{"title":"基于云的安全检索方案设计","authors":"Wei Dong, Haibo Luo, Jilong Liang, Leyi Feng","doi":"10.1109/ICMSSE53595.2021.00072","DOIUrl":null,"url":null,"abstract":"The separation of permissions between file owners and file managers is one of the important issues in cloud computing. The paper first introduces the related concepts of cloud computing, from confidentiality, integrity and availability, and emphasizes the threat of cloud storage in secure retrieval. Then it introduces the current research status and development trend of solving this threat at home and abroad. At the same time, an inverted index scheme based on SM2 is proposed. The project is conceived and designed in terms of keyword encryption technology, indexing, trapdoors, and user inquiries. Finally, the program verification analysis is given. This basically solves the problems related to cloud storage security retrieval.","PeriodicalId":331570,"journal":{"name":"2021 International Conference on Management Science and Software Engineering (ICMSSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Design of Cloud-based Security Retrieval Scheme\",\"authors\":\"Wei Dong, Haibo Luo, Jilong Liang, Leyi Feng\",\"doi\":\"10.1109/ICMSSE53595.2021.00072\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The separation of permissions between file owners and file managers is one of the important issues in cloud computing. The paper first introduces the related concepts of cloud computing, from confidentiality, integrity and availability, and emphasizes the threat of cloud storage in secure retrieval. Then it introduces the current research status and development trend of solving this threat at home and abroad. At the same time, an inverted index scheme based on SM2 is proposed. The project is conceived and designed in terms of keyword encryption technology, indexing, trapdoors, and user inquiries. Finally, the program verification analysis is given. This basically solves the problems related to cloud storage security retrieval.\",\"PeriodicalId\":331570,\"journal\":{\"name\":\"2021 International Conference on Management Science and Software Engineering (ICMSSE)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Management Science and Software Engineering (ICMSSE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICMSSE53595.2021.00072\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Management Science and Software Engineering (ICMSSE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMSSE53595.2021.00072","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The separation of permissions between file owners and file managers is one of the important issues in cloud computing. The paper first introduces the related concepts of cloud computing, from confidentiality, integrity and availability, and emphasizes the threat of cloud storage in secure retrieval. Then it introduces the current research status and development trend of solving this threat at home and abroad. At the same time, an inverted index scheme based on SM2 is proposed. The project is conceived and designed in terms of keyword encryption technology, indexing, trapdoors, and user inquiries. Finally, the program verification analysis is given. This basically solves the problems related to cloud storage security retrieval.