Font Size: a A A

Research On Cloud Verifiable Search And Computing Mechanism Combined With Fully Homomorphic Encryption

Posted on:2020-05-08Degree:MasterType:Thesis
Country:ChinaCandidate:J J DuFull Text:PDF
GTID:2428330590458350Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
Currently,cloud computing and cloud platform applications are becoming popular,and many users store data in the cloud.In view of the non-trustworthiness of the cloud,in order to ensure the security of sensitive data,users usually perform encrypted data cloud storage,but this loses the availability of data.The emergence of a fully homomorphic encryption algorithm enables operations such as searching and computing on encrypted data.In addition,for the uncertainty of the return results of cloud service providers,it is necessary to verify the relevant return results to ensure the effective availability of the results,thus promoting the good development of cloud computing.A fully homomorphic encryption algorithm based on the RLWE problem is analyzed.The algorithm of digital extraction is improved,and the bootstrapping process is sequenced to reduce the depth and improve the efficiency.Using the improved fully homomorphic encryption algorithm proposed above,a verifiable keyword search method in cloud environment is constructed.Firstly,the keyword sets are encrypted homomorphically,and then the security reverse index is constructed.The auditor is used to verify the search results by using the Merkle hash tree to ensure the credibility of the cloud search results.Finally,the security of the solution and a simple simulation result are given in the article.The cloud environment verifiable keyword search scheme proposed above is extended,and a verifiable function calculation scheme in the cloud environment is created.The original data sets are encrypted homomorphically,and the calculation function is transformed into a parametric equation.Aiming at the problem that the calculation function is exposed to the cloud service provider,the polynomial factorization method is used to verify the result,and the security analysis and experimental performance evaluation comparison analysis are given in the article.
Keywords/Search Tags:Cloud computing, Fully homomorphic encryption, Verifiable search, Verifiable computing
PDF Full Text Request
Related items