基于倒排索引的可验证混淆关键字密文检索方案
作者:
作者简介:

杜瑞忠(1975-),男,河北献县人,博士,教授,CCF专业会员,主要研究领域为可信计算,信息安全;田俊峰(1975-),男,博士,教授,博士生导师,CCF高级会员,主要研究领域为分布计算,可信计算,信息安全;李明月(1993-),女,硕士生,主要研究领域为可信计算,信息安全;吴万青(1981-),男,博士,讲师,主要研究领域为信息安全,密码学.

通讯作者:

李明月,E-mail:15630424277@163.com

中图分类号:

TP309

基金项目:

国家自然科学基金(61572170,61170254);河北省自然科学基金(F2018201153,F2019201290);河北省高等学校科学技术研究基金(ZD2016043)


Verifiable Obfuscated Keyword Ciphertext Retrieval Scheme Based on Inverted Index
Author:
Fund Project:

National Natural Science Foundation of China (61572170, 61170254), Natural Science Foundation of Hebei Province (F2018201153, F2019201290); Science and Technology Research Project of Colleges and Universities of Hebei Province (ZD2016043)

  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [25]
  • |
  • 相似文献 [20]
  • | | |
  • 文章评论
    摘要:

    随着云计算的发展,以密文检索为核心技术的安全搜索问题日益成为国内外研究的热点.为了提高密文检索方案的安全性,提出了基于倒排索引的可验证混淆关键字密文检索方案.首先,在构建陷门时插入混淆关键字抵抗恶意云服务器的关键字攻击,同时引入数据缓存区,利用Pailliar加密技术对包含混淆关键字搜索结果进行盲计算,过滤掉包含目标关键字以外的密文数据,减少通信开销;其次,利用双线性映射生成标签验证搜索结果,并对方案在正确性、安全性和可靠性这3个方面进行了验证.在真实数据集上进行反复实验,理论分析和实验结果表明,该方案在保证检索效率的同时,比现有的密文检索方案有效地提高了密文检索的安全性.

    Abstract:

    With the development of cloud computing, the issue of secure search with ciphertext retrieval as the key technology has become a hot topic at worldwide. In order to improve the security of the ciphertext retrieval scheme, a verifiable ciphertext retrieval scheme is designed based on inverted index. First, insert the confusion keywords when building trapdoorstoagainst a malicious cloud server's keywords attack. At the same time, the data cache area is introduced, which utilize the Pailliar encryption technology to blindly calculate the search results containing the obfuscated keywords, and the ciphertext data other than the target keyword is filtered out to reduce the communication overhead. Secondly, take advantage of bilinear maps generate tags to verify search results, and verify the scheme in terms of correctness, security and reliability. Repeated experiments on real data sets, theoretical analysis and experimental results show that the proposed scheme can improve the security of ciphertext retrieval compared with the existing ciphertext retrieval schemes while ensuring retrieval efficiency.

    参考文献
    [1] Li JW, Jia CF, Liu ZL, Li J, Li M. Survey on the searchable encryption. Ruan Jian Xue Bao/Journal of Software, 2015, 26(1):109-128(in Chinese with English abstract). http://www.jos.org.cn/1000-9825/4700.htm[doi:10.13328/j.cnki.jos.004700]
    [2] Song XD, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In:Proc. of the IEEE Symp. on Security and Privacy. IEEE Press, 2000. 44-55.
    [3] Curtmola R, Garay J, Kamara S, Ostrovsky R. Searchable symmetric encryption:Improved definitions and efficient constructions. In:Proc. of the 13th ACM Conf. on Computer and Communications Security. New York:ACM Press, 2006. 79-88.
    [4] Ibrahim A, Jin H, Yassin AA, et al. Secure rank-ordered search of multi-keyword trapdoor over encrypted cloud data. In:Proc. of the IEEE Asia-Pacific Services Computing Conf. IEEE Computer Society, 2012. 263-270.
    [5] Chen XF, Huang XY, Li J, et al. New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans. on Information Forensics & Security, 2014,10(1):69-78.
    [6] Sun W, Wang B, Cao N, et al. Privacy-Preserving multi-keyword text search in the cloud supporting similarity-based ranking. In:Proc. of the ACM Sigsac Symp. on Information, Computer and Communications Security. ACM Press, 2013. 71-82.
    [7] Chen C, Zhu X, Shen P, et al. An efficient privacy-preserving ranked keywordssearch method. IEEE Trans. on Parallel & Distributed Systems, 2016,27(4):951-963.
    [8] Jiang X, Yu J, Yan J, et al. Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data. Information Sciences, 2017,403(3):22-41.
    [9] Liu Q, Nie X, Liu X, et al. Verifiable ranked search over dynamic encrypted data in cloud computing. In:Proc. of the Int'l Symp. on Quality of Service. IEEE, 2017. 1-6.
    [10] Zhang W, Lin Y, Gu Q. Catch you if you misbehave:ranked keyword search results verification in cloud computing. IEEE Trans. on Cloud Computing, 2018,1(6):74-86.
    [11] Wan Z, Deng RH. VPSearch:Achieving verifiability for privacy-preserving multi-keywordsearch over encrypted cloud data. IEEE Trans. on Dependable & Secure Computing, 2018,15(6):1083-1095.
    [12] Zhang R, Xue R, Yu T, et al. PVSAE:A public verifiable searchable encryption service framework for outsourced encrypted data. In:Proc. of the IEEE Int'l Conf. on Web Services. IEEE, 2016. 428-435.
    [13] Qiu S. Research on privacy-preserving keyword search and set operations over encrypted data[Ph.D. Thesis]. Beijing:Beijing Jiaotong University, 2017(in Chinese with English abstract).
    [14] Wu ZQ, Li KL, Zheng H. Efficient and scalable architecture forsearchable symmetric encryption. Journal on Communications, 2017,38(8):79-93(in Chinese with English abstract).
    [15] Wang SP, Liu LJ, Zhang YL. Verifiable dictionary-based searchable encryption scheme. Ruan Jian Xue Bao/Journal of Software, 2016,27(05):1301-1308(in Chinese with English abstract). http://www.jos.org.cn/1000-9825/4912.htm[doi:10.13328/j.cnki.jos.004912]
    [16] Du MX, Wang Q, He MQ, et al. Privacy-Preserving indexing and query processing for secure dynamic cloud storage. IEEE Trans. on Information Forensics and Security, 2018,13(9):2320-2332.
    [17] Peng CG, Ding HF, Zhu YJ, Tian YL, Fu ZF. Information entropy models and privacy metrics methods for privacy protection. Ruan Jian Xue Bao/Journal of Software, 2016,27(8):1891-190(in Chinese with English abstract). http://www.jos.org.cn/1000-9825/5096.htm[doi:10.13328/j.cnki.jos.005096]
    [18] Dong XL, Zhou J, Cao ZF. Research advances on secure searchable encryption. Journal of Computer Research and Development, 2017,54(10):2107-2120(in Chinese with English abstract).
    附中文参考文献:
    [1] 李经纬,贾春福,刘哲理,李进,李敏.可搜索加密技术研究综述.软件学报,2015,26(1):109-128. http://www.jos.org.cn/1000-9825/4700.htm[doi:10.13328/j.cnki.jos.004700]
    [13] 邱硕.面向隐私保护的密文数据检索与集合操作的关键技术研究[博士学位论文].北京:北京交通大学,2017.
    [14] 吴志强,李肯立,郑蕙.高效可扩展的对称密文检索架构.通信学报,2017,38(8):79-93.
    [15] 王尚平,刘利军,张亚玲.可验证的基于词典的可搜索加密方案.软件学报,2016,27(5):1301-1308. http://www.jos.org.cn/1000-9825/4912.htm[doi:10.13328/j.cnki.jos.004912]
    [17] 彭长根,丁红发,朱义杰,田有亮,符祖峰.隐私保护的信息熵模型及其度量方法.软件学报,2016,27(8):1891-1903. http://www.jos.org.cn/1000-9825/5096.htm[doi:10.13328/j.cnki.jos.005096]
    [18] 董晓蕾,周俊,曹珍富.可搜索加密研究进展.计算机研究与发展,2017,54(10):2107-2120.
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

杜瑞忠,李明月,田俊峰,吴万青.基于倒排索引的可验证混淆关键字密文检索方案.软件学报,2019,30(8):2362-2374

复制
分享
文章指标
  • 点击次数:3545
  • 下载次数: 6770
  • HTML阅读次数: 3541
  • 引用次数: 0
历史
  • 收稿日期:2018-05-27
  • 最后修改日期:2018-09-21
  • 在线发布日期: 2019-04-03
文章二维码
您是第19754460位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号