计算机工程与应用 ›› 2025, Vol. 61 ›› Issue (23): 274-285.DOI: 10.3778/j.issn.1002-8331.2409-0356

• 网络、通信与安全 • 上一篇    下一篇

雾计算中可追踪的多权威动态可搜索加密方案

刘雪艳,李文静,贾博龙,徐文豪   

  1. 西北师范大学 计算机科学与工程学院,兰州 730070
  • 出版日期:2025-12-01 发布日期:2025-12-01

Traceable Multi-Authority Dynamic Searchable Encryption Scheme in Fog Computing

LIU Xueyan, LI Wenjing, JIA Bolong, XU Wenhao   

  1. College of Computer Science & Engineering, Northwest Normal University, Lanzhou 730070, China
  • Online:2025-12-01 Published:2025-12-01

摘要: 针对传统基于属性的关键字搜索方案中搜索算法的局限性、单点性能瓶颈以及恶意用户非法泄露密钥等问题,提出一种雾计算环境下支持动态关键字搜索和用户追踪的多权威加密方案。通过引入动态搜索机制,当两个关键字集中任一个关键字匹配时就停止搜索,从而提高方案的灵活性和可用性。通过引入多个属性权威管理互不相交的属性集,避免单点性能瓶颈问题,显著提升方案的扩展性和稳定性。为了防止恶意用户泄露密钥,在密钥中嵌入用户的身份信息,实现对恶意用户的追踪,追踪到恶意用户后,将该用户加入撤销列表,从而取消该用户访问权限。利用外包技术,将大量的计算任务转移至雾节点,以缓解资源受限终端用户的计算负担。安全性分析和性能比较表明了该方案的安全性和有效性。

关键词: 雾计算, 属性基加密, 多属性权威, 关键字搜索, 可追踪性和可撤销性

Abstract: This paper focuses on the limitations of traditional attribute-based keyword search schemes, such as inefficiencies in search algorithms, single-point performance bottlenecks, and the risk of malicious key leakage. A multi-authority encryption scheme with dynamic keyword search and user traceability is proposed for fog computing environments. Firstly, a dynamic search mechanism is introduced, allowing the search to stop once any keyword in the set matches, improving both flexibility and usability. Secondly, through the introduction of multiple attribute authorities to manage disjoint attribute sets, single-point bottlenecks are prevented, significantly enhancing scalability and system stability. Thirdly, in order to prevent malicious users from leaking keys, the user’s identity information is embedded in the key to track malicious users. After tracking malicious users, the user would be added to the revocation list, thereby canceling the user’s access rights. Finally, computational tasks are outsourced to fog nodes, reducing the computational burden on resource-constrained terminal users. Security analysis and performance comparisons show the proposed method is secure and efficient.

Key words: fog computing, attribute-based encryption, multi-authority, keyword search, traceability and revocation