Font Size: a A A

Research On Searchable Encryption Technology To Protect The Integrity Of Search Results

Posted on:2022-02-23Degree:MasterType:Thesis
Country:ChinaCandidate:Q J ZhangFull Text:PDF
GTID:2518306494970989Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Due to the advantages of large scale,virtualization and low cost of cloud computing,individuals and enterprises are willing to outsource their local data storage and computing to cloud servers.However,data integrity and privacy issues have seriously hindered the alication of cloud storage technology.For security reasons,data often needs to be encrypted before it is outsourced to a cloud server.However,encryption destroys the correlation between data files,which poses a great challenge to users' file search management.Searchable encryption enables users to safely retrieve the specified ciphertext from the cloud server without revealing any information about the ciphertext and its keywords.Existing searchable encryption schemes generally assume that the cloud server is honest and curious,and that it will honestly fulfill the protocol.However,in the real scene,due to economic interests and other factors,cloud servers may have malicious behaviors,such as launching selective forwarding attack on search users,that is,after completing ciphertext retrieval,the server maliciously refuses to return the complete search results to users,but only returns part of the search results.Therefore,it is very necessary to provide the integrity verification mechanism of search results.In order to solve the above problems,this paper proposes two kinds of searchable encryption schemes with integrity verification of search results.The main contents are as follows:1.In order to ensure the integrity of search results and resist the selective forwarding attack of malicious cloud server,this scheme adopts the method of binding the number of ciphertext with keywords,so that search users can verify the number of ciphertext in search results,thus realizing the integrity detection of search results sent by the server.At the same time,by updating the number of ciphertext stored in the server,the scheme can not only resist the selective forwarding attack of the server,but also realize ciphertext updating and forward security.Finally,the performance of the scheme is analyzed through experiments.The experimental results show that the scheme can not only meet the security requirements,but also achieve high computational efficiency.It has high practicability.2.In view of the keyword search solutions in the search results more integrity verification problems,this scheme by introducing public audit technology,after complete the cipher text retrieval,cloud server does not directly to the search results back to the user,but rather the search results are sent to the audit in servers integrity test,so as to realize the cloud to verify the integrity of the ciphertext.At the same time,this scheme also uses the hash chain technology and the hash function with the key to realize the privacy protection and forward security of the search mode.Through strict security analysis,the proposed scheme is safe under the standard model.Finally,by comparing the efficiency and performance of the three schemes,the experimental results show that the comprehensive performance of the scheme is the best.
Keywords/Search Tags:Cloud Computing, Searchable Encryption, Integrity, Verifiable
PDF Full Text Request
Related items