云環(huán)境下密文數(shù)據(jù)的連接關(guān)鍵詞檢索技術(shù)研究
發(fā)布時(shí)間:2021-04-28 21:07
隨著云計(jì)算、大數(shù)據(jù)等新興信息技術(shù)的迅速發(fā)展,大量資源密集型計(jì)算任務(wù)被外包到云服務(wù)器。云計(jì)算模式給用戶提供高質(zhì)量數(shù)據(jù)服務(wù)的同時(shí),也大大減輕了資源受限用戶對數(shù)據(jù)的計(jì)算和存儲(chǔ)開銷。然而,云環(huán)境下數(shù)據(jù)所有權(quán)與管理權(quán)分離成為常態(tài),這使得傳統(tǒng)針對明文數(shù)據(jù)的檢索方法無法直接應(yīng)用于云環(huán)境下密文數(shù)據(jù)的檢索。因此,如何實(shí)現(xiàn)云環(huán)境下密文數(shù)據(jù)的高效檢索已經(jīng)成為云計(jì)算安全領(lǐng)域的研究熱點(diǎn)之一?伤阉骷用芗夹g(shù)通過建立以關(guān)鍵詞為核心的數(shù)據(jù)索引來實(shí)現(xiàn)密文的高效檢索,得到了學(xué)術(shù)界和產(chǎn)業(yè)界的廣泛關(guān)注,F(xiàn)有的可搜索加密方案主要圍繞以下三方面展開研究:首先,研究高效密文檢索方法,降低通信和計(jì)算復(fù)雜度,實(shí)現(xiàn)對大規(guī)模數(shù)據(jù)集的快速檢索;其次,研究前/后向安全的密文檢索方法,支持動(dòng)態(tài)數(shù)據(jù)的安全檢索;最后,研究多模式密文檢索方法,設(shè)計(jì)符合實(shí)際檢索場景的查詢方案。連接關(guān)鍵詞檢索作為多模式檢索的典型方式之一,在效率和安全性方面仍然存在不足之處。首先,在多用戶數(shù)據(jù)檢索場景中,授權(quán)用戶執(zhí)行數(shù)據(jù)檢索時(shí)受到文檔解密權(quán)限的限制,從而導(dǎo)致服務(wù)器返回的檢索結(jié)果中可能存在用戶無法解密的數(shù)據(jù),這無疑增加了系統(tǒng)的通信和計(jì)算開銷;其次,在動(dòng)態(tài)數(shù)據(jù)檢索場景中,現(xiàn)有...
【文章來源】:西安電子科技大學(xué)陜西省 211工程院校 教育部直屬院校
【文章頁數(shù)】:103 頁
【學(xué)位級(jí)別】:博士
【文章目錄】:
摘要
ABSTRACT
List of Abbreviations
Chapter 1 Introduction
1.1 Background
1.2 Related Work
1.3 Contributions
1.4 Organization
Chapter 2 Preliminaries
2.1 Bilinear Pairings
2.2 Anonymous Attribute-based Encryption
2.3 Additive Homomorphic Encryption
2.4 Polynomial Representation of Sets
2.5 Searchable Symmetric Encryption
2.6 Conclusion
Chapter 3 Conjunctive Keyword Search in Multi-user Setting
3.1 Overview
3.2 Problem Formulation
3.2.1 System Model
3.2.2 Single-owner/Multi-user Searchable Encryption (SMSE)
3.2.3 Design Goals
3.3 SMSE Scheme with Fast Decryption
3.3.1 High Description
3.3.2 Server-side Match Technique for Anonymous ABE
3.3.3 Our Construction
3.4 Analysis of Our Proposed Scheme
3.4.1 Security Analysis
3.4.2 Comparison
3.5 Performance Evaluation
3.6 Conclusion
Chapter 4 Conjunctive Keyword Search with Forward Security
4.1 Overview
4.2 Problem Formulation
4.2.1 Dynamic Searchable Encryption
4.2.2 Security Definition
4.3 The Forward Oblivious Cross-Tags FOXT Construction
4.3.1 High Description
4.3.2 Basic Construction
4.3.3 Enhanced Construction
4.4 Analysis of Our Proposed Scheme
4.4.1 Security Analysis
4.4.2 Comparison
4.5 Performance Evaluation
4.6 Conclusion
Chapter 5 Conjunctive Keyword Search Scheme with Search Pattern Hidden
5.1 Overview
5.2 Problem Formulation
5.2.1 System Model
5.2.2 Searchable Encryption with Search Pattern Hidden
5.3 Analysis of Wang et al.’s Scheme
5.3.1 Overview of the Scheme
5.3.2 Analysis of the Scheme
5.4 Our Proposed Scheme
5.4.1 Multiplicative Homomorphic Operation
5.4.2 Overview of Our Construction
5.4.3 The Concrete Construction
5.5 Analysis of Our Proposed Scheme
5.5.1 Security Analysis
5.5.2 Comparison
5.6 Performance Evaluation
5.7 Summary
Chapter 6 Conclusion and Future Work
6.1 Summary
6.2 Future Work
Bibliography
Acknowledgement
作者簡介
本文編號(hào):3166175
【文章來源】:西安電子科技大學(xué)陜西省 211工程院校 教育部直屬院校
【文章頁數(shù)】:103 頁
【學(xué)位級(jí)別】:博士
【文章目錄】:
摘要
ABSTRACT
List of Abbreviations
Chapter 1 Introduction
1.1 Background
1.2 Related Work
1.3 Contributions
1.4 Organization
Chapter 2 Preliminaries
2.1 Bilinear Pairings
2.2 Anonymous Attribute-based Encryption
2.3 Additive Homomorphic Encryption
2.4 Polynomial Representation of Sets
2.5 Searchable Symmetric Encryption
2.6 Conclusion
Chapter 3 Conjunctive Keyword Search in Multi-user Setting
3.1 Overview
3.2 Problem Formulation
3.2.1 System Model
3.2.2 Single-owner/Multi-user Searchable Encryption (SMSE)
3.2.3 Design Goals
3.3 SMSE Scheme with Fast Decryption
3.3.1 High Description
3.3.2 Server-side Match Technique for Anonymous ABE
3.3.3 Our Construction
3.4 Analysis of Our Proposed Scheme
3.4.1 Security Analysis
3.4.2 Comparison
3.5 Performance Evaluation
3.6 Conclusion
Chapter 4 Conjunctive Keyword Search with Forward Security
4.1 Overview
4.2 Problem Formulation
4.2.1 Dynamic Searchable Encryption
4.2.2 Security Definition
4.3 The Forward Oblivious Cross-Tags FOXT Construction
4.3.1 High Description
4.3.2 Basic Construction
4.3.3 Enhanced Construction
4.4 Analysis of Our Proposed Scheme
4.4.1 Security Analysis
4.4.2 Comparison
4.5 Performance Evaluation
4.6 Conclusion
Chapter 5 Conjunctive Keyword Search Scheme with Search Pattern Hidden
5.1 Overview
5.2 Problem Formulation
5.2.1 System Model
5.2.2 Searchable Encryption with Search Pattern Hidden
5.3 Analysis of Wang et al.’s Scheme
5.3.1 Overview of the Scheme
5.3.2 Analysis of the Scheme
5.4 Our Proposed Scheme
5.4.1 Multiplicative Homomorphic Operation
5.4.2 Overview of Our Construction
5.4.3 The Concrete Construction
5.5 Analysis of Our Proposed Scheme
5.5.1 Security Analysis
5.5.2 Comparison
5.6 Performance Evaluation
5.7 Summary
Chapter 6 Conclusion and Future Work
6.1 Summary
6.2 Future Work
Bibliography
Acknowledgement
作者簡介
本文編號(hào):3166175
本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/3166175.html
最近更新
教材專著