A Searchable and Verifiable Data Protection Scheme for Scholarly Big Data

被引:11
|
作者
Shen, Jian [1 ]
Wang, Chen [2 ]
Wang, Anxi [2 ]
Ji, Sai [2 ]
Zhang, Yan [3 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Nanjing 210044, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Peoples R China
[3] Univ Oslo, Dept Informat, Oslo, Norway
基金
中国国家自然科学基金;
关键词
Cloud computing; Big Data; Protocols; Data models; Cryptography; Computers; Scholarly big data; security scheme; searchable encryption; data integrity; cloud computing;
D O I
10.1109/TETC.2018.2830368
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Scientific research achievements play a positive role in the promotion of social development. Scholarly big data include scholars' scientific research, experimental data, and their own identity information. The security of scholarly big data relates to the authors' reputation and the copyright of their works. This paper proposes a trusted third-party-aided searchable and verifiable data protection scheme that utilizes cloud computing technology. For a better description of the the protocol, we first present a user-differentiated system model and a cube data storage structure. On the basis of the novel system model and data structure, the scheme helps the users review the integrity of their uploaded or downloaded data at any time and search the online scholarly data with encrypted keywords. The security analysis and performance simulation demonstrate that the novel scheme is a secure and efficient scheme for scholarly big data applications.
引用
收藏
页码:216 / 225
页数:10
相关论文
共 50 条
  • [1] SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
    Chamani, Javad Ghareh
    Dousti, Mohammad Sadeq
    Jalili, Rasool
    Papadopoulos, Dimitrios
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 11 (01): : 15 - 34
  • [2] A parallelized disjunctive query based searchable encryption scheme for big data
    Tahir, Shahzaib
    Steponkus, Liutauras
    Ruj, Sushmita
    Rajarajan, Muttukrishnan
    Sajjad, Ali
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 109 (109): : 583 - 592
  • [3] A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
    Hu, Chunqiang
    Li, Wei
    Cheng, Xiuzhen
    Yu, Jiguo
    Wang, Shengling
    Bie, Rongfang
    [J]. IEEE TRANSACTIONS ON BIG DATA, 2018, 4 (03) : 341 - 355
  • [4] Searchable Encryption Scheme for Personalized Privacy in IoT-Based Big Data
    Li, Shuai
    Li, Miao
    Xu, Haitao
    Zhou, Xianwei
    [J]. SENSORS, 2019, 19 (05)
  • [5] Multi-Keyword Searchable and Data Verifiable Attribute-Based Encryption Scheme for Cloud Storage
    Sun, Jin
    Ren, Lili
    Wang, Shangping
    Yao, Xiaomin
    [J]. IEEE ACCESS, 2019, 7 : 66655 - 66667
  • [6] A verifiable fully homomorphic encryption scheme to secure big data in cloud computing
    El-Yahyaoui, Ahmed
    Ech-Chrif El Kettani, Mohamed Dafir
    [J]. 2017 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2017, : 250 - 254
  • [7] Verifiable top-k searchable encryption for cloud data
    Elizabeth, B. Lydia
    Prakash, A. John
    [J]. SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2019, 45 (01):
  • [8] Verifiable top-k searchable encryption for cloud data
    B Lydia Elizabeth
    A John Prakash
    [J]. Sādhanā, 2020, 45
  • [9] Verifiable searchable encryption with aggregate keys for data sharing system
    Liu, Zheli
    Li, Tong
    Li, Ping
    Ji, Chunfu
    Li, Jin
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 778 - 788
  • [10] Blockchain Based Big Data Security Protection Scheme
    Zhang, Conghui
    Li, Yi
    Sun, Wenwen
    Guan, Shaopeng
    [J]. PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020), 2020, : 574 - 578