吉林大学学报(信息科学版) ›› 2024, Vol. 42 ›› Issue (3): 531-536.

• • 上一篇    下一篇

基于可搜索加密技术的分布式数据库 安全访问多级控制算法

郎加云, 丁晓梅    

  1. 安徽文达信息工程学院 计算机工程学院, 合肥 231201
  • 收稿日期:2023-03-09 出版日期:2024-06-18 发布日期:2024-06-17
  • 作者简介:郎加云(1986— ), 女, 安徽含山人, 安徽文达信息工程学院讲师, 主要从事计算机科学与技术、 物联网技术研究, (Tel) 86-19956519660(E-mail)249870205@ qq. com; 丁晓梅(1984— ), 女, 安徽阜阳人, 安徽文达信息工程学院副教授, 主要 从事计算机科学、 数据分析研究, (Tel)86-19956519660(E-mail)65675214@ qq. com。
  • 基金资助:
    安徽文达信息工程学院科研基金资助项目(XZR2018A14) ; 安徽省高校优秀拔尖人才培育基金资助项目( gxyq2021239); 安徽省省级质量工程基金资助项目(2022zygzts046)

 Multilevel Control Algorithm for Secure Access to Distributed Database Based on Searchable Encryption Technology

LANG Jiayun, DING Xiaomei   

  • Received:2023-03-09 Online:2024-06-18 Published:2024-06-17

摘要: 为解决分布式数据库中明文传输容易被篡改的安全隐患, 提出了一种基于可搜索加密技术的分布式数据库安全访问多级控制算法。 该算法将授权用户按照安全级别分组, 并采用 TF-IDF( Tem Frequency-Inverse Document Frequency)算法计算明文关键词的权重, 然后利用 AES(Advanced Encryption Standard)算法和轮函数生成密文的密钥, 使用矩阵函数和逆矩阵函数对明文进行加密, 并将加密结果上传至主服务器。 同时, 采用 Build Index 算法生成密文的索引, 根据用户安全级别相关属性信息审查用户是否具有访问密文的权限, 审查通过后用户即可发出密文数量与关键词搜索请求, 服务器将密文送回用户端并使用对称密钥方式解密, 实现访问多级控制。 实验结果表明, 该方法在加密、 解密过程中用时较短, 且安全访问控制性能良好。

关键词: 可搜索加密技术, 分布式数据库, 安全访问控制, 明文加密 

Abstract: Plaintext transmission is easily tampered with in distributed databases. To address the security risk, a multi-level control algorithm for secure access is proposed to distributed databases based on searchable encryption technology. The algorithm groups the authorized users according to the security level, and uses TF-IDF( Tem Frequency-Inverse Document Frequency) algorithm to calculate the weight of plaintext keywords, then uses AES (Advanced Encryption Standard) algorithm and round function to generate the key of the ciphertext, uses matrix function and inverse matrix function to encrypt the plaintext, and uploads the encryption results to the main server. And the Build Index algorithm is used to generate an index of ciphertext, and whether the user has access to ciphertext is reviewed based on the relevant attribute information of the user’s security level. After the review is passed, the user can issue a request for the number of ciphertext and keyword search. The server sends the ciphertext back to the user and decrypts it using a symmetric key method, achieving multi-level access control. The experimental results show that this method takes a short time in the encryption and decryption processes, and has good security access control performance.

Key words: searchable encryption technology, distributed database, security access control, clear text encryption

中图分类号: 

  • TP391