Font Size: a A A

Verifiable Symmetric Searchable Encryption Protocol With Data Integrity Checking

Posted on:2019-09-24Degree:MasterType:Thesis
Country:ChinaCandidate:Y F WangFull Text:PDF
GTID:2428330542499820Subject:Basic mathematics
Abstract/Summary:PDF Full Text Request
With the rapid development of cloud computing,migrating data to the cloud is a general trend.However,cloud data can be acquired by server administrators and illegal users.It poses a serious threat to privacy and security.Frequent cloud accidents also make people pay more and more attention to the safety of cloud data and privacy of personal computing.Encryption is the most effective method to ensure cloud data security,but cloud computing can not directly process ciphertext data.Searchable encryption(SE)is a technology supporting ciphertext search developed and developed in the late 90s.It is divided into symmetric and asymmetric searchable encryption based on different encryption algorithms.The private cloud(Baidu cloud)or private cloud application platform(Tencent live-video cloud etc.),supply a convenient and fast information transmission and access to information,not only the cloud data far from the local regulation,the transmission of information is far from the local regulation,local only get feedback of cloud computing results,so the user does not have privacy and to challenge the cloud server,this problem is more and more valued by users,can be summed up the integrity and security of cloud storage data,verifiable of cloud computing results.In view of the single user and untrusted server two parties scene,the selection of encryption scheme:for symmetric encryption algorithm,mainly by using the pseudo random function and pseudo random permutation,relative to the asymmetric encryption algorithm is generally used bilinear pairings,modular inverse and exponential operation,the symmetric algorithm with the rapid calculation of characteristics,but the defects of that has the security channel,to ensure the safety of the user distribution between the secret key.However,a single user in the two parties situation does not require the symmetric search encryption scheme to be selected under the secure channel,and the asymmetric search encryption scheme is adopted to achieve the fast encryption and decryption.After the study on the existing symmetric searchable encryption scheme,in the single user and two parties cloud server scenarios,classify the assumptions on the untrusted server,and gives the corresponding hypothesis model and related security concepts,and then through the interpolation polynomial with a timestamp to construct index,in the scheme 3,through 1 round of interaction,non-ergodic searching on the index,with probability 1 returns may verify the search results,the user through the local key implementation of integrity detection and return data,then proof the correctness and security of the scheme,the main ideas and innovations:By using the index of polynomial interpolation and combining the characteristic of the time stamp and controllable search,introducing the concept of "time division level" to improve the index that enables verification of search results and time.By combining a general data integrity checking scheme,proposed a verifiable symmetric searchable encryption protocol with data integrity checking,which the correctness and security of the scheme was proved.The storage overhead of the cloud is increased linearly at the time level,and the full data integrity can not be detected by 1 rounds.In the design of the program,according to the different needs of users,three hypotheses are put forward for the untrustworthy server,and three corresponding solutions are given.Finally,the existing work is analyzed and summarized,and the future research direction and application scene are also prospected.
Keywords/Search Tags:Interpolation polynomials, Time level, Verifiable Searchable Encryption, Data Integrity Checking
PDF Full Text Request
Related items