Font Size: a A A

Research On Attribute-based Searchable Encryption

Posted on:2017-09-01Degree:MasterType:Thesis
Country:ChinaCandidate:B M WangFull Text:PDF
GTID:2348330503472519Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of the Internet technology and network storage, the security problems of the data in network have emerged increasingly. The data can be protected by encryption. However once the data is encrypted, it can't be directly retrieved. How to retrieve the encrypted data in the case of ensuring data security has become an important research topic. As a result, the searchable encryption has been put out.On the basis of existing attribute-based searchable encryption schemes, an improved scheme was proposed and implemented. The improved scheme improves the efficiency of searching in the case of the data security. In order to ensure the users' authority of designing the data access policy, the schema is designed based on the CP-ABE scheme. In order to ensure the safety of the decrypted data and the efficiency of the encryption, the scheme uses a symmetric key. Using the proxy re-encryption technology, the data server and the users work together to complete the encryption and decryption of the data. The scheme uses two indexes to avoid the severe decline of search efficiency with the rapidly increase of the amount of the data. Firstly, with the help of database services, the data with the right keywords will be quickly filtered out. Then the permissions for accessing the data will be verified. Meanwhile, the consistency was analysed and the security of the scheme was proved. In order to verify the correctness of the scheme, a searchable encryption system was designed and implemented on the basis of the improved scheme.The improved attribute-based searchable encryption scheme satisfies the computing consistency. In the case of ensuring the data security, the search efficiency is improved with less cost of computing resource.
Keywords/Search Tags:Attribute-based Encryption, Searchable Encryption, Data Security
PDF Full Text Request
Related items