Font Size: a A A

Research On Multi-User Searchable Encryption Scheme In Cloud Computing

Posted on:2017-02-27Degree:MasterType:Thesis
Country:ChinaCandidate:H PanFull Text:PDF
GTID:2348330491963042Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
With the rise of cloud computing,cloud storage is becoming increasingly popular.More and more people and businesses choose to outsource data to the cloud server. However, most of the cloud storage providers ignore the security of user data,that will easily cause leakage of user data. In order to effectively solve the problem of data privacy protection, people can encrypt stored data in the clouds, but the availability of encrypted data becomes a problem. In this case, the searchable encryption technology has been developed, which can encrypt data to protect the privacy of the data to solve security problems, also can search for keywords in the ciphertext data to solve data availability problem.The main work of this paper is as follows:1 We point out the user scenarios of searchable encryption and describe the different scenarios.Current searchable encryption schemes are mostly limited to single-user scenarios, which obviously does not meet the needs of cloud computing in people sharing data. Searching for existing user scenario inefficiencies and problems such as key exposure, this paper studies the existing searchable encryption technology solutions, taking into account different user search scenes, and designs more search programs in line with the of the cloud computing multi-user environment encryption.2 Focusing the inefficient of the some existing public-key encryption schemes and complex key management issues, we put forward a multi-user searchable encryption scheme based on proxy encryption. The scheme uses a private cloud server as a proxy server, which integrates with user management and key management.The private cloud e efficiently enables the user to dynamically update and manage keys. The scheme also cited by a hash indexes to improve search efficiency. In addition, by simplifying the calculation process in addition to the double-line operation, the scheme greatly reduce the computational cost of the program.3 Secondly,we combined the proxy with a symmetric encryption algorithm to solve disclosure issues of the symmetric encryption key to put forward a Integrity verification multi-user searchable encryption scheme. Considering the data stored in the cloud may be replaced or modified, we use the message authentication to achieve the authentication of data integrity. By giving programme details as well as encryption and the security analysis, we proved the feasibility of the plan. We also realize encryption and decryption in codes and simulate results by combining existing Lucene index search technology and SQL,then give the system management module. The system design using modular and subsystem design, gives a practical system.4 We give results of the security analysis and the performance analysis in search efficiency and computational overhead.In this paper, we not only offer the schemes in theory but aslo propose the program in practice and raise technical route. In addition, comparing with other typical schemes, the paper graphics with detailed description of the user and the server-side interaction. This research on multi-user searchable encryption is of great significance for the further development.
Keywords/Search Tags:searchable encryption, cloud computing multi-user, proxy encryption, Integrity verification
PDF Full Text Request
Related items