首页> 外文会议>IEEE International Conference on Cyber Security and Cloud Computing >Privacy-Preserving and Unforgeable Searchable Encrypted Audit Logs for Cloud Storage
【24h】

Privacy-Preserving and Unforgeable Searchable Encrypted Audit Logs for Cloud Storage

机译:云存储的隐私保留和可难以理解的可搜索加密日志

获取原文

摘要

Audit logs are widely used in information systems nowadays. In cloud computing and cloud storage environment, audit logs are required to be encrypted and outsourced on remote servers to protect the confidentiality of data and the privacy of users. The searchable encrypted audit logs support a search on the encrypted audit logs. In this paper, we propose a privacy-preserving and unforgeable searchable encrypted audit log scheme based on PEKS. Only the trusted data owner can generate encrypted audit logs containing access permissions for users. The semi-honest server verifies the audit logs in a searchable encryption way before granting the operation rights to users and storing the audit logs. The data owner can perform a fine-grained conjunctive query on the stored audit logs, and accept only the valid audit logs. The scheme is immune to the collusion tamper or fabrication conducted by server and user. Concrete implementations of the scheme is put forward in detail. The correct of the scheme is proved, and the security properties, such as privacy-preserving, searchability, verifiability and unforgeability are analyzed. Further evaluation of computation load shows that the design is of considerable efficiency.
机译:审计日志现在广泛用于信息系统。在云计算和云存储环境中,需要在远程服务器上加密和外包日志,以保护数据的机密性和用户的隐私。可搜索的加密审核日志支持在加密的审核日志上搜索。在本文中,我们提出了一种基于PEKS的隐私保留和可难以理解的可搜索的加密日志方案。只有受信任的数据所有者只能生成包含用户访问权限的加密审核日志。半验证服务器在可搜索的加密方式中验证审计日志,然后授予用户的操作权限并存储审核日志。数据所有者可以在存储的审核日志上执行细粒度的联合查询,并仅接受有效的审核日志。该方案对服务器和用户进行的串行篡改或制造进行免疫。该计划的具体实施方式详细提出。证明了该方案的正确性,并分析了安全性质,例如隐私保留,可搜索,验证和不可识别性。进一步评估计算负荷表明,该设计具有相当大的效率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号