faisal
    PLOS ONE, 2024, 19 (10):
  • [36] A Verifiable Symmetric Searchable Encryption Scheme Based on the AVL Tree
    Wang, Qing
    Zhang, Xi
    Qin, Jing
    Ma, Jixin
    Huang, Xinyi
    COMPUTER JOURNAL, 2023, 66 (01): : 174 - 183
  • [37] Identity-based searchable encryption scheme with a designated tester
    Wang, Shao-Hui
    Han, Zhi-Jie
    Xiao, Fu
    Wang, Ru-Chuan
    Wang, Shao-Hui, 1600, Editorial Board of Journal on Communications (35): : 22 - 32
  • [38] A Searchable Encryption Scheme Based on Lattice for Log Systems in Blockchain
    Xu, Gang
    Cao, Yibo
    Xu, Shiyuan
    Liu, Xin
    Chen, Xiu-Bo
    Yu, Yiying
    Wang, Xiaojun
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (03): : 5429 - 5441
  • [39] A Novel Model for Lattice-Based Authorized Searchable Encryption with Special Keyword
    Zeng, Fugeng
    Xu, Chunxiang
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [40] A Multi-User Dynamic Symmetric Searchable Encryption Scheme Supporting Conjunctive Search
    Zhang L.
    Cao W.
    Wang H.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (10): : 2309 - 2322