Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Verifiable searchable encryption scheme of fine-grained result by designated tester in cloud
Runyu YAN, Rui GUO, Yongbo YAN, Guangjun LIU
Journal of Computer Applications    2025, 45 (9): 2882-2892.   DOI: 10.11772/j.issn.1001-9081.2024081223
Abstract63)   HTML0)    PDF (3867KB)(91)       Save

In response to the issue that semi-trusted nature of cloud servers in searchable encryption may result in incorrect or incomplete search results, a verifiable searchable encryption scheme of fine-grained result by designated tester in cloud was proposed. In this scheme, data users were allowed to query keywords on encrypted datasets to retrieve files, and verification mechanism was combined to ensure data privacy protection and reliability of search results in cloud; by introducing Merkle Hash Tree (MHT) with Rank value and Counting Bloom Filter (CBF), correctness of dataset was verified, and accurate results were filtered out in a fine-grained way and the number of qualified files not returned was given, integrity of the dataset was ensured, dynamic updating of the dataset was implemented, and semantic security of selected keywords was proved under random oracle model. Simulation results demonstrate that compared to traditional certificateless verifiable search encryption schemes, the proposed scheme has lower computational overhead and higher execution efficiency in practical applications.

Table and Figures | Reference | Related Articles | Metrics
Role and rule-based access contro
RUI Guo-rong,XING Gui-fen
Journal of Computer Applications    2005, 25 (04): 864-866.   DOI: 10.3724/SP.J.1087.2005.0864
Abstract1299)      PDF (207KB)(1308)       Save

Based on the analysis concerning the drawbacks of applying RBAC, the concepts of context and rule were introduced, and the permissions were divided into enabled ones, active ones and limited ones, then a new access control model, the role and rule-based access control(RRBAC) model, was proposed. Through defining the security policy in design and capturing the corresponding contextual information in running, this model can provide finer access control, and reduce the workload of PA in the model of RBAC significantly.

Related Articles | Metrics