{"title":"可搜索加密算法和区块链技术下的密文数据库审计技术","authors":"J. Qiu","doi":"10.4018/jgim.315014","DOIUrl":null,"url":null,"abstract":"The study aims to solve the problems in auditing ciphertext data, improve audit efficiency, and increase the security of audit data in the audit server. First, the existing encryption algorithms are analyzed. Second, the searchable encryption algorithm is proposed to audit the ciphertext data, and an audit server scheme is made based on blockchain technology (BT). Finally, the two schemes are compared with the traditional audit technology. The results show that the server's inspection efficiency of the searchable encryption algorithm is higher.","PeriodicalId":46306,"journal":{"name":"Journal of Global Information Management","volume":null,"pages":null},"PeriodicalIF":4.5000,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Ciphertext Database Audit Technology Under Searchable Encryption Algorithm and Blockchain Technology\",\"authors\":\"J. Qiu\",\"doi\":\"10.4018/jgim.315014\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The study aims to solve the problems in auditing ciphertext data, improve audit efficiency, and increase the security of audit data in the audit server. First, the existing encryption algorithms are analyzed. Second, the searchable encryption algorithm is proposed to audit the ciphertext data, and an audit server scheme is made based on blockchain technology (BT). Finally, the two schemes are compared with the traditional audit technology. The results show that the server's inspection efficiency of the searchable encryption algorithm is higher.\",\"PeriodicalId\":46306,\"journal\":{\"name\":\"Journal of Global Information Management\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":4.5000,\"publicationDate\":\"2022-04-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Global Information Management\",\"FirstCategoryId\":\"91\",\"ListUrlMain\":\"https://doi.org/10.4018/jgim.315014\",\"RegionNum\":3,\"RegionCategory\":\"管理学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"INFORMATION SCIENCE & LIBRARY SCIENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Global Information Management","FirstCategoryId":"91","ListUrlMain":"https://doi.org/10.4018/jgim.315014","RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"INFORMATION SCIENCE & LIBRARY SCIENCE","Score":null,"Total":0}
Ciphertext Database Audit Technology Under Searchable Encryption Algorithm and Blockchain Technology
The study aims to solve the problems in auditing ciphertext data, improve audit efficiency, and increase the security of audit data in the audit server. First, the existing encryption algorithms are analyzed. Second, the searchable encryption algorithm is proposed to audit the ciphertext data, and an audit server scheme is made based on blockchain technology (BT). Finally, the two schemes are compared with the traditional audit technology. The results show that the server's inspection efficiency of the searchable encryption algorithm is higher.
期刊介绍:
Authors are encouraged to submit manuscripts that are consistent to the following submission themes: (a) Cross-National Studies. These need not be cross-culture per se. These studies lead to understanding of IT as it leaves one nation and is built/bought/used in another. Generally, these studies bring to light transferability issues and they challenge if practices in one nation transfer. (b) Cross-Cultural Studies. These need not be cross-nation. Cultures could be across regions that share a similar culture. They can also be within nations. These studies lead to understanding of IT as it leaves one culture and is built/bought/used in another. Generally, these studies bring to light transferability issues and they challenge if practices in one culture transfer.