Research on ciphertext search and sharing technology in edge computing mode

被引:0
|
作者
Wang J. [1 ,2 ]
Wang G. [3 ]
机构
[1] School of Management, Xi'an Jiaotong University, Xi'an
[2] State Grid Huitong Jincai (Beijing) Information Technology Co., Ltd., Beijing
[3] LongShine Technology Group Co., Ltd., Wuxi
来源
Tongxin Xuebao/Journal on Communications | 2022年 / 43卷 / 04期
关键词
Ciphertext search; Edge computing; Privacy protection; Secure sharing;
D O I
10.11959/j.issn.1000-436x.2022039
中图分类号
学科分类号
摘要
Aiming at the problem of edge computing data security, a ciphertext search and sharing solution was proposed, where the above-mentioned edge computing advantages were used to achieve user privacy data protection, edge nodes were used to construct encrypted inverted indexes, indexes and keys between edge nodes and cloud computing platforms were securely shared, and ciphertext search, secure data sharing, and dynamic index update were realized without changing the edge computing architecture and cloud computing architecture. Finally, compared to existing schemes, performance and security were analyzed and discussed, which proves that the proposed scheme has high security strength under ciphertext search attack model, and the ciphertext search efficiency and document dynamic update function are taken into account based on encrypted inverted index. © 2022, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:227 / 238
页数:11
相关论文
共 47 条
  • [1] RGHIOUI A., Internet of things: visions, technologies, and areas of application, Automation, Control and Intelligent Systems, 5, 6, (2017)
  • [2] 2020 global and Chinese Internet of things industry development status and future development trend analysis
  • [3] 2021 review on the IoT industry chain, (2021)
  • [4] 2021 China Internet of things index series report 1: overview of the Internet of things-where is the Internet of everything road
  • [5] Report on 2021 China mobile economic development, (2021)
  • [6] GRAY J., Distributed computing economics, Queue, 6, 3, pp. 63-68, (2008)
  • [7] ZHAO Z M, LIU F, CAI Z P, Et al., Edge computing: platforms, applications and challenges, Journal of Computer Research and Development, 55, 2, pp. 327-337, (2018)
  • [8] LI L Z, ZHOU P L, CHENG P, Et al., Architecture, challenges and applications of edge computing, Big Data Research, 5, 2, pp. 3-16, (2019)
  • [9] SHI W S, SUN H, CAO J, Et al., Edge computing: an emerging computing model for the Internet of everything era, Journal of Computer Research and Development, 54, 5, pp. 907-924, (2017)
  • [10] HE W, AKHAWE D, JAIN S, Et al., ShadowCrypt: encrypted web applications for everyone, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1028-1039, (2014)