Font Size: a A A

Research On Search Technology Of Encrypted Data In Cloud Outsourcing Storage

Posted on:2022-03-12Degree:MasterType:Thesis
Country:ChinaCandidate:Y R LiangFull Text:PDF
GTID:2518306341996869Subject:Computer Software and Application of Computer
Abstract/Summary:PDF Full Text Request
With the widespread popularity of cloud storage technology,in order to reduce the local storage burden,more and more users choose to outsource their encrypted files to the cloud servers.However,how to protect the privacy and effectively search the encrypted files in the cloud has become a problem that cloud server providers and users need to solve.The searchable encryption technology can solve this problem well.Therefore,searchable encryption technology has widely received extensive attention from academia and industry.In this paper,we mainly study the searchable encryption technology in cloud storage.Specifically,it focuses on two research points:(1)realize multi-keyword encrypted cloud files search on the premise of the privacy protection;(2)enhance the functionality of the searchable encryption scheme on the basis of realizing multi-keyword search,such as,verify the accuracy and integrity of the search files,update the keywords of the outsourcing file.The main contributions of this paper can be summarized as follows:1.Based on the improved k-nearest neighbor(k-NN)technology and attribute encryption technology,we design a verifiable attribute-based multi-keyword searchable encryption scheme.This scheme not only protects the privacy of outsourced files and users,but also improves the search accuracy of cloud servers.At the same time,this scheme also can verify the accuracy of the search results and realize the decryption of the search results.2.Based on hidden vector encryption(HVE)technology,we design a verifiable multi-keyword searchable encryption scheme in multi-user setting supporting keywords updating.This scheme can achieve the search control of users and the privacy protection of outsourced files and cloud users.In addition,this scheme realizes the integrity verification and decryption of search results and improves the availability of returned files.Considering the cases of file update or keyword error,this scheme supports keyword updates to improve the flexibility of the scheme.
Keywords/Search Tags:Cloud storage, Multi-keyword search, Verification, Keyword update, Hidden vector encryption
PDF Full Text Request
Related items