透過您的圖書館登入
IP:18.189.2.122
  • 學位論文

具常數長度鑰匙的多用戶加密搜尋機制

Multi-User Searchable Encryption Scheme With Constant-Size Keys

指導教授 : 吳家麟
共同指導教授 : 陳文進(Wen-Chin Chen)

摘要


在雲端儲存系統蓬勃發展的同時,資料洩漏等安全性方面的漏洞已經成為了嚴重的資訊安全問題。為了保護一些比較私人或機密的資料,使用者可以在上傳 資料之前將所有檔案加密。如此一來即使資料因為攻擊者惡意竊取或者是雲端服務的提供方無意的洩漏,被洩漏的資料內容也不會被竊取者知曉。然而經過加密的文件會喪失其原有的一切特性,這使得直接搜尋加密後的資料變成了一件困難的事。於是有人提出了「加密搜尋」這個機制來解決這個問題,「加密搜尋」讓使用者可以在加密的狀態下搜尋存在雲端系統的資料。在這篇論文中,我們提出了一個鑰匙為常數長度的加密搜尋機制。這個機制可以降低加密搜尋對於儲存空間的需求進而提高加密搜尋的實用性。因為我們的方法提供了有效率的加入成員及撤銷成員的機制,所以我們的方法是可以應用在學校或者企業的儲存系統的。最後,我們利用我們在論文中提出的方法實作出一個簡單的系統來證明我們的方法是可行的。

並列摘要


Cloud storage is widely adopted nowadays. Considering about the data leakage issue, people encrypted the data before uploading them to cloud server. However, due to the loss of data’s original properties, it is hard to search the encrypted data directly. To solve this problem, searchable encryption scheme was proposed to search the data stored on the cloud server in ciphertext domain. To enhance the searchable encryption scheme’s practicability, we propose the scheme, which has constant-size keys, to decrease the requirement of the storage in the searchable encryption scheme. In our work, we also provide efficient mechanisms for participation and the revocation of a user. Therefore, it can be easily applied to storage systems of a school or a company. Moreover, a prototype based on the proposed scheme has been built to verify the feasibility of our work.

參考文獻


[8] V. Goyal, O. Pandey, A. Sahai, B. Waters, “Attribute-based encryption for finegrained access control of encrypted data,” in Proc. of CCS’06, 2006.
[1] D. X.Song, D. Wagner, A. Perrig, “A Practical techniques for searches on encrypted data,” in Proc. of S&P’00, 2000.
[2] D. Boneh, C. G. Di, R. Ostrovsky, G. Persiano, “Public key encryption with keyword search,” in Proc. of EUROCRYPT’04, 2004.
[3] Curtmola R, Garay J, Kamara S, Ostrovsky R. Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on Computer and Communications Security, ACM Press, 2006:79-88.
[4] F. Bao, R. H. Deng, X. Ding, Y. Yang, “Private query on encrypted data in multi-user settings,” in Proc. of ISPEC’08, 2008.

延伸閱讀