Font Size: a A A

Public Key Searchable Encryption Protocol With Data Integrity Checking

Posted on:2018-04-25Degree:MasterType:Thesis
Country:ChinaCandidate:K YaoFull Text:PDF
GTID:2348330512486576Subject:Basic mathematics
Abstract/Summary:PDF Full Text Request
Numerous fields spring up and develop into further,such as Social network communication,electronic commerce,Internet Finance,data resource has become a gold to be discovered.The maturing Cloud Computing supplies predominant condition.Enterprises and individuals will choose the Cloud Infrastructure to obtain'data service or special computing resource so as to saving cost and convenience.The security of cloud storage arouse the attention of the users.Encryption is one of the effective measures to achieving security,and both the operation and search are challenge to the encrypted files.Especially,storage and the search of the ciphertext in the cloud is becoming a hot issue in information security recent years.Searchable Encryption can search on the ciphertext,while cloud is not fully trusted.Profit may drive the cloud sever provider to do search unfaithfully or to conceal the leak of storage maliciously,thus the verification of the search result is necessary.To detect the integrity of the searchable result,the paper starts with the source data in the cloud and constructs the verification of integrity of cloud data.When the cloud sever provider do search faithfully,the integrity of source data can ensure the correct of the search result.The paper presents a public key searchable encryption scheme to verify the integrity of the cloud data.The paper also constructs a security protocol with the measure of multi-file proofs of retrievability,achieving the verifiable integrity of searchable encryption on multi-type files,and finally we analysis the security of it.The protocol improves the security of the SE and the computational overhead considering with the ones of the same kind.Considering on the verification of the searchable encryption,we show more attention to the search result,which is the target of the verifiable searchable encryption.Verifiable searchable encryption ensures the security of the searchable encryption,at the same time guarantees the search result integrated and matched with the keywords.The paper proposes a universal model of the verifiable public-key-based searchable encryption after studying the verifiable searchable encryption at present.The model can check the identity with the access control.According to the model we present a verifiable protocol based on the biometric-based searchable encryption.Compared with the works before,our protocol is more practical and secure.The paper summarizes the work completed and proposes several possible ideas in the future.
Keywords/Search Tags:Cloud storage audit, Searchable encryption, Verifiable, Biometric
PDF Full Text Request
Related items