预览加载中,请您耐心等待几秒...
1/3
2/3
3/3

在线预览结束,喜欢就下载吧,查找使用更方便

如果您无法下载资料,请参考说明:

1、部分资料下载需要金币,请确保您的账户上有足够的金币

2、已购买过的文档,再次下载不重复扣费

3、资料包下载后请先用软件解压,在使用对应软件打开

MULKASE:一种针对多个所有者数据的新型密钥聚合可搜索加密方法(英文) Title:MULKASE:ANewKeyAggregationsearchableencryptionmethodforMulti-ownerData Abstract: Astherapidgrowthofdataiswitnessedinvariousfields,theneedforefficientandsecuredatasharingamongmultipleownershasbecomeincreasinglyimportant.However,ensuringdataprivacyandsearchabilityinamulti-ownersettingpresentssignificantchallenges.Inthispaper,weproposeanovelkeyaggregationsearchableencryptionmethodcalledMULKASEtoaddressthesechallenges.MULKASEallowsmultipleownerstosecurelystoreandsearchoverencrypteddata,whilemaintainingprivacyandsecurityagainstunauthorizedaccess. 1.Introduction Theproliferationofdatageneratedbynumeroususersandorganizationsrequireseffectivemethodsforsecuresharingandstorage.Multi-ownerdatascenariosarecommonincloudstorage,collaborativeenvironments,anddistributedsystems.However,traditionalencryptionmethodsfailtoprovideefficientsearchoperationsoverencrypteddata.Toaddressthisissue,weintroduceMULKASEasasolutionthatcombinesmultipleowners'encryptionkeystoenablesearchfunctionalitieswhilemaintainingdataprivacy. 2.Background Thissectionprovidesanoverviewofexistingsearchableencryptiontechniquesandhighlightstheirlimitationsinamulti-ownersetting.Variousapproaches,suchasPublicKeyEncryptionwithKeywordSearch(PEKS),Attribute-BasedEncryption(ABE),andHidden-QuerySearchableEncryption(HQSE),arediscussed. 3.SystemArchitecture WepresentthesystemarchitectureofMULKASE,whichincludesthedataowner,dataserver,anddatausers.Eachuserisassignedauniquekey,allowingthemtosecurelyaccessandsearchoverencrypteddata.Thearchitectureensuresdataprivacy,securekeyaggregation,andefficientsearchoperations. 4.KeyAggregationScheme MULKASEutilizesakeyaggregationschemethatenablesthegenerationofasharedkeytoperformsearchoperations,withoutrevealingsensitiveinformationtounauthorizedparties.Theschemeinvolvesadistributedkeygenerationphase,whereeachownercontributestothesharedkey'screation.Wedescribethekeygenerationprocess,keyencapsulationtechniques,andsecuritymechanismsemployed. 5.SecureD