期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Verifiable Auditing Protocol with Proxy Re-Encryption for Outsourced Databases in Cloud
1
作者 GAO Ziyuan WANG Baocang +2 位作者 LIU Hequn LU Ke ZHAN Yu 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2018年第2期120-128,共9页
As a new computing paradigm, outsourcing computing provides inexpensive, on-demand, convenient storage and computing services for cloud clients. For the security of outsourcing databases to the cloud, it is important ... As a new computing paradigm, outsourcing computing provides inexpensive, on-demand, convenient storage and computing services for cloud clients. For the security of outsourcing databases to the cloud, it is important to allow the user to verify the query results returned by the cloud server. So far, tremendous efforts have been carried out to study secure outsourcing computing. The existing scheme supports that the user can detect the correctness and completeness of the query results even if the cloud server returns an empty set. However, since the data owner performs the database encryption operations and uploads the encrypted database to the cloud server, they require the user to request the data owner to decrypt the query results. In this paper, we propose a new scheme, which can accurately verify the search results. Meanwhile, the users can decrypt the query results independently. Furthermore, the proposed scheme supports a large number of data owners to upload their encrypted database to the cloud server, and it can efficiently verify the query results. Besides, we can prove that our proposed solution can achieve the desired security properties. 展开更多
关键词 outsourcing computing verifiable auditing proxyre-encryption bilinear aggregate signature
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部