喵ID:wu7SBh免责声明

A Secure Verification Item Requesting Technique by way of Adopting Paillier Encryption Algorithm

一种采用Paillier加密算法的安全验证项请求技术

基本信息

DOI:
10.1109/icese46178.2019.9194691
发表时间:
2019
期刊:
2019 International Conference on Emerging Trends in Science and Engineering (ICESE)
影响因子:
--
通讯作者:
K. Jyothsna Reddy
中科院分区:
文献类型:
--
作者: L. Priyanka;P. Vijay Kumar;K. Jyothsna Reddy研究方向: -- MeSH主题词: --
关键词: --
来源链接:pubmed详情页地址

文献摘要

A defended exploration strategies over encrypted cloud statistics permit an authorized consumer to query records files of interest with the aid of using filing encrypted query key phrases to the cloud server in a privateness-retaining manner. However, in exercise, the lower again query effects can also moreover furthermore be incorrect or incomplete inside the dishonest cloud environment. For instance, the cloud server also can intentionally miss a few certified consequences to computing sources and conversation overhead. Thus, a first-class-functional defended query framework want to provide a question results verification mechanism that lets in the statistics user to confirm consequences. On this paper, we construct a included, successfully unified, and notable-grained query effects authentication framework, by means of which, given an encrypted query outcomes set, the query character not most effective can affirm the correctness of every information document inside the set however can also similarly take a look at how many or which certified records documents aren't rebound if the set is incomplete earlier than decryption. The verification scheme is unfastened-coupling to concrete at ease are attempting to find techniques and may be very consequences easily included into any relaxed query scheme. We obtain the intention thru building defended verification item for encrypted cloud facts. Furthermore, a quick signature technique with extensively small garage charge is planned to guarantee the authenticity of verification object and a verification item request technique is offered to allow the question consumer to securely achive the favored verification item performance evaluation shows that the planned schemes are feasible and adequate.
针对加密云数据的受保护的查询策略允许授权用户以隐私保护的方式向云服务器提交加密查询关键词来查询感兴趣的记录文件。然而,在实际应用中,在不诚实的云环境中,返回的查询结果可能不正确或不完整。例如,云服务器可能会为了节省计算资源和通信开销而故意遗漏一些符合条件的结果。因此,一个功能良好的受保护查询框架需要提供一种查询结果验证机制,使数据用户能够验证结果。在本文中,我们构建了一个安全、高效统一且细粒度的查询结果认证框架,通过该框架,给定一个加密查询结果集,查询者不仅可以验证集中每个数据文件的正确性,还可以在解密前如果集合不完整的情况下检查有多少或哪些符合条件的数据文件未返回。该验证方案与具体的安全查询方法是松耦合的,可以很容易地集成到任何安全查询方案中。我们通过为加密云数据构建受保护的验证对象来实现这一目标。此外,还设计了一种存储开销极小的快速签名方法来保证验证对象的真实性,并提供了一种验证对象请求方法,使查询用户能够安全地获取所需的验证对象。性能评估表明,所设计的方案是可行且有效的。
参考文献(1)
被引文献(0)

数据更新时间:{{ references.updateTime }}

K. Jyothsna Reddy
通讯地址:
--
所属机构:
--
电子邮件地址:
--
免责声明免责声明
1、猫眼课题宝专注于为科研工作者提供省时、高效的文献资源检索和预览服务;
2、网站中的文献信息均来自公开、合规、透明的互联网文献查询网站,可以通过页面中的“来源链接”跳转数据网站。
3、在猫眼课题宝点击“求助全文”按钮,发布文献应助需求时求助者需要支付50喵币作为应助成功后的答谢给应助者,发送到用助者账户中。若文献求助失败支付的50喵币将退还至求助者账户中。所支付的喵币仅作为答谢,而不是作为文献的“购买”费用,平台也不从中收取任何费用,
4、特别提醒用户通过求助获得的文献原文仅用户个人学习使用,不得用于商业用途,否则一切风险由用户本人承担;
5、本平台尊重知识产权,如果权利所有者认为平台内容侵犯了其合法权益,可以通过本平台提供的版权投诉渠道提出投诉。一经核实,我们将立即采取措施删除/下架/断链等措施。
我已知晓