Ciphertext Database Audit Technology Under Searchable Encryption Algorithm and Blockchain Technology

Ciphertext Database Audit Technology Under Searchable Encryption Algorithm and Blockchain Technology

Jin Qiu
Copyright: © 2022 |Pages: 17
DOI: 10.4018/JGIM.315014
Article PDF Download
Open access articles are freely available for download

Abstract

The study aims to solve the problems in auditing ciphertext data, improve audit efficiency, and increase the security of audit data in the audit server. First, the existing encryption algorithms are analyzed. Second, the searchable encryption algorithm is proposed to audit the ciphertext data, and an audit server scheme is made based on blockchain technology (BT). Finally, the two schemes are compared with the traditional audit technology. The results show that the server's inspection efficiency of the searchable encryption algorithm is higher.
Article Preview
Top

1. Introduction

With the development of computer technology, more and more data security problems are exposed (Pajany and Zayaraz, 2021). In 2018, network security incidents worldwide had caused a total loss of more than 45 billion US dollars. In 2019, a Philippine financial service company is attacked by hackers, resulting in data leakage. Nearly 900000 users' data are stolen and sold on the network. The reason for this is that database security is not guaranteed. Database audit is an essential technology to ensure data security. It can record all the actions that have operated on the database in real time and analyze these operations. If there is a problem during the audit, it can help maintenance personnel quickly analyze and locate the problem in time, preventing data leakage and protecting data security (von Sanden and Neideck, 2021). With the development of the era of big data, Blockchain Technology (BT) has penetrated into all walks of life and gained much attention in auditing. BT first appeared in the form of Bitcoin. BT is the underlying technology of Bitcoin and was first used in Bitcoin. At present, the research of BT in audit database servers is relatively shallow (Feng & Chen, 2022) (Wang et al., 2020).

Although it can audit users’ information efficiently, the plaintext audit scheme also causes user privacy disclosure. In contrast, the security of the ciphertext audit scheme is more reliable. With the improvement of the theoretical system, searchable encryption’s application to audit work is getting more and more increasing. Jiang et al. (2018) proposed an audit protocol of principal-agent outsourcing data in the scenario of cloud computing. He used the asymmetric encryption algorithm to verify the integrity of data blocks and Hashtable to construct the index for the keyword dictionary of a data set to realize rapid search of keywords (Jiang et al., 2018). Li et al. (2021) proposed the searchable encrypted audit log in cloud storage system. The information to be audited is encrypted and transmitted by the asymmetric searchable encryption algorithm. The client is identified after the cloud service provider verifies the searchable encrypted audit log. This method protects the user's privacy and allows cloud service providers to monitor the behavior of clients in real time (Li et al., 2021). Hao et al. (2021) proposed an audit method based on a knowledge map. As a big data technology, the knowledge map has visualization characteristics and can analyze the relationship between entities. This method improves the audit efficiency, but the internal attack is not addressed in the audit (Hao et al., 2021). Li et al. (2021) put forward a search encryption scheme based on BT (Blockchain Technology). A searchable encryption algorithm based on symmetric encryption builds a distributed storage server. It can solve the problem that the search results of cloud service providers cannot be verified in an untrusted cloud server environment, resulting in incorrect information return (Li et al., 2021).

Complete Article List

Search this Journal:
Reset
Volume 32: 1 Issue (2024)
Volume 31: 9 Issues (2023)
Volume 30: 12 Issues (2022)
Volume 29: 6 Issues (2021)
Volume 28: 4 Issues (2020)
Volume 27: 4 Issues (2019)
Volume 26: 4 Issues (2018)
Volume 25: 4 Issues (2017)
Volume 24: 4 Issues (2016)
Volume 23: 4 Issues (2015)
Volume 22: 4 Issues (2014)
Volume 21: 4 Issues (2013)
Volume 20: 4 Issues (2012)
Volume 19: 4 Issues (2011)
Volume 18: 4 Issues (2010)
Volume 17: 4 Issues (2009)
Volume 16: 4 Issues (2008)
Volume 15: 4 Issues (2007)
Volume 14: 4 Issues (2006)
Volume 13: 4 Issues (2005)
Volume 12: 4 Issues (2004)
Volume 11: 4 Issues (2003)
Volume 10: 4 Issues (2002)
Volume 9: 4 Issues (2001)
Volume 8: 4 Issues (2000)
Volume 7: 4 Issues (1999)
Volume 6: 4 Issues (1998)
Volume 5: 4 Issues (1997)
Volume 4: 4 Issues (1996)
Volume 3: 4 Issues (1995)
Volume 2: 4 Issues (1994)
Volume 1: 4 Issues (1993)
View Complete Journal Contents Listing