Font Size: a A A

Privacy-preserving Data Search Right Control Theory Research

Posted on:2021-05-06Degree:DoctorType:Dissertation
Country:ChinaCandidate:R ZhouFull Text:PDF
GTID:1368330647460720Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the rapid development of 5G,more business about 5G is adopted in industrial Internet of Things.However,the cases of data leakage occur frequently.From this,the bad social influence is triggered,and the economy development is broken seriously.Thus,it becomes the kernel for the further development to protect the data privacy.In general,the cases of data privacy leakage occur in the activities of data sharing.Hence,it is the kernel problem of the data privacy protection that the system manager handles the right control in these actions of privacy data query,search,and access.Then,a typical application including all of these actions is Internet of Things data search.In practical Internet of Things applications,to handle the many types of data search service requirements,system manager has to add many different functions.Thus,to meet these application and security requirements,the design of data search scheme with more functions for Internet of Things data becomes the current research keystone.The research issue of this dissertation is the privacy-preserving data search right con-trol theory.The main research content contains data search right control,data origin lo-cation,data access control,data leakage traitor tracing,and the applications of these re-searches in Internet of Things.The research context of this dissertation is divided into four parts:1.This part is the research on multi-key aggregated keyword searchable encryption.The main problems in this part are data search right control and search right distribution and management in large-scale user scenarios.A new targeted inside attack on the Cui's scheme is proposed.The analysis results show that the proposed attack can obtain the target user key efficiently and precisely.Then,a new file-centric keyword searchable en-cryption framework is proposed.The advantage of this framework is analyzed for search right management in large-scale user scenarios.The selective-file keyword guess attack and chosen keyword attack games are defined,and the security model of the file-centric keyword searchable encryption is presented.Then,a concrete construction is completed,and it is more effective than similar schemes.2.This part is the research on key aggregated multi-keyword conjunctive searchable encryption.The main problems in this part are data search right control and data origin precise location.The keyword subset search and negative search results functions are provided,and the Internet of Things devices are managed by the method of the entry man-agement.Comparing with other similar schemes,the keyword index storage and search match test are more efficient,and the keyword index generation overhead is lower.3.This part is the research on the fine-grained search right update in keyword search-able encryption.The main problems in this part are user fine-grained search right update management and offline user search right update.Based on the two ways of the trusted fog node assisted and semi-trusted fog node assisted,two keyword searchable encryption schemes with fine-grained data search right update are proposed.On the method of key update in each time period,different random numbers are selected to compute user search key and system public key in each different time period.From this,the fine-grained search right revocation and authorization functions are completed.Based on the online feature of the fog node,two different methods,where the updated key is stored on trusted fog node directly and updated key information is stored on semi-trusted fog node,are adapted to the offline user search key update.4.This part is the research on the traceable data sharing and keyword searchable en-cryption.The main problems in this part are data search right control,data access control and data leakage traitor tracing.A traceable data sharing and keyword searchable en-cryption scheme is presented.Before the search match test,the search query is detected to determine the validity of this search query.If the search query is invalid,the search request is blocked and the traitor tracing is adopted.To improve the system responding service,the method of multi-layer filtering is introduced to sift out valid search query step by step.From this,the number of search match test is reduced on cloud server,and the perfor-mance on cloud server is improved.In addition,the functions of encrypted data sharing,search result verification and user search right dynamic management are provided.
Keywords/Search Tags:Search right control, Keyword searchable encryption, Data sharing, Cloud storage, Internet of Things
PDF Full Text Request
Related items