Font Size: a A A

Research On Several Issues Of Searchable Encryption

Posted on:2014-02-21Degree:MasterType:Thesis
Country:ChinaCandidate:B LongFull Text:PDF
GTID:2248330392460919Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the powerful development of networking technology, cloud computing hasgrown up in recent years. More and more enterprises, public orgnization and indi-viduals start to make use of cloud technology.Some enterprises and individuals beginmagrating there data and service to the cloud end, to ultilize cloud’s great comput-ing/storage ability as a low-cost and efcient solution.Under the circurstance of privatecloud, alldataareblockoutfromtheoutsideworld, sosecurityisnotthemosthotpointto focus. However, with public cloud’s opening and sharing, security become very im-portant which will even infuence the spreading and development of cloud computing.Searchable encryption is a technology to support searching keywords in outsource s-tored and encrypted documents. The server or the cloud side do such things for uswithout awaring information of its content. Now, there are mainly two searchable en-cryptionimplementation,SSE(symmetricsearchableencryption)andASE(asymmec-tricencryption). Thetwosolutionsarediferentinperformanceandfunctionalitywhilethey applied to diferent application.We investigated the PEKS (public key encryption with keyword search) and pro-posed a better solution under the case of fulltext searching. We design a new indexstructure which can accelerate the search procedure with a large keywords amount.Wealso analyze thesecurityof the newconstruction intherandom oraclemodelwhichmodifed from the original solution and proved it to be security. In our solution, userscan balance the trade-of between memory storage and performance by confgurationsome parametres, which can be fexible for diferent application requirements.Meanwhile, we do research of encrypted range query of relation database underthe model Data-As-Service. We fnd a way to reduce the data transformation of solu-tions based on bucketazation while the queried data doesn’t exist in the database. Inour solution if data or range doesn’t exist in the data set, the system can easily judge and reply a empty signal instead of transforming all the potential data to the client.We implement a Demo system for each scheme to do some contrastvie experi-ments, and results show that our two schemes both achieve the theoretical improve-ments.
Keywords/Search Tags:cloudcomputing, searchableencryption, asymmetricsearchableencryption, computing outsource
PDF Full Text Request
Related items