• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

云计算环境下利用可搜索加密算法的多传感器网络跟踪研究

Multi-sensor network tracking research utilizing searchable encryption algorithm in the cloud computing environment.

作者信息

Sun Xiaoling, Li Shanshan

机构信息

School of Information Engineering, Institute of Disaster Prevention, Langfang, Hebei, China.

出版信息

PeerJ Comput Sci. 2023 Jun 20;9:e1433. doi: 10.7717/peerj-cs.1433. eCollection 2023.

DOI:10.7717/peerj-cs.1433
PMID:37409083
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10319269/
Abstract

Presently, the focus of target detection is shifting towards the integration of information acquired from multiple sensors. When faced with a vast amount of data from various sensors, ensuring data security during transmission and storage in the cloud becomes a primary concern. Data files can be encrypted and stored in the cloud. When using data, the required data files can be returned through ciphertext retrieval, and then searchable encryption technology can be developed. However, the existing searchable encryption algorithms mainly ignore the data explosion problem in a cloud computing environment. The issue of authorised access under cloud computing has yet to be solved uniformly, resulting in a waste of computing power by data users when processing more and more data. Furthermore, to save computing resources, ECS (encrypted cloud storage) may only return a fragment of results in response to a search query, lacking a practical and universal verification mechanism. Therefore, this article proposes a lightweight, fine-grained searchable encryption scheme tailored to the cloud edge computing environment. We generate ciphertext and search trap gates for terminal devices based on bilinear pairs and introduce access policies to restrict ciphertext search permissions, which improves the efficiency of ciphertext generation and retrieval. This scheme allows for encryption and trapdoor calculation generation on auxiliary terminal devices, with complex calculations carried out on edge devices. The resulting method ensures secure data access, fast search in multi-sensor network tracking, and accelerates computing speed while maintaining data security. Ultimately, experimental comparisons and analyses demonstrate that the proposed method improves data retrieval efficiency by approximately 62%, reduces the storage overhead of the public key, ciphertext index, and verifiable searchable ciphertext by half, and effectively mitigates delays in data transmission and computation processes.

摘要

目前,目标检测的重点正转向整合从多个传感器获取的信息。面对来自各种传感器的海量数据,在云环境中传输和存储期间确保数据安全成为首要关注点。数据文件可以加密并存储在云中。在使用数据时,可以通过密文检索返回所需的数据文件,进而开发可搜索加密技术。然而,现有的可搜索加密算法主要忽略了云计算环境中的数据爆炸问题。云计算环境下的授权访问问题尚未得到统一解决,导致数据用户在处理越来越多的数据时浪费计算能力。此外,为了节省计算资源,加密云存储(ECS)可能仅返回搜索查询结果的一个片段,缺乏实用且通用的验证机制。因此,本文提出了一种针对云边缘计算环境量身定制的轻量级、细粒度可搜索加密方案。我们基于双线性对为终端设备生成密文和搜索陷门,并引入访问策略来限制密文搜索权限,这提高了密文生成和检索的效率。该方案允许在辅助终端设备上进行加密和陷门计算生成,而在边缘设备上进行复杂计算。所得到的方法确保了数据的安全访问、在多传感器网络跟踪中的快速搜索,并在保持数据安全的同时加快了计算速度。最终,实验比较和分析表明,所提出的方法将数据检索效率提高了约62%,将公钥、密文索引和可验证可搜索密文的存储开销减少了一半,并有效减轻了数据传输和计算过程中的延迟。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ed26/10319269/f84c75ce39b6/peerj-cs-09-1433-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ed26/10319269/fa7dd5159cd5/peerj-cs-09-1433-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ed26/10319269/27e16366dca1/peerj-cs-09-1433-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ed26/10319269/479da24af74a/peerj-cs-09-1433-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ed26/10319269/c0d202b13639/peerj-cs-09-1433-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ed26/10319269/f84c75ce39b6/peerj-cs-09-1433-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ed26/10319269/fa7dd5159cd5/peerj-cs-09-1433-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ed26/10319269/27e16366dca1/peerj-cs-09-1433-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ed26/10319269/479da24af74a/peerj-cs-09-1433-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ed26/10319269/c0d202b13639/peerj-cs-09-1433-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ed26/10319269/f84c75ce39b6/peerj-cs-09-1433-g005.jpg

相似文献

1
Multi-sensor network tracking research utilizing searchable encryption algorithm in the cloud computing environment.云计算环境下利用可搜索加密算法的多传感器网络跟踪研究
PeerJ Comput Sci. 2023 Jun 20;9:e1433. doi: 10.7717/peerj-cs.1433. eCollection 2023.
2
Secure medical information sharing in cloud computing.云计算中的安全医疗信息共享。
Technol Health Care. 2015;23 Suppl 1:S133-7. doi: 10.3233/thc-150945.
3
A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.一种用于雾计算环境中细粒度搜索和访问授权的混合方案。
Sensors (Basel). 2017 Jun 17;17(6):1423. doi: 10.3390/s17061423.
4
A searchable personal health records framework with fine-grained access control in cloud-fog computing.云雾计算中具有细粒度访问控制的可搜索个人健康记录框架。
PLoS One. 2018 Nov 29;13(11):e0207543. doi: 10.1371/journal.pone.0207543. eCollection 2018.
5
A keyword searchable attribute-based encryption scheme with attribute update for cloud storage.一种具有属性更新功能的基于关键字搜索的属性加密方案,用于云存储。
PLoS One. 2018 May 24;13(5):e0197318. doi: 10.1371/journal.pone.0197318. eCollection 2018.
6
A Ring Learning with Errors-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Secure Big Data Sharing in Cloud Environment.基于错误的环学习密文策略属性基代理重加密方案,用于云环境中的安全大数据共享。
Big Data. 2024 Oct;12(5):357-366. doi: 10.1089/big.2021.0301. Epub 2022 Apr 11.
7
Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.具有属性撤销和授予功能的高效多用户云存储可搜索加密方案
PLoS One. 2016 Nov 29;11(11):e0167157. doi: 10.1371/journal.pone.0167157. eCollection 2016.
8
Attribute-based multi-user collaborative searchable encryption in COVID-19.新冠肺炎中基于属性的多用户协作可搜索加密技术
Comput Commun. 2023 May 1;205:118-126. doi: 10.1016/j.comcom.2023.04.003. Epub 2023 Apr 13.
9
Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage.云存储中具有隐藏策略的可搜索和可撤销的多数据所有者基于属性的加密方案。
PLoS One. 2018 Nov 1;13(11):e0206126. doi: 10.1371/journal.pone.0206126. eCollection 2018.
10
Blockchain-Based Access Control Scheme for Secure Shared Personal Health Records over Decentralised Storage.基于区块链的去中心化存储中安全共享个人健康记录的访问控制方案。
Sensors (Basel). 2021 Apr 2;21(7):2462. doi: 10.3390/s21072462.