Font Size: a A A

Research On Searchable Encryption Authentication Algorithm And Its Application In Cloud Storage

Posted on:2022-02-14Degree:MasterType:Thesis
Country:ChinaCandidate:X T HuFull Text:PDF
GTID:2518306539481394Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In recent years,the research heat of cloud computing has been increasing,and the research on cloud computing has become a popular trend.Its coverage is very extensive.Cloud computing can be found in every scene of our life,such as online shopping,or navigation.In addition,cloud computing has been widely used in financial fields,medical fields,communication fields and even government work fields which brings great convenience to our production and life.Cloud storage,as an extension of its concept,has also attracted much attention.Especially regard to cloud storage security that include how to guarantee the confidentiality of the data stored in the cloud by data owners,how to protect the information from tampering and deleting,and how to maintain the privacy of users.When the data owner user stores the data in this thirdparty service provider,using traditional encryption technology can guarantee the confidentiality of the data stored in the cloud.However,the efficiency of data retrieval may be limited by this step which also perhaps makes the process of getting the data on the cloud extremely tedious.In order to solve the above problems,corresponding solutions have been proposed one after another.Nevertheless,some existing solutions still have problems such as poor security or both users use the same system parameters,which do not conform to the actual application scenarios of cloud storage search.Based on this,in the basis of cloud storage,this paper researches the search encryption authentication algorithm,and its main research contents and results are as follows:(1)A searchable encryption authentication algorithm based on different system parameters is proposed.First,the system model and general model of the scheme is built,then the security model of the scheme is built according to the system model and general model.Based on the proposed general model and security model,a complete and specific searchable encryption authentication scheme(CL-PKI-SE)is formed.According to the provable security theory,the security of the scheme is proved which means the scheme can resist the inside keyword guessing attack.Finally,the performance of the algorithm is compared with the similar algorithms proposed in recent years,which reflects the performance advantage of the proposed scheme.(2)Implement the searchable encryption authentication algorithm and apply it to the cloud storage.The code of the algorithm is simulated by using the Java PairingBased Cryptography Library.At the same time,the calculation cost and communication efficiency of the key stage of the scheme are compared with other similar schemes by using the concrete data obtained from the simulation.In addition,the scheme also realizes cross-domain heterogeneity.In order to show the feasibility of the algorithm,from theory to practice,the algorithm is integrated into the cloud storage system.The practical application including but not limited to the encryption of keywords,the uploading of encrypted keywords ciphertext and the search of ciphertext by generating keyword trapdoor are achieved at the same time the algorithm is implemented.
Keywords/Search Tags:searchable encryption, inside keyword guessing attack, cross-domain heterogeneous, cloud storage
PDF Full Text Request
Related items