天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

當(dāng)前位置:主頁 > 科技論文 > 軟件論文 >

云環(huán)境下密文數(shù)據(jù)的連接關(guān)鍵詞檢索技術(shù)研究

發(fā)布時(shí)間:2021-04-28 21:07
  隨著云計(jì)算、大數(shù)據(jù)等新興信息技術(shù)的迅速發(fā)展,大量資源密集型計(jì)算任務(wù)被外包到云服務(wù)器。云計(jì)算模式給用戶提供高質(zhì)量數(shù)據(jù)服務(wù)的同時(shí),也大大減輕了資源受限用戶對數(shù)據(jù)的計(jì)算和存儲(chǔ)開銷。然而,云環(huán)境下數(shù)據(jù)所有權(quán)與管理權(quán)分離成為常態(tài),這使得傳統(tǒng)針對明文數(shù)據(jù)的檢索方法無法直接應(yīng)用于云環(huán)境下密文數(shù)據(jù)的檢索。因此,如何實(shí)現(xiàn)云環(huán)境下密文數(shù)據(jù)的高效檢索已經(jīng)成為云計(jì)算安全領(lǐng)域的研究熱點(diǎn)之一?伤阉骷用芗夹g(shù)通過建立以關(guān)鍵詞為核心的數(shù)據(jù)索引來實(shí)現(xiàn)密文的高效檢索,得到了學(xué)術(shù)界和產(chǎn)業(yè)界的廣泛關(guān)注,F(xiàn)有的可搜索加密方案主要圍繞以下三方面展開研究:首先,研究高效密文檢索方法,降低通信和計(jì)算復(fù)雜度,實(shí)現(xiàn)對大規(guī)模數(shù)據(jù)集的快速檢索;其次,研究前/后向安全的密文檢索方法,支持動(dòng)態(tài)數(shù)據(jù)的安全檢索;最后,研究多模式密文檢索方法,設(shè)計(jì)符合實(shí)際檢索場景的查詢方案。連接關(guān)鍵詞檢索作為多模式檢索的典型方式之一,在效率和安全性方面仍然存在不足之處。首先,在多用戶數(shù)據(jù)檢索場景中,授權(quán)用戶執(zhí)行數(shù)據(jù)檢索時(shí)受到文檔解密權(quán)限的限制,從而導(dǎo)致服務(wù)器返回的檢索結(jié)果中可能存在用戶無法解密的數(shù)據(jù),這無疑增加了系統(tǒng)的通信和計(jì)算開銷;其次,在動(dòng)態(tài)數(shù)據(jù)檢索場景中,現(xiàn)有... 

【文章來源】:西安電子科技大學(xué)陜西省 211工程院校 教育部直屬院校

【文章頁數(shù)】:103 頁

【學(xué)位級(jí)別】:博士

【文章目錄】:
摘要
ABSTRACT
List of Abbreviations
Chapter 1 Introduction
    1.1 Background
    1.2 Related Work
    1.3 Contributions
    1.4 Organization
Chapter 2 Preliminaries
    2.1 Bilinear Pairings
    2.2 Anonymous Attribute-based Encryption
    2.3 Additive Homomorphic Encryption
    2.4 Polynomial Representation of Sets
    2.5 Searchable Symmetric Encryption
    2.6 Conclusion
Chapter 3 Conjunctive Keyword Search in Multi-user Setting
    3.1 Overview
    3.2 Problem Formulation
        3.2.1 System Model
        3.2.2 Single-owner/Multi-user Searchable Encryption (SMSE)
        3.2.3 Design Goals
    3.3 SMSE Scheme with Fast Decryption
        3.3.1 High Description
        3.3.2 Server-side Match Technique for Anonymous ABE
        3.3.3 Our Construction
    3.4 Analysis of Our Proposed Scheme
        3.4.1 Security Analysis
        3.4.2 Comparison
    3.5 Performance Evaluation
    3.6 Conclusion
Chapter 4 Conjunctive Keyword Search with Forward Security
    4.1 Overview
    4.2 Problem Formulation
        4.2.1 Dynamic Searchable Encryption
        4.2.2 Security Definition
    4.3 The Forward Oblivious Cross-Tags FOXT Construction
        4.3.1 High Description
        4.3.2 Basic Construction
        4.3.3 Enhanced Construction
    4.4 Analysis of Our Proposed Scheme
        4.4.1 Security Analysis
        4.4.2 Comparison
    4.5 Performance Evaluation
    4.6 Conclusion
Chapter 5 Conjunctive Keyword Search Scheme with Search Pattern Hidden
    5.1 Overview
    5.2 Problem Formulation
        5.2.1 System Model
        5.2.2 Searchable Encryption with Search Pattern Hidden
    5.3 Analysis of Wang et al.’s Scheme
        5.3.1 Overview of the Scheme
        5.3.2 Analysis of the Scheme
    5.4 Our Proposed Scheme
        5.4.1 Multiplicative Homomorphic Operation
        5.4.2 Overview of Our Construction
        5.4.3 The Concrete Construction
    5.5 Analysis of Our Proposed Scheme
        5.5.1 Security Analysis
        5.5.2 Comparison
    5.6 Performance Evaluation
    5.7 Summary
Chapter 6 Conclusion and Future Work
    6.1 Summary
    6.2 Future Work
Bibliography
Acknowledgement
作者簡介



本文編號(hào):3166175

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/3166175.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶c8f85***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請E-mail郵箱bigeng88@qq.com