Peculiarities of the search algorithms organization based on the samples of the code sequences.
Abstract
The analysis of modern approaches used in the construction and optimization of algorithms for searching data blocks in accordance with the given samples of code sequences is carried out. Considerable attention is paid to solving the problem of protecting "sensitive" data and, accordingly, organizing a highly functional information security system. For this purpose, it is proposed to adapt the mathematical model of attributive search by keywords in accordance with the algorithms for lightweight decoding and the implementation of the multi-authorization mode. On the basis of the improved mathematical apparatus, basic approaches have been developed for the development, optimization and evaluation at the numerical level of search algorithms by code sequences of keywords, it provides the possibility of automatic generation of methodological recommendations. The system for evaluating the efficiency and functionality of search algorithms is based on calculating the target functions of the accuracy of the data block allocation in accordance with the incoming request, the query execution time in accordance with the average latency level, and the load on the computing resource of the hardware and software complex of the data center information system.
References
Bracciali, A., Clark, J., Pintore, F., Rønne, P. B., &Sala, M. (2020). Financial Cryptography and Data Security Fc 2019 International Workshops, Voting and Wtsc, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers. Springer International Publishing.
Bonneau, J. (2020). Financial cryptography and data security: 24th international conference, Fc 2020, Kota Kinabalu, Malaysia, February 10-14, 2020: revised selected papers. Springer.
Long, J., Zhang, K., Wang, X., & Dai, H.-N. (2019). Lightweight Distributed Attribute Based Keyword Search System for Internet of Things. Security, Privacy, and Anonymity in Computation, Communication, and Storage Lecture Notes in Computer Science, 253–264. doi: 10.1007/978-3-030-24900-7_21.
Huang, D., Dong, Q., & Zhu, Y. (2020). Comparable Attribute-Based Encryption. Attribute-Based Encryption and Access Control, 19–42. https://doi.org/10.1201/9781351210607-2
Fuzzy identity and attribute based encryption for fine grained access control of encrypted data. (2018). International Journal of Modern Trends in Engineering & Research, 5 (7), 23–26. doi: 10.21884/ijmter.2018.5172.m7iz2.
Qiuxin, W. (2014). A generic construction of ciphertext-policy attribute-based encryption supporting attribute revocation. China Communications, 11 (13), 93–100. doi: 10.1109/cc.2014.7022531.
Zhenpeng, L., Xianchao, Z., &Shouhua, Z. (2014). Multi-authority Attribute Based Encryption with Attribute Revocation. 2014 IEEE 17th International Conference on Computational Science and Engineering.doi: 10.1109/cse.2014.343.
Li, Q., Feng, D., & Zhang, L. (2012). An attribute based encryption scheme with fine-grained attribute revocation. 2012 IEEE Global Communications Conference (GLOBECOM).doi: 10.1109/glocom.2012.6503225.
Yang, Y., Chen, X., Chen, H., & Du, X. (2018). Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing. IEEE Access, 6, 18009–18021. doi: 10.1109/access.2018.2820182.
Rane, D. D., &Ghorpade, V. (2015). Multi-user multi-keyword privacy preserving ranked based search over encrypted cloud data. 2015 International Conference on Pervasive Computing (ICPC)
Zhang, W., Lin, Y., Xiao, S., Wu, J., Zhou, S.: Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. IEEE Trans. Comput. 65 (5), 1566–1577 (2016).
Belguith, S., Kaaniche, N., &Russello, G. (2018). Lightweight Attribute-based Encryption Supporting Access Policy Update for Cloud Assisted IoT. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications.doi: 10.5220/0006854601350146
Wei, J., Liu, W., Hu, X.: Secure and efficient attribute-based access control for multiauthority cloud storage. IEEE Syst. J.12 (2), 1731–1742 (2018).
Abstract views: 67 PDF Downloads: 84