A Novel User Model Based on Searchable Encryption Scheme

被引:0
|
作者
Lu, Youjing [1 ]
Xie, Qingqing [1 ]
Wang, Liangmin [2 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Hefei, Peoples R China
[2] Anhui Univ, Coinnovat Ctr Informat Support & Assurance Techno, Hefei, Peoples R China
关键词
component; cloud computing; searchable encryption; data integrity; user management;
D O I
10.1109/CBD.2015.47
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
with the development of cloud computing and cloud storage technology, the privacy disclosure of the query and the destruction of data integrity on the outsourced data are two increasingly serious security issues in the cloud services. In order to resolve these two problems, we propose a novel user model based on searchable encryption scheme. And the model introduces a trusted third authority (TA), which is independent from the honest but curious cloud server. It allows multi-keyword search and informs data integrity verify results on the cipher text and outsourced data to users simultaneously. Finally, we demonstrate that the new scheme we proposed can enable the user has capability of searchable encryption and integrity verify on the outsourced data, reducing the users' computation overhead.
引用
收藏
页码:247 / 253
页数:7
相关论文
共 50 条
  • [41] A lattice-based searchable encryption scheme with multi-user authorization for the certificateless cloud computing environment
    Zhou, Yihua
    Tang, Bin
    Yang, Yuguang
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (04)
  • [42] Multi-user Searchable Encryption in the Cloud
    Van Rompay, Cedric
    Molva, Refik
    Oenen, Melek
    INFORMATION SECURITY, ISC 2015, 2015, 9290 : 299 - 316
  • [43] Searchable Encryption Scheme on the Cloud Via Fully Homomorphic Encryption
    Liu, Jian
    Han, Jing-Li
    Wang, Zhao-Li
    PROCEEDINGS OF 2016 SIXTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2016), 2016, : 108 - 111
  • [44] Multi-Recipient Certificate-Based Searchable Encryption Scheme
    Liu H.
    Ming Y.
    Wang C.-H.
    Zhao Y.
    Jisuanji Xuebao/Chinese Journal of Computers, 2024, 47 (03): : 544 - 557
  • [45] Attribute-Based Searchable Encryption Scheme in Smart Healthcare Blockchain
    Yan, Chen
    Wang, Luping
    Wu, Hongjie
    Hu, Fuyuan
    Chen, Jing
    Lu, Weizhong
    2023 23RD IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS, ICDMW 2023, 2023, : 698 - 705
  • [46] Identity-based Searchable Encryption Scheme for Encrypted Email System
    Niu Shufen
    Xie Yaya
    Yang Pingping
    Wang Caifen
    Du Xiaoni
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (07) : 1803 - 1810
  • [47] Fuzzy Dynamical Searchable Encryption Scheme Based on Balanced Binary Tree
    Hu, Xiang
    Qin, Baodong
    2024 6TH INTERNATIONAL CONFERENCE ON NATURAL LANGUAGE PROCESSING, ICNLP 2024, 2024, : 277 - 282
  • [48] An efficient conjunctive keyword searchable encryption scheme
    Wang, Shang-Ping
    Liu, Li-Jun
    Zhang, Ya-Ling
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2013, 35 (09): : 2266 - 2271
  • [49] Verifiable and Searchable Symmetric Encryption Scheme Based on the Public Key Cryptosystem
    Duan, Gangqiang
    Li, Shuai
    ELECTRONICS, 2023, 12 (18)
  • [50] A Hierarchical Searchable Encryption Scheme Using Blockchain-Based Indexing
    Li, Yuxi
    Zhou, Fucai
    Ji, Dong
    Xu, Zifeng
    ELECTRONICS, 2022, 11 (22)