通信学报 ›› 2022, Vol. 43 ›› Issue (4): 227-238.doi: 10.11959/j.issn.1000-436x.2022039

所属专题: 边缘计算

• 学术通信 • 上一篇    

边缘计算模式下密文搜索与共享技术研究

王继锋1,2, 王国峰3   

  1. 1 西安交通大学管理学院,陕西 西安 710049
    2 国网汇通金财(北京)信息科技有限公司,北京 100053
    3 朗新科技集团股份有限公司,江苏 无锡 214135
  • 修回日期:2022-01-29 出版日期:2022-04-25 发布日期:2022-04-01
  • 作者简介:王继锋(1969- ),男,陕西咸阳人,国网汇通金财(北京)信息科技有限公司高级工程师,主要研究方向为电子商务、信息安全
    王国峰(1988- ),男,山东济宁人,博士,朗新科技集团股份有限公司高级工程师,主要研究方向为网络安全
  • 基金资助:
    国网电商公司(国网雄安金融科技集团)科技基金资助项目(19-JS-214)

Research on ciphertext search and sharing technology in edge computing mode

Jifeng WANG1,2, Guofeng WANG3   

  1. 1 School of Management, Xi’an Jiaotong University, Xi’an 710049, China
    2 State Grid Huitong Jincai (Beijing) Information Technology Co., Ltd., Beijing 100053, China
    3 LongShine Technology Group Co., Ltd., Wuxi 214135, China
  • Revised:2022-01-29 Online:2022-04-25 Published:2022-04-01
  • Supported by:
    State Grid Electronic Commerce Co., Ltd.(State Grid Xiong’an Financial Technology Group Co., Ltd.) Foundation(19-JS-214)

摘要:

针对边缘计算数据安全问题,提出一种密文搜索与共享方案,在不改变边缘计算架构的和云计算架构的情况下,借助上述边缘计算诸多优势实现用户隐私数据保护,利用边缘节点构建加密倒排索引,在边缘节点和云计算平台之间安全地分享索引和密钥,实现密文搜索、数据安全共享及索引动态更新等功能。最后,与现有方案相比,对性能和安全性进行分析讨论,表明所提方案在密文搜索攻击模型下具有可证明的高安全强度,基于加密倒排索引兼顾了密文搜索效率和文档动态更新功能。

关键词: 边缘计算, 隐私保护, 密文搜索, 安全共享

Abstract:

Aiming at the problem of edge computing data security, a ciphertext search and sharing solution was proposed, where the above-mentioned edge computing advantages were used to achieve user privacy data protection, edge nodes were used to construct encrypted inverted indexes, indexes and keys between edge nodes and cloud computing platforms were securely shared, and ciphertext search, secure data sharing, and dynamic index update were realized without changing the edge computing architecture and cloud computing architecture.Finally, compared to existing schemes, performance and security were analyzed and discussed, which proves that the proposed scheme has high security strength under ciphertext search attack model, and the ciphertext search efficiency and document dynamic update function are taken into account based on encrypted inverted index.

Key words: edge computing, privacy protection, ciphertext search, secure sharing

中图分类号: 

No Suggested Reading articles found!