Font Size: a A A

Research On Range Queries Over Symmetric Encryption Data

Posted on:2015-12-11Degree:MasterType:Thesis
Country:ChinaCandidate:Y XiongFull Text:PDF
GTID:2298330452964032Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the prevalence of cloud computing, more and more businessesand individuals choose to outsource their data storage and computing tothe cloud service providers. But this brings two issues, one is untrustedcloud servers will bring outsource data security risk, the other is how totake full advantage use of the computing and storage capacity of cloudserver. Therefore, ensuring the safety of the outsourcing data, and takeadvantage of the powerful capabilities of cloud computing are worthfurther studying.This thesis presents a symmetric encryption scheme supporting rangesearch (RQED-1), so that the user can do efficient range queries on the datastored on the cloud servers. Compared with the previous schemes, ourRQED-1scheme has the following main advantages. First, RQED-1scheme can achieve non-Adaptive semantic security, which is the highestsecurity of symmetric encryption scheme supporting range queries so far.And RQED-1is the first provably secure symmetric encryption schemesupport range queries in this security level. Second, the search results ofRQED-1do not produce false positives. Third, RQED-1scheme optimizesthe client’s storage overhead. In RQED-1scheme, the client only needs to save a few secret keys and a pseudo-random permutation function. Fourth,RQED-1scheme has a highly efficient query performance, and cloudserver only needs to do a simple XOR operation when taking rangequeries.We also present a storage optimization scheme and a schemesupporting multidimensional range queries encryption scheme based onthe original scheme. We will show these schemes expand the scope ofapplications without sacrificing the security. Meanwhile, these schemesmaintain the characteristics of the client’s low overhead and efficient queryperformance.Finally, we take some experiments to simulate our designs and verifyour analysis, which prove our schemes are practical and efficient.
Keywords/Search Tags:Searchable encryption, range queries on encrypted data, secure outsource computing, multidimensional rangequeries on encrypted data
PDF Full Text Request
Related items