Font Size: a A A

Research On Secure Retrieval Mechanism Of Encrypted Data In Cloud Environment

Posted on:2018-05-06Degree:MasterType:Thesis
Country:ChinaCandidate:M Y LiFull Text:PDF
GTID:2348330515466792Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In the cloud computing,in order to maintain the security of data resources in the process of transmission,people usually use some encryption methods.Although these encryption methods can effectively protect the security of data resources,but also face the problem of data resources are tampered and forged.The main reason is that the data resources become encrypted after the ciphertext,the user cannot determine the effectiveness of the received data.In this situation,it is very important to search the encrypted data efficiently and quickly.In order to solve this problem,this paper proposes two different retrieval strategies for the transmission of data resources in the cloud environment.The main content is described as follows:1)A multi-attribute fuzzy keyword retrieval scheme is proposed,which aims at improving the efficiency of encryption and retrieval in the cloud environment,and proposes a multi-attribute encryption scheme based on cloud environment.This scheme firstly improves the traditional keyword weight calculation algorithm,through extract the multi-attribute values of keywords and multi-attribute values of documents,construct the multi-attribute vector,then calculate the score function of the document,introduce the keyword fuzzy processing algorithm,preprocess the keywords to support the user's fuzzy search enhancement User's experience degree and index structure of the document make the efficiency of the retrieval greatly improved,and the retrieval accuracy of the document is greatly improved by the improved keyword weight algorithm.2)In order to solve the problem of multi-user data sharing in cloud environment,this paper proposes a multi-user search strategy based on hybrid cloud.This scheme first constructs a new cloud environment,public cloud and private cloud.The hybrid cloud has the expansibility of the public cloud and the privacy of the private cloud.Then,the identity-based broadcast encryption is used to securely distribute the key for the multi-user.Finally,the public key encryption is used to encrypt the data after outsourcing,the index matrix is constructed for efficient retrieval and the security of the outsourced data under the hybrid cloud is well protected.
Keywords/Search Tags:cloud computing, encryption retrieval, multi-user, multi-attribute, data outsourcing
PDF Full Text Request
Related items