Keyword Searchable Encryption Scheme based on Blockchain in Cloud Environment

被引:2
|
作者
Yang, Yanyan [1 ]
Hu, Mingsheng [1 ]
Cheng, Yage [1 ]
Liu, Xinxin [1 ]
Ma, Wei [2 ]
机构
[1] Zhengzhou Normal Univ, Sch Informat Sci & Technol, Zhengzhou 450044, Peoples R China
[2] North China Univ Water Resources & Elect Power, Coll Informat Engn, Zhengzhou 450046, Peoples R China
关键词
cloud Server; searchable encryption; blockchain; PRIVACY;
D O I
10.1109/SmartBlock52591.2020.00013
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the development of cloud computing, a large amount of sensitive data information is often stored on cloud servers in the form of ciphertext, thereby alleviating local storage pressure while ensuring data privacy. Although encryption helps protect the confidentiality of the data, a secure and efficient search of ciphertext data is a challenging issue. Aiming at the problems of searchable encryption schemes in the existing cloud environment, such as low search efficiency and accuracy, and poor security, this paper proposes a traceable, keyword searchable encryption scheme based on blockchain technology. This solution makes use of the advantages of the non-tampering and non-repudiation of the blockchain to store query records on the blockchain, thereby achieving traceability of user queries and preventing illegal users from leaking sensitive data. Finally, under the random oracle model, the scheme is proved to be adaptive and indistinguishable. Through comparative analysis, it is shown that the scheme has high search accuracy and security.
引用
收藏
页码:29 / 32
页数:4
相关论文
共 50 条
  • [21] A multi-user searchable encryption scheme with keyword authorization in a cloud storage
    Deng, Zuojie
    Li, Kenli
    Li, Keqin
    Zhou, Jingli
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 72 : 208 - 218
  • [22] Searchable Encryption Scheme Based on CPABE with Attribute Update in a Cloud Medical Environment
    Sun Jingzhang
    Cao Chunjie
    Li Hui
    [J]. CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 265 - 276
  • [23] Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage
    Zhang, Kejun
    Wang, Wenbin
    Xu, Shaofei
    Yu, Xinying
    Wang, Jun
    Li, Pengcheng
    Qian, Rong
    [J]. Tongxin Xuebao/Journal on Communications, 45 (09): : 244 - 257
  • [24] Blockchain-Based Certificateless Bidirectional Authenticated Searchable Encryption Scheme in Cloud Email System
    Sun, Yanzhong
    Du, Xiaoni
    Niu, Shufen
    Yang, Xiaodong
    [J]. CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 139 (03): : 3287 - 3310
  • [25] Multi-Keyword Searchable and Data Verifiable Attribute-Based Encryption Scheme for Cloud Storage
    Sun, Jin
    Ren, Lili
    Wang, Shangping
    Yao, Xiaomin
    [J]. IEEE ACCESS, 2019, 7 : 66655 - 66667
  • [26] Multi-keyword ranked searchable encryption scheme with access control for cloud storage
    Maryam Zarezadeh
    Hamid Mala
    Maede Ashouri-Talouki
    [J]. Peer-to-Peer Networking and Applications, 2020, 13 : 207 - 218
  • [27] Blockchain-Based Searchable Encryption Scheme With Fair Payment
    Yan, Xixi
    Yuan, Xiaohan
    Ye, Qing
    Tang, Yongli
    [J]. IEEE ACCESS, 2020, 8 : 109687 - 109706
  • [28] An Authenticated Keyword Searchable Conditional Proxy Re-encryption Scheme in Cloud Services
    Sharma, Sumit
    Swarnakar, Ashutosh
    Babu, Ch Jayanth
    Padmavathy, R.
    Kumar, Rakesh
    [J]. PROCEEDINGS OF THE 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS-2020), 2020,
  • [29] Multi-keyword ranked searchable encryption scheme with access control for cloud storage
    Zarezadeh, Maryam
    Mala, Hamid
    Ashouri-Talouki, Maede
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (01) : 207 - 218
  • [30] Multi-user and Keyword-based Searchable Encryption Scheme
    Zhang, Ya-ling
    Liu, Li-jun
    Wang, Shang-ping
    [J]. PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 223 - 227