A Searchable and Verifiable Data Protection Scheme for Scholarly Big Data

被引:11
|
作者
Shen, Jian [1 ]
Wang, Chen [2 ]
Wang, Anxi [2 ]
Ji, Sai [2 ]
Zhang, Yan [3 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Nanjing 210044, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Peoples R China
[3] Univ Oslo, Dept Informat, Oslo, Norway
基金
中国国家自然科学基金;
关键词
Cloud computing; Big Data; Protocols; Data models; Cryptography; Computers; Scholarly big data; security scheme; searchable encryption; data integrity; cloud computing;
D O I
10.1109/TETC.2018.2830368
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Scientific research achievements play a positive role in the promotion of social development. Scholarly big data include scholars' scientific research, experimental data, and their own identity information. The security of scholarly big data relates to the authors' reputation and the copyright of their works. This paper proposes a trusted third-party-aided searchable and verifiable data protection scheme that utilizes cloud computing technology. For a better description of the the protocol, we first present a user-differentiated system model and a cube data storage structure. On the basis of the novel system model and data structure, the scheme helps the users review the integrity of their uploaded or downloaded data at any time and search the online scholarly data with encrypted keywords. The security analysis and performance simulation demonstrate that the novel scheme is a secure and efficient scheme for scholarly big data applications.
引用
收藏
页码:216 / 225
页数:10
相关论文
共 50 条
  • [21] Verifiable data hiding scheme with tamper detection
    Kuo, Wen-Chung
    Wang, Chun-Cheng
    Kuo, Shao-Hung
    Wuu, Lih-Chyau
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 36 (02) : 1311 - 1321
  • [22] A Verifiable Data Deduplication Scheme in Cloud Computing
    Wen, Zhaocong
    Luo, Jinman
    Chen, Huajun
    Meng, Jiaxiao
    Li, Xuan
    Li, Jin
    [J]. 2014 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2014, : 85 - 88
  • [23] A Novel Fair and Verifiable Data Trading Scheme
    Yu, Haiyong
    Gao, Juntao
    Wu, Tong
    Li, Xuelian
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 308 - 326
  • [24] PVSAE: A Public Verifiable Searchable Encryption Service Framework for Outsourced Encrypted Data
    Zhang, Rui
    Xue, Rui
    Yu, Ting
    Liu, Ling
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS), 2016, : 428 - 435
  • [25] Empowering Data Owners: An Efficient and Verifiable Scheme for Secure Data Deletion
    Xu, Zhenwu
    Chen, Xingshu
    Lan, Xiao
    Tang, Rui
    Jiang, Shuyu
    Shen, Changxiang
    [J]. COMPUTERS & SECURITY, 2024, 144
  • [26] Multi-server searchable data crypt: searchable data encryption scheme for secure distributed cloud storage
    Shahien, Toka
    Sarhan, Amany M.
    Alshewimy, Mahmoud A. M.
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (09) : 8663 - 8681
  • [27] Big Data and ByoD - Data storage and data protection
    Conrad, Isabell
    [J]. Informatik-Spektrum, 2013, 36 (04) : 407 - 408
  • [28] Preprocessing framework for scholarly big data management
    Khan, Samiya
    Alam, Mansaf
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (25) : 39719 - 39743
  • [29] Preprocessing framework for scholarly big data management
    Samiya Khan
    Mansaf Alam
    [J]. Multimedia Tools and Applications, 2023, 82 : 39719 - 39743
  • [30] Big genetic data and its big data protection challenges
    Quinn, Paul
    Quinn, Liam
    [J]. COMPUTER LAW & SECURITY REVIEW, 2018, 34 (05) : 1000 - 1018