Font Size: a A A

Research Of Encrypted Data Security Retrieval Issue In The Cloud

Posted on:2016-07-14Degree:MasterType:Thesis
Country:ChinaCandidate:Z Z ZhangFull Text:PDF
GTID:2308330482957854Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the development of network storage services, more and more businesses and individuals choose to outsource local complex data management things to a third party server. In order to protect their privacy, the data need to be encrypted before outsourcing. We need to develop security searches encryption technology, to retrieve the file the user is interested from the vast amounts of ciphertext data.Existing keyword retrieval technologies mostly focus on the search of single keyword. Multi-keyword retrieval schemes also mostly focus on the retrieval of a single data owner. We also need fuzzy keyword retrieval technology when user input an error keyword. The existing fuzzy keyword retrieval scheme is still deficient in accuracy. Therefore, this thesis proposes safety multiple data owners and multiple keyword secure ordering retrieve model in the cloud, semantics fuzzy keyword retrieve scheme on the basis of previous studies, and the details are as follows.1、We define the multiple data owners and multiple keyword secure ordering search model in the cloud, under the premise of server is honest-but-curious. Then we design the solution for the model based on the method of coordinate matching. Our program not only supports multiple data owners, multi keyword search, but also to meet a series of stringent security requirements that we set, while the search results are sorted. Users are friendly to find the file you are interested in. The simulation results show that the program has lower computation and communication.2、We add word frequency information to the search index to design the search scheme, in the method of representation fuzzy keyword by wildcard. The program makes fuzzy keyword retrieve more accurate, and it also can be applied to multiple data owners, multiple keyword fuzzy keyword search model. We can prove the program is secure in an honest-but-curious server model through rigorous security analysis.
Keywords/Search Tags:Cloud computing, searchable encryption, privacy- protect, multiple data owners, ranked search, fuzzy keyword
PDF Full Text Request
Related items