Font Size: a A A

Research On Searchable Encryption Protocol For Cloud Sharing Based On Proxy Re Encryption

Posted on:2021-12-19Degree:MasterType:Thesis
Country:ChinaCandidate:Z G ZhengFull Text:PDF
GTID:2518306107460764Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
With the arrival of 5g era,more and more occasions in our life apply Internet technology.A large number of data are collected in each occasion.Analyzing the generated data can effectively improve our work and life efficiency.The cost of personal saving and maintaining these data is relatively high,while cloud storage provides cheap and convenient services,so most users upload personal files to cloud storage,but cloud services can not guarantee that user data will not be stolen.In order to solve the security problem of cloud data,searchable encryption protocol is proposed in cryptography.The traditional searchable protocol or symmetric encryption algorithm,or public key encryption algorithm,or attribute encryption,all of these algorithms have a common feature.When sharing cloud ciphertext data,they need to generate a specific ciphertext index for users,or need the data owner to assist in generating search trap.This year,some researchers also apply proxy re encryption algorithm in searchable protocol,but only in the encryption process of cloud data,which improves the sharing of ciphertext data,and the sharing of search ability is still not solved.In order to improve the application experience of searchable encryption protocol in the field of cloud sharing,this paper proposes a new searchable protocol based on proxy re encryption.The protocol uses bilinear mapping function to build public key encryption system,and uses personal identity information as the public key of encryption algorithm,and bilinear mapping as the core tool of encryption and search test.In order to improve the sharing of ciphertext data,the protocol uses proxy re encryption algorithm to encrypt the data.At the same time,in order to share the searchability of ciphertext data,the protocol uses proxy re encryption algorithm for the first time in the search and test process,uses the characteristics of proxy re encryption to design the sharing bill binding user's personal information,and combines the matching algorithm of bilinear mapping to complete the search and test process Sharing bills can share the search ability,at the same time,it can give full play to the characteristics of proxy re encryption algorithm,and assign users to share quickly.Through the simulation test of PBC database,the searchable protocol based on proxy re encryption can effectively reduce the cost of network bandwidth in the process of data sharing.When using this protocol to design cloud shared storage system,it can greatly simplify the system design.At the same time,users do not need to generate additional ciphertext index or online help search process when sharing data.
Keywords/Search Tags:cloud storage, sharing, searchable encryption, agent re encryption, bilinear mapping
PDF Full Text Request
Related items