云存儲中一種支持可驗證的模糊查詢加密方案
doi: 10.11999/JEIT160971
-
1.
(中南大學(xué)信息科學(xué)與工程學(xué)院 長沙 410083) ②(湖南大學(xué)信息科學(xué)與工程學(xué)院 長沙 410082) ③(廣州大學(xué)計算機科學(xué)與教育軟件學(xué)院 廣州 510006)
國家自然科學(xué)基金(61632009, 61472451, 61272151, 61402161)
Fuzzy Searchable Encryption Scheme Supporting Verification in Cloud Storage
-
1.
(School of Information Science and Engineering, Central South University, Changsha 410083, China)
-
2.
(College of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, China)
The National Natural Science Foundation of China (61632009, 61472451, 61272151, 61402161)
-
摘要: 針對當前可查詢加密方案大多不支持模糊查詢的不足,并且無法應(yīng)對惡意服務(wù)器的威脅,云計算亟需為用戶提供一種允許拼寫錯誤并且可以驗證查詢結(jié)果正確性的加密方案。同時考慮到云存儲中數(shù)據(jù)經(jīng)常更新,提出一種動態(tài)云存儲中支持可驗證的模糊查詢加密方案。該方案通過編輯距離生成模糊關(guān)鍵詞集,并基于偽隨機函數(shù)、隨機排列函數(shù)等技術(shù)構(gòu)建安全索引,從而保護用戶的數(shù)據(jù)隱私。通過RSA累加器和哈希函數(shù)驗證查詢結(jié)果的正確性,用于檢測惡意攻擊者的非法行為。安全分析證明該方案能夠保護用戶的隱私安全,并具有可驗證性。實驗結(jié)果表明該方案具有可行性與有效性。Abstract: Most of the existing searchable encryption schemes can not support fuzzy keyword search, and can not resist threats from malicious server, that the cloud computing needs to provide an encryption scheme, which can support typos and verification of the search result. Considering the data is updated frequently in cloud computing, a verifiable fuzzy searchable encryption scheme in dynamic cloud storage is presented. The proposed scheme constructs the fuzzy keyword set based on edit distance technique, and builds secure index based on pseudorandom function and random permutation, so as to protect the users data privacy. The RSA accumulator and Hash function are used to verify the correctness of the search result, in order to detect the cheating behavior of the malicious attacker. The security analysis proves that the proposed scheme is privacy preserving and verifiable. The experiment results show that the proposed scheme is efficient.
-
Key words:
- Cloud storage /
- Privacy preserving /
- Fuzzy search /
- Verifiable search /
- Encryption scheme
-
SONG D X, WAGNER D, and PERRIG A. Practical techniques for searches on encrypted data[C]. IEEE Symposium on Security Privacy, Berkeley, CA, USA, 2000: 44-55. 林鵬, 江頡, 陳鐵明. 云環(huán)境下關(guān)鍵詞搜索加密算法研究[J]. 通信學(xué)報, 2015, 36(Z1): 1-7. doi: 10.11959/j.issn.1000-436x. 2015307. LIN Peng, JIANG Jie, and CHEN Tieming. Application of keyword searchable encryption in cloud[J]. Journal on Communications, 2015, 36(Z1): 1-7. doi: 10.11959/j.issn. 1000-436x.2015307. CAO Ning, WANG Cong, LI Ming, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1): 222-233. doi: 10.1109/TPDS.2013.45. XIA Zhihua, WANG Xinhui, SUN Xingming, et al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(2): 340-352. doi: 10. 1109/TPDS.2015.2401003. FU Zhangjie, SUN Xingming, LIU Qi, et al. Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing[J]. IEICE Transactions on Communications, 2015, 98(1): 190-200. doi: 10.1587/transcom.E98.B.190. 李真, 蔣瀚, 趙明昊. 一個自主授權(quán)的多用戶可搜索加密方案[J]. 計算機研究與發(fā)展, 2015, 52(10): 2313-2322. doi: 10.7544 /issn1000-1239.2015.20150504. LI Zhen, JIANG Han, and ZHAO Minghao. A discretionary searchable encryption scheme in multi-user settings[J]. Journal of Computer Research and Development, 2015, 52(10): 2313-2322. doi: 10.7544/issn1000-1239.2015.20150504. LI Jin, WANG Qian, WANG Cong, et al. Fuzzy keyword search over encrypted data in cloud computing[C]. IEEE International Conference on Computer Communications, San Diego, CA, USA, 2010: 1-5. CHAI Qi and GONG Guang. Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers[C]. IEEE International Conference on Communications, Ottawa, Canada, 2012: 917-922. WANG J, YU X, and ZHAO M. Fault-tolerant verifiable keyword symmetric searchable encryption in hybrid cloud[J]. International Journal of Network Security, 2015, 17(4): 471-483. SUN W, LIU X, LOU W, et al. Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data[C]. IEEE Conference on Computer Communications, Hong Kong, China, 2015: 2110-2118. ZHANG W, LIN Y, and GU Q. Catch you if you misbehave: Ranked keyword search results verification in cloud computing[J]. IEEE Transactions on Cloud Computing, 2015, 6(1): 1-14. doi: 10.1109/TCC.2015.2481389. KUROSAWA K and OHTAKI Y. UC-secure searchable symmetric encryption[C]. International Conference on Financial Cryptography and Data Security, Kralendijk, Bonaire, 2012: 285-298. KAMARA S, PAPAMANTHOU C, and ROEDER T. Dynamic searchable symmetric encryption[C]. ACM Conference on Computer and Communications Security, Raleigh, NC, USA, 2012: 965-976. KAMARA S and PAPAMANTHOU C. Parallel and dynamic searchable symmetric encryption[C]. International Conference on Financial Cryptography and Data Security, Okinawa, Japan, 2013: 258-274. KUROSAWA K and OHTAKI Y. How to update documents verifiably in searchable symmetric encryption[C]. International Conference on Cryptology and Network Security, Paraty, Brazil, 2013: 309-328. GENNARO R, HALEVI S, and RABIN T. Secure hash- and-sign signatures without the random oracle[C]. International Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech Republic, 1999: 123-139. -
計量
- 文章訪問數(shù): 1533
- HTML全文瀏覽量: 268
- PDF下載量: 360
- 被引次數(shù): 0