Journal on Communications ›› 2022, Vol. 43 ›› Issue (4): 227-238.doi: 10.11959/j.issn.1000-436x.2022039

Special Issue: 边缘计算

• Correspondences • Previous Articles    

Research on ciphertext search and sharing technology in edge computing mode

Jifeng WANG1,2, Guofeng WANG3   

  1. 1 School of Management, Xi’an Jiaotong University, Xi’an 710049, China
    2 State Grid Huitong Jincai (Beijing) Information Technology Co., Ltd., Beijing 100053, China
    3 LongShine Technology Group Co., Ltd., Wuxi 214135, China
  • Revised:2022-01-29 Online:2022-04-25 Published:2022-04-01
  • Supported by:
    State Grid Electronic Commerce Co., Ltd.(State Grid Xiong’an Financial Technology Group Co., Ltd.) Foundation(19-JS-214)

Abstract:

Aiming at the problem of edge computing data security, a ciphertext search and sharing solution was proposed, where the above-mentioned edge computing advantages were used to achieve user privacy data protection, edge nodes were used to construct encrypted inverted indexes, indexes and keys between edge nodes and cloud computing platforms were securely shared, and ciphertext search, secure data sharing, and dynamic index update were realized without changing the edge computing architecture and cloud computing architecture.Finally, compared to existing schemes, performance and security were analyzed and discussed, which proves that the proposed scheme has high security strength under ciphertext search attack model, and the ciphertext search efficiency and document dynamic update function are taken into account based on encrypted inverted index.

Key words: edge computing, privacy protection, ciphertext search, secure sharing

CLC Number: 

No Suggested Reading articles found!