Have a personal or library account? Click to login
Searchable Re-encryption Cloud Storage Method Based on Markov Chain Cover
Open Access
|Oct 2019

Figures & Tables

Figure 1.

Storage status transition diagram
Storage status transition diagram

Figure 2.

Pseudo-code in SReCSM
Pseudo-code in SReCSM

Figure 3.

The system architecture diagram of the storage group
The system architecture diagram of the storage group

Figure 4.

The process of adding a PC
The process of adding a PC

Figure 5.

The percentage of the response time for the transaction
The percentage of the response time for the transaction

Figure 6.

Time comparison on SReCSM encryption and Re-encryption
Time comparison on SReCSM encryption and Re-encryption

Figure 7.

Comparison of Re-encryption time
Comparison of Re-encryption time

Figure 8.

Storage spaceversus number of keyword
Storage spaceversus number of keyword

Figure 9.

Searchingtimeversus number of keyword
Searchingtimeversus number of keyword

Figure 10.

Comparison while performing re-encryption and decryption
Comparison while performing re-encryption and decryption

Figure 11.

The reliability contrast diagram
The reliability contrast diagram

SYMBOL DEFINITION

SymbolDefinition
PR(K)Private key enabled by Data owners
PU(K)Public key enabled by data owners
KwKeyword
DbDatabase {all the data passed to the cloud serverswill bestored here}
EkEditing Keyword
EdEncrypted Data
PR(K)ReRe-encryptedPrivatekey
PU(K)ReRe-encrypted Public key
Ed ReRe-encryptedEncrypted Data
DdDecrypted Data
Kw(pu)Keyword assigned with the public key
Kw(pr)Keyword assigned with the private key
DoData Owners (Sender)
DuData Users (Receiver)
CsCloud Server (Third Party User)

THE PERFORMANCE OF THE MOBILE END DOWNLOAD THE DATA

type of testutilization rate of Mobile CPU(%)transmission rate (Mbps)utilization rate of Mobile/transmission rate
Raw data14.6813.901353.763056
After the encryption35.2212.7614712.754439

ROUTING TABLE

FieldTypeLengthNote
IDint Serial number
fnamevarchar255Filename
fsizeint File size
IPvarchar15IP address

THE PERFORMANCE OF THE MOBILE END UPLOAD THE DATA

type of testutilization rate of Mobile CPU(%)transmission rate(Mbps)utilization rate of Mobile/transmission rate
Raw data16.4363.570204.603663
After the encryption38.4322.3601516.283711

TIME COMPARISON FOR DIFFERENT ALGORITHM ENCRYPTION

File size(M)MReS Re-encrypt(ms)CReSRe-encrypt(ms)SReCSMRe-encrypt(ms)
3.041048770720
23.15323029012600
80.3512010102308560
167.58238202361223598

TIME COMPARISON ON ENCRYPTION AND DECRYPTION BY USING SRECSM

File size(M)File typeSReCSMencryption(ms)HDS upload(ms)SReCSMdecryption(ms)HDS download(ms)
3.07pdf105026853702800
3.22MP3117826004782830
23.8mkv3238593026486290
25.8doc3140526021636400
166.518rmvb23830464001650042460
Language: English
Page range: 29 - 46
Published on: Oct 1, 2019
Published by: Xi’an Technological University
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2019 Wang Hui, Wang Zhong Sheng, Li Jinguang, published by Xi’an Technological University
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.