Design and Implementation of Searchable Encryption Scheme Prototype System Based on BSSEVD

被引:0
作者
Li P. [1 ,2 ]
Zhou F.-C. [1 ]
Zhang S. [1 ]
机构
[1] School of Software, Northeastern University, Shenyang
[2] School of Information Engineering, Eastern Liaoning University, Dandong
来源
Zhou, Fu-Cai (fczhou@mail.neu.edu.cn) | 1600年 / Northeast University卷 / 41期
关键词
Boolean search; Cloud storage; Inverted index; Large data sets; Searchable encryption;
D O I
10.12068/j.issn.1005-3026.2020.09.005
中图分类号
学科分类号
摘要
In order to solve the problem of high time-complexity and low efficiency of keyword search of searchable encryption scheme caused by large security index file in large data set, a scheme of Boolean symmetric searchable encryption in very-large databases (BSSEVD) was proposed. The storage structure of security index was optimized by using three-layer indirect addressing block storage, and the leakage problem caused by multi keyword Boolean search was solved by adding keyword intersection security indexes. Based on this scheme, a prototype system of searchable encryption scheme is designed and implemented, which mainly includes three modules: file preprocessing module, initialization module and keyword search module. The performance of the system was analyzed by experiments, and the experimental result showed that calculation efficiency of the scheme is significantly improved. © 2020, Editorial Department of Journal of Northeastern University. All right reserved.
引用
收藏
页码:1244 / 1250
页数:6
相关论文
共 14 条
  • [1] Wang Q, He M, Du M, Et al., Searchable encryption over feature-rich data, IEEE Transactions on Dependable & Secure Computing, 12, 3, pp. 496-510, (2018)
  • [2] Yu Y, Au M H A, Ateniese G, Et al., Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage, IEEE Transactions on Information Forensics & Security, 12, 4, pp. 767-778, (2017)
  • [3] Song D X, Wagner D, Perrig A., Practical techniques for searches on encrypted data, IEEE Symposium on Security & Privacy, pp. 44-55, (2000)
  • [4] Goh E J., Secure indexes
  • [5] Chang Y C, Mitzenmacher M., Privacy preserving keyword searches on remote encrypted data, Applied Cryptography and Network Security, pp. 442-455, (2005)
  • [6] Stefanov E, Papamanthou C, Shi E., Practical dynamic searchable encryption with small leakage, Network and Distributed System Security Symposium, pp. 1-15, (2014)
  • [7] Kamara S, Moataz T., Boolean searchable symmetric encryption with worst-case sub-linear complexity [C], Advances in Cryptology-EUROCRYPT 2017, pp. 99-124, (2017)
  • [8] Boneh D, Crescenzo G D, Ostrovsky R, Et al., Public key encryption with keyword search, Lecture Notes in Computer Science, 49, 16, pp. 506-522, (2003)
  • [9] Bellare M, Boldyreva A, O'Neill A., Deterministic and efficiently searchable encryption, Advances in Cryptology-CRYPTO 2007, pp. 535-552, (2007)
  • [10] Lin X, Lu R, Foxton K, Et al., An efficient searchable encryption scheme and its application in network forensics, Forensics in Telecommunications, Information and Multimedia, pp. 66-78, (2011)