| Cloud-Edge-Collaborative Storage(CECS)uses edge servers to process and analyze data in real-time,and store the processed data on cloud servers with huge volume of storage.It is an important method to achieve fast response of mobile services and mass mobile data outsourcing storage with limited computing and storage resources of mobile devices.In order to make the data of smart devices more valuable,CECS needs to achieve data sharing,which easily leads to data security problems.The existing secure CECS scheme is weak in data security because edge servers can request and obtain the private key of all users from the key generation center,and edge servers share searchable symmetric keys,which easily leads to the problem that any edge server could be compromised and then leveraged to break entire system security.In addition,because the existing secure CECS scheme uses searchable symmetric encryption to achieve data search,it is not suitable for the scenario where data owners upload data from multiple edge servers.To solve above problems,a new secure data sharing and search scheme for CECS is proposed.The scheme improves the existing secure CECS scheme,including:(1)enabling users to generate public-private key pairs and manage private keys by themselves,instead of requiring edge servers to manage users ' private keys,so that the key management is more secure and can support flexible and non-repudiation authorization;(2)using searchable public key encryption thus users only need to use their private key and keyword to generate a trapdoor when searching,so as to achieve securer,more efficient,and more flexible data search.In terms of security,the proposed scheme achieves four security goals: data confidentiality on cloud servers,secure data sharing,secure data search,and avoiding the single point of breakthrough.In terms of performance,the performance test results of the proposed scheme show that the scheme effectively reduces the users' computing burden and improves the computing efficiency by utilizing the edge servers to perform the encryption and decryption algorithms with high computing overhead.Compared with the existing secure CECS scheme,the proposed scheme greatly reduces the computing and communication overhead when generating trapdoor. |