Font Size: a A A

A New Efficient Distributed Searchable Asymmetric Encryption Scheme Research

Posted on:2016-03-30Degree:MasterType:Thesis
Country:ChinaCandidate:S L YinFull Text:PDF
GTID:2308330485456202Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the high-speed development of cloud computing service, a large number of users store their sensitive and private data on the cloud server. Because the users put the private data to the server through the outsourcing. The users will lose absolute control for data. So cloud security is not credible. Protecting users’data privacy and security has become a hot research issue at home and abroad. In recent years, searchable encryption is one of the most common solutions. Designing an efficient searchable encryption scheme has an important effect on improving the system’s availability. Searchable encryption saves a large amount of computational for the users and makes full use of the third-party server computing resources for keyword searching.Searchable encryption is mainly divided into symmetrical searchable encryption and asymmetric searchable encryption. This paper discusses the two kinds of searchable encryption methods. And we describe the steps of algorithm, program hypothesis, security model and the analysis of the safety and efficiency. Then we discuss the typical searchable encryption systems and analysis their security and efficiency, such as IBE scheme, BDOP-PEKS scheme. KR-PEKS scheme, DS-PEKS scheme, SWP scheme, Z-IDX scheme and SSE-1 scheme.To improve asymmetric searchable encryption, we propose a distributed searchable encryption asymmetric scheme. It can search the encrypted data to distribute them on storage providers and query agent and be applied on social networking platform to encrypt private data. Distributed searchable encryption asymmetric uses complex search queries(C3DH) and pseudo random function, not only can hide search pattern also prevent leaking users’privacy data. The important is to improve the efficiency of search. In this paper, we make efficiency analysis and safety verification and comparison with distributed symmetric encryption scheme for the distributed searchable asymmetric encryption. At the end. it makes outlook for the future of the searchable encryption and distributed searchable asymmetric encryption scheme.
Keywords/Search Tags:Searchable encryption, cloud security, data security, symmetric searchable encryption, asymmetric searchable encryption, distributed search asymmetric encryption
PDF Full Text Request
Related items