HABKS:Hierarchical Attribute-based Keyword Search on Outsourcing Data

来源 :第十二届中国可信计算与信息安全学术会议 | 被引量 : 0次 | 上传用户:zilong2006min
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  Searching over encrypted data is a critical operation to enforce the encryption-before-outsourcing mechanism,which is a fundamental solution to protect data privacy in the untrusted cloud environment.However,most of the existing searchable encryption solutions suffer from the problem of key management and the problem of flexible and fine-grained access control in multidata owners and multi-data users environment.Therefore,we propose a hierarchical attribute-based keyword search(HABKS)scheme.Our scheme not only realizes the order management of the key because of its hierarchical structure,but also implements a flexible and fine-grained access control depending on CP-ABE for encrypting keywords indexes and data files.We formally prove the security of HABKS,and then analyze the performance of HABKS.Finally,we implement HABKS scheme with comprehensive experiments.Experiment results show that it is efficient and flexible for searching encrypted data in cloud.
其他文献
钠冷快堆中使用液态金属钠作为冷却剂,但是液体金属钠的化学性质非常活泼,为此钠冷快堆中设计了多层专门的防护措施,最大限度减少了钠冷却剂的泄漏。虽然液体金属钠从冷却剂系统中泄漏的概率很小,但是在严重事故工况下,容纳金属钠的压力容器仍然有破坏的可能,导致堆芯碎片、高温液体钠和混凝土结构材料直接接触,发生强烈的热、化学和机械效应。在美国、法国、英国等快堆技术先进国家早在20 世纪70 年代就开始积极开展钠
Virus,trojan and malware on embedded systems have brought signif-icant effect for the information security of the industrial control systems(ICS).ICS as the national core infrastructure,the security a
针对域间路由协议BGP 的LDDoS 攻击能够使得目标链路路由震荡,造成级联效应,导致整个互联网瘫痪并无法通过技术手段修复,是当前互联网面临的最大安全威胁之一。考虑到LDDoS 的网络规模需求,目前针对LDDoS 攻击的研究都是基于离散事件模拟技术进行评测,但其存在逼真度低、准确性差的问题。为此,提出了一种基于轻量级虚拟化技术的LDDoS 仿真验证方法,可有效兼顾仿真规模与仿真逼真性。围绕LDDo
In order to solve the data transmission security problem of the sensing network,this paper proposes a multi-level trusted clustering mech-anism.The proposed mechanism combines multi-level clustering,i
In the trusted testing of cloud platforms,isolation testing of virtual networks is one of the important tasks.The traditional isolation detection method only extracts network con_guration information
The android operating system provides a rich inter-component communication(ICC)method to bring enormous convenience.However,the android ICC also increases security risks.To address this problem,a form
The Internet of Things connects a large number of real objects with the Internet through a variety of sensing technologies and it is a network that implements the concept of connected objects.However,
There are privacy leakage risks and degradation of performance when verifying the integrity of components with existing methods in a cloud.To address the issue,this work proposes a structural integrit
低轨卫星网络具有覆盖范围广、通信功耗小、机动性高等优势,能够作为地基网络的补充网络为海洋、沙漠和深山等地形复杂的区域提供网络服务。针对由低轨卫星网络信道开放、网络拓扑结构动态变化和用户终端海量特点,导致的安全问题、服务质量问题和网络控制中心负载问题,本文提出了一种基于Token 的动态接入认证协议,基于卫星轨迹可预测性和时钟高度同步的特点构造预认证向量,实现了用户的随遇接入和无缝切换。详细的仿真分
Mobile cloud computing(MCC)is becoming an important way of data sharing.It is of great value for people to store and retrieve personal data at anytime and anywhere.Attribute-based encryption(ABE)can s