信息网络安全 ›› 2024, Vol. 24 ›› Issue (9): 1444-1457.doi: 10.3969/j.issn.1671-1122.2024.09.012
收稿日期:
2023-11-16
出版日期:
2024-09-10
发布日期:
2024-09-27
通讯作者:
鲁秀青 作者简介:
谢小凤(1999—),女,湖北,硕士研究生,主要研究方向为云计算、属性基加密|张鑫涛(1998—),男,山东,硕士研究生,主要研究方向为云计算、属性基加密、区块链技术|王鑫(1998—),男,江苏,硕士研究生,主要研究方向为云计算、属性基加密|鲁秀青(1975—),女,山东,副教授,博士,主要研究方向为云计算、属性基加密、身份基加密
基金资助:
XIE Xiaofeng, ZHANG Xintao, WANG Xin, LU Xiuqing()
Received:
2023-11-16
Online:
2024-09-10
Published:
2024-09-27
摘要:
尽管基于属性的可搜索加密(Attribute-Based Searchable Encryption,ABSE)能够安全有效地实现对密文的可控搜索,但目前的多关键字ABSE方案计算开销过大,且大量数据存储在云服务器中,存在数据冗余问题。针对上述问题,文章提出一种基于云存储的多关键字可搜索加密方案,采用云边缘协同的工作模式,将加密数据存储在云服务器上,同时将加密索引上传到最近的边缘节点,进行关键字搜索和协助解密,降低系统开销。为了进一步减轻客户端的计算开销,方案还采用了预加密机制。同时方案通过设置数据标签实现数据去重功能,引入验证算法保证搜索结果的完整性和正确性。安全性分析和性能分析证明了方案的有效性和实用性,与其他方案对比证明了方案具有更好的性能和更全面的功能。
中图分类号:
谢小凤, 张鑫涛, 王鑫, 鲁秀青. 基于云存储的多关键字可搜索加密方案[J]. 信息网络安全, 2024, 24(9): 1444-1457.
XIE Xiaofeng, ZHANG Xintao, WANG Xin, LU Xiuqing. Multi-Keyword Searchable Encryption Scheme Based on Cloud Storage[J]. Netinfo Security, 2024, 24(9): 1444-1457.
[1] | YANG Pan, XIONG Naixue, REN Jingli. Data Security and Privacy Protection for Cloud Storage: A Survey[J]. IEEE Access, 2020, 8: 131723-131740. |
[2] | HUANG Qinlong, CHEN Lixuan, WANG Chao. A Parallel Secure Flow Control Framework for Private Data Sharing in Mobile Edge Cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2022, 33(12): 4638-4653. |
[3] | LIU Liyuan, HAN Meng, WANG Yan, et al. Understanding Data Breach: A Visualization Aspect[C]// WASA. Wireless Algorithms, Systems, and Applications:13th International Conference. Heidelberg: Springer, 2018(13): 883-892. |
[4] | KOLEVSKI D, MICHAEL K, ABBAS R et al. Cloud Data Breach Disclosures: The Consumer and Their Personally Identifiable Information(PII)?[C]// IEEE. Norbert Wiener in the 21st Century(21CW). New York: IEEE, 2021: 1-9. |
[5] |
WANG Yunling, WANG Jianfeng, CHEN Xiaofeng. Secure Searchable Encryption: A Survey[J]. Journal of Communications and Information Networks, 2016, 1: 52-65.
doi: 10.11959/j.issn.2096-1081.2016.043 |
[6] | LI Chaoyang, DONG Mianxiong, LI Jian, et al. Efficient Medical Big Data Management with Keyword-Searchable Encryption in Healthchain[J]. IEEE Systems Journal, 2022, 16(4): 5521-5532. |
[7] | ZHANG Yinghui, ZHU Tian, ZHENG Dong. Multi-Keyword Fine-Grained Searchable Encryption Scheme Based on Blockchain[J]. Netinfo Security, 2021, 21(2): 34-44. |
张应辉, 朱甜, 郑东. 基于区块链的多关键字细粒度可搜索加密方案[J]. 信息网络安全, 2021, 21(2):34-44. | |
[8] |
ZHANG Jianhong, WU Menglong, WANG Jing, et al. Secure and Verifiable Multi-Keyword Searchable Encryption Scheme in Cloud[J]. Journal on Communications, 2021, 42(4): 139-149.
doi: 10.11959/j.issn.1000-436x.2021054 |
张键红, 武梦龙, 王晶, 等. 云环境下安全的可验证多关键词搜索加密方案[J]. 通信学报, 2021, 42(4):139-149.
doi: 10.11959/j.issn.1000-436x.2021054 |
|
[9] | SONG D X, WAGNER D, PERRIG A. Practical Techniques for Searches on Encrypted Data[C]// IEEE. Symposium on Security and Privacy. New York: IEEE, 2000: 44-55. |
[10] | LIU Xueqiao, YANG Guomin, SUSILO W, et al. Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems[J]. IEEE Transactions on Parallel and Distributed Systems, 2020, 32(3): 561-574. |
[11] |
WANG Shangping, JIA Shasha, ZHANG Yaling. Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage[J]. IEEE Access, 2019, 7: 50136-50147.
doi: 10.1109/ACCESS.2019.2910828 |
[12] | LU Xiaofeng, FU Songbing. A Trusted Data Access Control Scheme Combining Attribute-Based Encryption and Blockchain[J]. Netinfo Security, 2021, 21(3): 7-14. |
芦效峰, 付淞兵. 属性基加密和区块链结合的可信数据访问控制方案[J]. 信息网络安全, 2021, 21(3):7-14. | |
[13] | LIANG Yanrong, LI Yanping, ZHANG Kai, et al. VMSE: Verifiable Multi-Keyword Searchable Encryption in Multi-User Setting Supporting Keywords Updating[EB/OL]. (2023-08-10)[2023-10-11]. https://doi.org/10.1016/j.jisa.2023.103518. |
[14] | MOATZA T, SHIKFA A. Boolean Symmetric Searchable Encryption[C]// ACM. 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. New York: ACM, 2013: 265-276. |
[15] | ZHANG Rui, IMAI H. Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption[C]// Springer. 6th International Conference on Cryptology and Network Security. Heidelberg: Springer, 2007: 159-174. |
[16] | SHI Zhenkui, FU Xuemei, LI Xianxian, et al. ESVSSE: Enabling Efficient, Secure, Verifiable Searchable Symmetric Encryption[J]. IEEE Transactions on Knowledge and Data Engineering, 2020, 34(7): 3241-3254. |
[17] | WANG Xiaofen, MU Yi, CHEN Rongmao, et al. Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group[J]. Journal of Computer Science and Technology, 2016, 31: 1012-1027. |
[18] | GOLLE P, STADDON J, WATERS B. Secure Conjunctive Keyword Search over Encrypted Data[C]//Springer. Applied Cryptography and Network Security:Second International Conference, ACNS 2004. Heidelberg: Springer, 2004: 31-45. |
[19] | XU Peiming, TANG Shaohua, XU Peng, et al. Practical Multi-Keyword and Boolean Search over Encrypted E-Mail in Cloud Server[J]. IEEE Transactions on Services Computing, 2019, 14(6): 1877-1889. |
[20] | GAO Sheng, CHEN Yuqi, ZHU Jianming, et al. BPMS: Blockchain-Based Privacy-Preserving Multi-Keyword Search in Multi-Owner Setting[J]. IEEE Transactions on Cloud Computing, 2022, 11(3): 2260-2272. |
[21] | ZOU Yipeng, PENG Tao, WANG Guojun, et al. Blockchain-Assisted Multi-Keyword Fuzzy Search Encryption for Secure Data Sharing[EB/OL]. (2023-09-09)[2023-10-29]. https://doi.org/10.1016/j.sysarc.2023.102984. |
[22] | SAHAI A, WATERS B. Fuzzy Identity-Based Encryption[C]// IACR. 24th Annual Iernational Cnference on the Teory and Appcations of Cyptographic Tchniques. Heidelberg: Springer, 2005: 457-473. |
[23] | GOYAL V, PANDEY O, SAHAI A, et al. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data[C]// ACM. 13th ACM Conference on Computer and Communications Security. New York: ACM, 2006: 89-98. |
[24] | GE Chunpeng, SUSILO W, LIU Zhe, et al. Secure Keyword Search and Data Sharing Mechanism for Cloud Computing[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(6): 2787-2800. |
[25] | MIAO Yinbin, LIU Ximeng, CHOO K K R, et al. Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-Owner Setting[J]. IEEE Transactions on Dependable and Secure Computing, 2019, 18(3): 1080-1094. |
[26] | WU Yalian, LI Xinyu, LIU Zheng. Attribute-Based Keyword Searchable Encryption Scheme for Multi-Authority in Cloud Storage[C]// IEEE. 22nd International Conference on Communication Technology(ICCT). New York: IEEE, 2022: 933-939. |
[27] | MIAO Yinbin, DENG R H, LIU Ximing, et al. Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data[J]. IEEE Transactions on Dependable and Secure Computing, 2019, 18(4): 1667-1680. |
[28] | LIU Xueyan, HUAN Lijuan, SUN Ruirui, et al. Lightweight Fine-Grained Multiowner Search over Encrypted Data in Cloud-Edge Computing[EB/OL]. (2023-01-06)[2023-10-29]. https://doi.org/10.1155/2023/1701874. |
[29] | VIVEK S S, RAMASAMY R, GEORGE P, et al. Dynamic Verifiable Encrypted Keyword Search: Using Bitmap Index[J]. Journal of Signal Processing Systems, 2018, 90(8-9): 1151-1165. |
[30] | QIN Baodong, CHEN Congzheng, HE Junjie, et al. Multi-Keyword Searchable Encryption Scheme Based on Verifiable Secret Sharing[J]. Netinfo Security, 2023, 23(5): 32-40. |
秦宝东, 陈从正, 何俊杰, 等. 基于可验证秘密共享的多关键词可搜索加密方案[J]. 信息网络安全, 2023, 23(5):32-40. | |
[31] | SUN Jin, REN Lili, WANG Shangping, et al. Multi-Keyword Searchable and Data Verifiable Attribute-Based Encryption Scheme for Cloud Storage[J]. IEEE Access, 2019(7): 66655-66667. |
[32] | LI Feng, MA Jianfeng, MIAO Yinbin, et al. Verifiable and Dynamic Multi-Keyword Search over Encrypted Cloud Data Using Bitmap[J]. IEEE Transactions on Cloud Computing, 2021, 11(1): 336-348. |
[33] | FENG Tao, MIAO Sirui, LIU Chunyan, et al. Verifiable Keyword Search Encryption Scheme That Supports Revocation of Attributes[J]. Symmetry, 2023, 15(4): 914-926. |
[34] | CHEN Biwen, XIANG Tao, HE Debiao, et al. BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records[J]. IEEE Transactions on Information Forensics and Security, 2023, 18: 3171-3184. |
[1] | 张学旺, 陈思宇, 罗欣悦, 雷志滔, 谢昊飞. 面向云辅助工业物联网的高效可搜索属性基加密方案[J]. 信息网络安全, 2024, 24(9): 1352-1363. |
[2] | 刘芹, 王卓冰, 余纯武, 王张宜. 面向云安全的基于格的高效属性基加密方案[J]. 信息网络安全, 2023, 23(9): 25-36. |
[3] | 石润华, 谢晨露. 云边缘环境中基于属性加密的可验证EMR外包解决方案[J]. 信息网络安全, 2023, 23(7): 9-21. |
[4] | 李莉, 朱江文, 杨春艳. 基于属性加密的可撤销机制研究综述[J]. 信息网络安全, 2023, 23(4): 39-50. |
[5] | 郭瑞, 魏鑫, 陈丽. 工业物联网环境下可外包的策略隐藏属性基加密方案[J]. 信息网络安全, 2023, 23(3): 1-12. |
[6] | 李家辉, 秦素娟, 高飞, 孙东旭. 基于属性加密的区块链组织交易可控可监管隐私保护方案[J]. 信息网络安全, 2023, 23(12): 103-112. |
[7] | 张学旺, 姚亚宁, 黎志鸿, 张豪. 基于联盟链和Asmuth-Bloom秘密共享算法的数据共享方案[J]. 信息网络安全, 2022, 22(11): 17-23. |
[8] | 芦效峰, 付淞兵. 属性基加密和区块链结合的可信数据访问控制方案[J]. 信息网络安全, 2021, 21(3): 7-8. |
[9] | 汪金苗, 谢永恒, 王国威, 李易庭. 基于属性基加密的区块链隐私保护与访问控制方法[J]. 信息网络安全, 2020, 20(9): 47-51. |
[10] | 郎为民, 马卫国, 张寅, 姚晋芳. 一种支持数据所有权动态管理的数据去重方案[J]. 信息网络安全, 2020, 20(6): 1-9. |
[11] | 施国峰, 张兴兰. 面向云存储的支持范围密文搜索的属性基加密方案[J]. 信息网络安全, 2020, 20(6): 75-81. |
[12] | 张艺, 刘红燕, 咸鹤群, 田呈亮. 基于授权记录的云存储加密数据去重方法[J]. 信息网络安全, 2020, 20(3): 75-82. |
[13] | 刘鹏, 何倩, 刘汪洋, 程序. 支持撤销属性和外包解密的CP-ABE方案[J]. 信息网络安全, 2020, 20(3): 90-97. |
[14] | 郎为民, 王雪丽, 张汉, 裴云祥. 一种基于秘密共享算法的安全数据去重方案[J]. 信息网络安全, 2020, 20(11): 43-50. |
[15] | 许盛伟, 王飞杰. 多机构授权下可追踪可隐藏的属性基加密方案[J]. 信息网络安全, 2020, 20(1): 33-39. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||