Font Size: a A A

The Mechanism Of Multi-User Searchable Encryption Based On Attribute Access Control In Hybrid Cloud

Posted on:2019-07-10Degree:MasterType:Thesis
Country:ChinaCandidate:S Z XiFull Text:PDF
GTID:2348330569478323Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of cloud computing technology,cloud has become an important carrier of data storage.The powerful search capability and low cost of cloud servers attract a large number of users and enterprises to store their data in the cloud,but,once the data is separated from the control of users,various security issues will arise.Because of the semi-trustworthiness of cloud server,illegal users can steal data stored in the cloud by various means,which makes the cloud storage service mechanism have great hidden danger.Data encryption storage is an effective way to ensure the privacy of cloud data.However,data security sharing and efficient search become a major problem.In order to solve the above problems,this paper focuses on the multi-user application scenario of hybrid cloud,and combines the search encryption technology with the attribute based access control technology effectively.This paper proposes a multi-user searchable encryption mechanism based on attribute in hybrid cloud environment and realizes the revocation function of user attribute.This scheme use the thought of Data Partition to divide the plaintext data into critical data and non-critical data in order to adapt to the storage mode of the hybrid cloud.For ensure the high security,we save the small mount of critical data in private cloud server,and for keep efficiency and save storage cost the other data is stored in public cloud server.In this scheme the access control of authorized users is realized by private cloud using LSSS technology,and encrypted the critical data and key words by CP-ABE,a typical symmetric encryption algorithm Z-IDX is used to encrypt non-critical data in public cloud.This scheme identifies the unique version number by attribute information,and updates the key and ciphertext at each stage of the algorithm,thereby to realize the revoke of users' authority.Finally,through the safety analysis and performance analysis,it is concluded that this scheme has high efficiency and is safe and reliable in the safety model.
Keywords/Search Tags:Searchable Encryption, Hybrid Cloud, Attribute Base Encryption, Access Control
PDF Full Text Request
Related items