skip to main content
Primo Search
Search in: Busca Geral
Tipo de recurso Mostra resultados com: Mostra resultados com: Índice

Query Integrity Meets Blockchain: A Privacy-Preserving Verification Framework for Outsourced Encrypted Data

Jiang, Shunrong ; Liu, Jianqing ; Chen, Jingwei ; Liu, Yiliang ; Wang, Liangmin ; Zhou, Yong

IEEE transactions on services computing, 2023-05, Vol.16 (3), p.2100-2113 [Periódico revisado por pares]

IEEE

Texto completo disponível

Citações Citado por
  • Título:
    Query Integrity Meets Blockchain: A Privacy-Preserving Verification Framework for Outsourced Encrypted Data
  • Autor: Jiang, Shunrong ; Liu, Jianqing ; Chen, Jingwei ; Liu, Yiliang ; Wang, Liangmin ; Zhou, Yong
  • Assuntos: access authorization ; Authorization ; blockchain ; Blockchains ; Cloud computing ; Cryptography ; Indexes ; Outsourced encryption ; privacy protection ; query integrity ; Servers ; Smart contracts
  • É parte de: IEEE transactions on services computing, 2023-05, Vol.16 (3), p.2100-2113
  • Descrição: Cloud outsourcing provides flexible storage and computation services for data users in a low cost, but it brings many security threats as the cloud server may not be fully trusted. Previous secure outsourcing solutions mostly assume that the server is honest-but-curious while the adversary model of a malicious server that may return incorrect results is rarely explored. Moreover, with the increasing popularity of verifiable computations, existing verification schemes are yet not efficient and cannot cater to different scenarios in practice. In this paper, we propose a blockchain-based verifiable search framework for the adversarial cloud outsourcing context. When outsourcing the encrypted data to the cloud or Interplanetary File System (IPFS), we also store the encrypted data index in a decentralized blockchain (i.e., Ethereum in this paper) which is public and cannot be modified. Once a user is authorized, he/she can flexibly obtain the query results and efficiently check the query integrity via the pre-deployed smart contract, without the need of the data owner being online. Moreover, for user's privacy protection, we construct a stealth authorization scheme to deliver the access authorization without any identity disclosure. Finally, theoretical analysis and performance evaluation validate the security and efficiency of our proposed framework.
  • Editor: IEEE
  • Idioma: Inglês

Buscando em bases de dados remotas. Favor aguardar.