2022
DOI: 10.4018/jgim.315014
|View full text |Cite
|
Sign up to set email alerts
|

Ciphertext Database Audit Technology Under Searchable Encryption Algorithm and Blockchain Technology

Abstract: The study aims to solve the problems in auditing ciphertext data, improve audit efficiency, and increase the security of audit data in the audit server. First, the existing encryption algorithms are analyzed. Second, the searchable encryption algorithm is proposed to audit the ciphertext data, and an audit server scheme is made based on blockchain technology (BT). Finally, the two schemes are compared with the traditional audit technology. The results show that the server's inspection efficiency of the searcha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 48 publications
0
2
0
Order By: Relevance
“…Collecting additional video data from a wider range of oyster reefs in the New York Harbor, as well as other estuarine ecosystems, can improve the model's generalization capabilities and increase its applicability to diverse environments. Additionally, future work should focus on refining the model, addressing the current limitations, and exploring new data collection and analysis techniques with emerging technologies, such as big data analytics (Bag et al, 2022;Xie et al, 2022;Xing et al, 2022), blockchain (Buthelezi et al, 2022;Harshvardhan & Teoh, 2022;Qiu, 2022), edge computing (Liang et al, 2022;Huang et al, 2021), the Internet of Things (Almomani et al, 2021;Peng et al, 2021), and deep learning (Wu et al, 2022;Zhang & Song, 2022;Zhao, 2022). By continuously improving and expanding upon this research, we can contribute to the advancement of oyster restoration efforts, enhance ecological management practices, and further our understanding of oyster populations and their vital role in estuarine ecosystems.…”
Section: Discussionmentioning
confidence: 99%
“…Collecting additional video data from a wider range of oyster reefs in the New York Harbor, as well as other estuarine ecosystems, can improve the model's generalization capabilities and increase its applicability to diverse environments. Additionally, future work should focus on refining the model, addressing the current limitations, and exploring new data collection and analysis techniques with emerging technologies, such as big data analytics (Bag et al, 2022;Xie et al, 2022;Xing et al, 2022), blockchain (Buthelezi et al, 2022;Harshvardhan & Teoh, 2022;Qiu, 2022), edge computing (Liang et al, 2022;Huang et al, 2021), the Internet of Things (Almomani et al, 2021;Peng et al, 2021), and deep learning (Wu et al, 2022;Zhang & Song, 2022;Zhao, 2022). By continuously improving and expanding upon this research, we can contribute to the advancement of oyster restoration efforts, enhance ecological management practices, and further our understanding of oyster populations and their vital role in estuarine ecosystems.…”
Section: Discussionmentioning
confidence: 99%
“…Blockchain technology adaptation keeps data in blocks and records it as a complete and discrete ledger (Nguyen and Kim, 2018; Liang et al ., 2022). A certain amount of information is stored in each block, which is connected in a chain following the order in which they were each created (Li et al ., 2020; Qiu, 2022). Blockchain technology adaptation has the attributes of trust and decentralization (Wang and Li, 2019).…”
Section: Theoretical Background and Literature Reviewmentioning
confidence: 99%
“…CC brings great ease by allowing applications and users to access diverse services remotely [1]. In addition to general users communicating with cloud storage (CS), the administrator's applications with private accounts frequently accomplish private activity to do particular tasks like downloading database files and deleting virtual hosts [2]. Cloud data are widely dispersed by cloud storage providers (CSP) on a cloud network.…”
Section: Introductionmentioning
confidence: 99%