Font Size: a A A

Anonymously Keyword Search Over Encrypted Data In Cloud Computing

Posted on:2014-08-22Degree:MasterType:Thesis
Country:ChinaCandidate:J WangFull Text:PDF
GTID:2308330473450979Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
As an important part of cloud computing, cloud storage provides online storage services for users. Although cloud storage will present opportunities for IT efficiency, cost saving and green computing, it still faces some security challenge.In cloud storage mode, data is stored in CSP, away from the control of data owner, and its security highly depends on CSP. Considering the incredibility of CSP,to preserve the data confidentiality, the data owner could encrypt the plaintext data and then store the ciphertext in CSP. But ciphertex also brings some inconvenience when users want to use their data. For example, users could not do interval search or keyword search for ciphertext.According to the features of cloud computing environment, this paper presented a solution of anonymously keywords search over encrypted data. First of all, this paper put forward a system model of search over encrypted data for cloud computing, on this basis, dividing the participants into four groups-data owner, authorized user, CSP, trusted third party(TTP). Secondly, this paper introduced the Bloom filter to construct keyword index vector. And we encrypt the keyword index vector using the key stored in the trusted third party to generating the encrypted index vector. Finally, when an authorized user submitted a query, the solution generated a trapdoor vector and calculated the encrypted index vector and the trapdoor vector’s inner product similarity, returning the all ranked file or top-k file.Comparison of the simulation results with MRSE show that, this solution could ensure the query accuracy and could efficiently build files query index. It also had the ability to quickly process and return the all ranked files or top-k file that authorized user queried.
Keywords/Search Tags:cloud computing, trusted third party, search over encrypted data, bloom filter, inner product similarity
PDF Full Text Request
Related items