首页> 外文会议>IEEE International Conference on Smart Cloud >An Extensive Review and Possible Attack on the Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
【24h】

An Extensive Review and Possible Attack on the Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

机译:在云计算中对多个数据所有者的隐私保护排序多关键字搜索进行广泛审查并可能遭受攻击

获取原文

摘要

Cloud computing is the universal area where the data owners will outsource their relevant data to the untrusted public cloud, which allows the data users to retrieve the data with full integrity. To provide data privacy and integrity, most of the research works were focused under single data owner for secure searching of encrypted data over the cloud. Provided, various cloud service providers in day today life do not provide service to single data owner. Instead, the cloud service provider support multiple data owners to share the various benefits provided by the cloud computing. Data users are initially authenticated to establish a secure search over the encrypted cloud data. The data users can have a secure search without having knowledge regarding the real data and the secret keys of the data owners. Wei et al [9] proposed a privacy preserving ranked multi-keyword search. In this approach, ranking based multi-keyword searching mechanism was developed. The main advantage of this work is data privacy. So the authors claim that the proposed protocol provides data privacy by preventing the hackers from eavesdropping the secret keys and impersonating like a legitimate data user while submitting the search request to the cloud. Initially, after extensive analysis performed in this research work, we have identified several issues in the protocol proposed by Wei et al scheme. First the proposed protocol is vulnerable to impersonation attack. Therefore, when the attacker submits a request, the cloud server cannot find the difference between the request submitted by the legitimate user and the attacker. We have provided a detailed analysis of this attack in this paper and a formal proof of this attack is also given to prove that this scheme is a vulnerable one. Therefore, it is essential to develop a new efficient secure ranking based multi-keyword searching mechanism which enables the data users to perform a secure data access from the untrusted pubic cloud.
机译:云计算是数据所有者将其相关数据将其相关数据外包给不受信任的公共云的通用区域,这允许数据用户以完整的完整性检索数据。为了提供数据隐私和完整性,大多数研究工作都集中在单个数据所有者下,以确保在云上搜索加密数据。提供的各种云服务提供商在今天的生命中不提供单个数据所有者的服务。相反,云服务提供商支持多个数据所有者来共享云计算提供的各种优点。最初认证数据用户以建立通过加密云数据的安全搜索。数据用户可以在不具有关于数据所有者的真实数据和密钥的知识的情况下具有安全搜索。 Wei等[9]提出了一种隐私保留排名的多关键字搜索。在这种方法中,开发了基于排名的多关键字搜索机制。这项工作的主要优点是数据隐私。因此,作者声称,所提出的协议通过防止黑客窃听秘密密钥并使像合法数据用户提交到云的搜索请求时冒充数据,提供数据隐私。最初,在本研究工作中进行了广泛的分析后,我们已经确定了Wei等人计划提出的协议中的几个问题。首先,拟议的议定书很容易受到模拟攻击的影响。因此,当攻击者提交请求时,云服务器无法在合法用户和攻击者提交的请求之间找不到差异。我们在本文中提供了对该攻击的详细分析,还提供了这种攻击的正式证明,也可以证明该计划是一个脆弱的攻击。因此,必须开发一种基于新的高效的安全排名的多关键字搜索机制,其使得数据用户能够从不受信任的封云执行安全的数据访问。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号