A Searchable and Verifiable Data Protection Scheme for Scholarly Big Data

被引:11
|
作者
Shen, Jian [1 ]
Wang, Chen [2 ]
Wang, Anxi [2 ]
Ji, Sai [2 ]
Zhang, Yan [3 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Nanjing 210044, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Peoples R China
[3] Univ Oslo, Dept Informat, Oslo, Norway
基金
中国国家自然科学基金;
关键词
Cloud computing; Big Data; Protocols; Data models; Cryptography; Computers; Scholarly big data; security scheme; searchable encryption; data integrity; cloud computing;
D O I
10.1109/TETC.2018.2830368
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Scientific research achievements play a positive role in the promotion of social development. Scholarly big data include scholars' scientific research, experimental data, and their own identity information. The security of scholarly big data relates to the authors' reputation and the copyright of their works. This paper proposes a trusted third-party-aided searchable and verifiable data protection scheme that utilizes cloud computing technology. For a better description of the the protocol, we first present a user-differentiated system model and a cube data storage structure. On the basis of the novel system model and data structure, the scheme helps the users review the integrity of their uploaded or downloaded data at any time and search the online scholarly data with encrypted keywords. The security analysis and performance simulation demonstrate that the novel scheme is a secure and efficient scheme for scholarly big data applications.
引用
收藏
页码:216 / 225
页数:10
相关论文
共 50 条
  • [31] Multi-server searchable data crypt: searchable data encryption scheme for secure distributed cloud storage
    Toka Shahien
    Amany M. Sarhan
    Mahmoud A. M. Alshewimy
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 8663 - 8681
  • [32] DATA PROTECTION IN AN ERA OF BIG DATA: THE CHALLENGES POSED BY BIG PERSONAL DATA
    Paterson, Moira
    McDonagh, Maeve
    [J]. MONASH UNIVERSITY LAW REVIEW, 2018, 44 (01): : 1 - 31
  • [33] An efficient searchable scheme for encrypted high dimensional data
    Ge, Weijie
    Wang, Haijiang
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2023, 112
  • [34] An enhanced searchable encryption scheme for secure data outsourcing
    Rui ZHANG
    Jiabei WANG
    Zishuai SONG
    Xi WANG
    [J]. Science China(Information Sciences), 2020, 63 (03) : 120 - 139
  • [35] An enhanced searchable encryption scheme for secure data outsourcing
    Rui Zhang
    Jiabei Wang
    Zishuai Song
    Xi Wang
    [J]. Science China Information Sciences, 2020, 63
  • [36] A Searchable Encryption Scheme for Encrypted Large Data Sets
    Jia Q.
    Zhang S.
    Zhou F.-C.
    [J]. Dongbei Daxue Xuebao/Journal of Northeastern University, 2019, 40 (07): : 913 - 919
  • [37] An enhanced searchable encryption scheme for secure data outsourcing
    Zhang, Rui
    Wang, Jiabei
    Song, Zishuai
    Wang, Xi
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (03)
  • [38] Verifiable semantic fuzzy searchable encryption scheme in cloud computing
    Lin, Bogang
    Wu, Yang
    Yang, Yang
    Zhong, Ling
    [J]. Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2014, 46 (06): : 1 - 6
  • [39] Scholarly Data Share: A Model for Sharing Big Data in Academic Research
    Chapman, Katie
    Ruan, Guangchen
    Tuna, M. Esen
    Walsh, Alan
    Wernert, Eric
    [J]. PRACTICE AND EXPERIENCE IN ADVANCED RESEARCH COMPUTING 2022, 2022,
  • [40] Data protection in heterogeneous big data systems
    M. A. Poltavtseva
    E. B. Aleksandrova
    V. S. Shmatov
    P. D. Zegzhda
    [J]. Journal of Computer Virology and Hacking Techniques, 2023, 19 : 451 - 458