期刊文献+

云计算环境下密文搜索算法的研究 被引量:15

Research on ciphertext search for the cloud environment
在线阅读 下载PDF
导出
摘要 为确保数据私密性,用户选择将数据加密后再上传到云端,但云无法为密文数据提供管理和搜索等服务。密文搜索技术可以把保护用户数据私密性和有效利用云服务结合起来。在分析云环境下密文搜索算法的基础上,提出基于云环境的密文搜索体系结构,研究其中的关键技术,指出云环境应用密文搜索技术存在的问题和改进的方向。 In order to ensure the data privacy, users have to encrypt the data before outsourcing them to the cloud, How- ever, the encrypted data cannot take full advantage of the rich service function and powerful computation ability of the cloud platform. Ciphertext search technology can combine the protection of user data's privacy with the efficient usage of cloud platform services. On the basis of analyzing the ciphertext search technologies in cloud computing environment, a ciphertext search system architecture based on cloud computing environment was proposed and the key technologies of ciphertext search were studied. Finally the ciphertext search technologies' main problems at present and the important re- search direction in future were pointed out.
出处 《通信学报》 EI CSCD 北大核心 2013年第7期143-153,共11页 Journal on Communications
基金 国家自然科学基金资助项目(61202081) 国家科技重大专项基金资助项目(2012ZX03005010)~~
关键词 云存储 密文搜索 倒排索引 BLOOMFILTER cloud storage ciphertext search reverse index Bloom filter
  • 相关文献

参考文献41

  • 1ARMBRUST M, FOX A, GRIFFITH R. Above the clouds: a berkeley view of cloud computing[EB/OL], http://www.eecs.berkeley.edu/Pubs/ TechRpts/2009/EEC S-2009-28.html, 2009.
  • 2BUGIEL S, NLrRNBERGER S, SADEGHI A. Twin clouds: an archi- tecture for secure cloud computing[A]. Workshop on Cryptography and Security in Clouds[C]. Zurich, Switzerland, 2011.1-11.
  • 3KAMARA S, LAUTER K. Cryptographic cloud storage[J]. Financial Cryptography and Data Security, 2010,6054:136-149.
  • 4LI J, KROHN M, MAZI D. Secure untrusted data repository (SUNDR)[A]. Proceedings of the 6th Symposium on Operating Sys- tems Design and Implementation[C]. San Francisco, CA, USA, 2004. 91-106.
  • 5GOH E J. Secure indexes[A]. Proceedings of the 2004 Workshop on Information Security Applications[C]. Jeju Island, Korea, 2004.73-86.
  • 6SONG D X, WAGNER D, PERRIG A. Practical techniques or searches on encrypted data[A]. Proceedings of the IEEE Symposium on Security and Privacy[C].CA,USA,2000.36-49.
  • 7BONEH D, CRESCENZO G D, OSTROVSKY R. Public key encryp- tion with keyword search[A]. Proc of EUROCRYP'04[C]. Interlaken, Switzerland, 2004.506-522.7.
  • 8PAILLIER P. Public-key cryptosystems based on composite degree residu- osity clmmes[A]. Proceedings of the International Conference on the Theory and Applications of Cryptograhic Techniques (EUROCRYPT'99)[C]. Prague, Czech Republic, 1999.223-238.
  • 9BETHENCOURT J, SONG D, WATERS B. New constructions and practical applications for private stream searching (extended ab- stract)[A]. Proceedings of the IEEE Symposium on Security and Pri- vacy (SP'06)[C]. Oakland, California, USA, 2006. 134-139.
  • 10BETHENCOURT J, SONG D, WATERS B. New techniques for private stream searching[J]. ACM Transactions on Information and System Security, 2009, 12(3): 1-32.

二级参考文献1

共引文献5

同被引文献122

  • 1蔚赵春,凌鸿.我国商业银行私有云建设研究[J].浙江金融,2012(5):59-62. 被引量:6
  • 2马勺布,胡磊,徐德启.一种动态安全的密文数据库检索方法[J].计算机工程,2005,31(6):132-133. 被引量:19
  • 3Song D X,Wagner D,Perrig A.Practical techniques or searches on encrypted data[C]//Proceedings of the IEEE Symposium on Security and Privacy.Piscataway N J:IEEE,2000:36-49.
  • 4Goh E J.Secure indexes[J/OL].[2014-01-05].http://epriat.iacr.org/2003/216.
  • 5Boneh D,Waters B.Conjunctive,subset,and range queries on encrypted data[C]//Theory of Cryptography,Berlin Heidelberg:Springer,2007:535-554.
  • 6Katz J,Sahai A,Waters B.Predicate encryption supporting disjunctions,polynomi-al equations,and inner products[C]//Advances in Cryptology-EUROCRYPT2008.Berlin Heidelberg:Springer,2008:146-162.
  • 7Li J,Wang Q,Wang C,et al.Fuzzy keyword search over encrypted data in cloud computing[C]//INFOCOM,2010 Proceedings IEEE,Piscataway N J:IEEE,2010:1-5.
  • 8Kuzu M,Islam M S,Kantarcioglu M.Efficient similarity search over encrypted data[C]//Data Engineering(ICDE),2012 IEEE28th International Conference on,Piscataway N J:IEEE,2012:1156-1167.
  • 9Zhang Z,Hadjieleftheriou M,Ooi B C,et al.Bedtree:An all-purpose index structure for string similarity search based on edit distance[C]//Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data,New York:ACM,2010:915-926.
  • 10Chuah M,Hu W.Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data[C]//Distributed Computing Systems Workshops(ICDCSW),2011 31st International Conference on,Piscataway N J:IEEE,2011:273-281.

引证文献15

二级引证文献84

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部