计算机科学 ›› 2019, Vol. 46 ›› Issue (1): 6-12.doi: 10.11896/j.issn.1002-137X.2019.01.002

• 综述 • 上一篇    下一篇

面向云环境的多关键词密文排序检索研究综述

戴华1,2, 李啸1, 朱向洋1, 杨庚1,2, 易训3   

  1. (南京邮电大学计算机学院 南京210023)1
    (江苏省大数据安全与智能处理重点实验室 南京210023)2
    (墨尔本皇家理工大学科学学院 墨尔本 3000)3
  • 收稿日期:2018-02-28 出版日期:2019-01-15 发布日期:2019-02-25
  • 作者简介:戴 华(1982-),男,博士,副教授,主要研究方向为数据管理与安全、数据库技术,E-mail:daihua@njupt.edu.cn(通信作者);李 啸(1994-),男,硕士生,主要研究方向为隐私保护、密文检索;朱向洋(1993-),男,硕士生,主要研究方向为隐私保护、密文检索;杨 庚(1961-),男,教授,博士生导师,主要研究方向为大数据安全、隐私保护;易 训(1967-),男,教授,博士生导师,主要研究方向为密码学、信息安全。
  • 基金资助:
    国家自然科学基金项目(61402014,61572263,61672297,61472193),江苏省自然科学项目(BK20151511,BK20161516),中国博士后科学基金项目(2015M581794),安徽省自然科学基金项目(1608085MF127),江苏省博士后科研资助计划(1501023C),南京邮电大学自然科学基金项目(NY217119)资助。

Research on Multi-keyword Ranked Search over Encrypted Cloud Data

DAI Hua1,2, LI Xiao1, ZHU Xiang-yang1, YANG Geng1,2, YI Xun3   

  1. (College of Computer Science & Technology,Nanjing University of Posts and Telecommunications,Nanjing 210023,China)1
    (Jiangsu Key Laboratory of Big Data Security & Intelligent Processing,Nanjing 210023,China)2
    (School of Science,Royal Melbourne Institute of Technology University,Melbourne 3000,Australia)3
  • Received:2018-02-28 Online:2019-01-15 Published:2019-02-25

摘要: 随着云计算的广泛应用,面向数据或计算的外包服务模式越来越被业界所接受。为了保护数据拥有者外包数据的私密性,具备隐私保护能力的高效密文排序检索技术逐渐成为目前备受关注的一个研究热点。文中以面向云环境的多关键词密文排序检索技术为关注重点,介绍了现有研究工作的系统模型和威胁模型,并描述了模型中关于隐私保护、检索效率与准确率、检索结果完整性等的问题;全面分析了现有工作中典型的多关键词密文排序检索方法及相关扩展研究,讨论并梳理了这些方法的核心思想;最后,对现有研究工作进行了总结,并给出了该研究领域中待解决的关键性问题和未来的研究方向。

关键词: 云外包, 数据隐私, 多关键词检索, 密文检索, 排序检索

Abstract: With the extensive development of cloud computing,storage and/or computing outsourcing services are becoming more and more acceptable nowadays.To protect the privacy of outsourced data,the privacy-preserving multi-keyword ranked search scheme over encrypted cloud data is focused by researches,which turns to be a hot spot recently.This paper introduced the system model and threat model of existing work,and gave the problem description about privacy-preserving,search efficiency and accuracy,search result completeness,etc.Typical works and extended research about multi-keyword ranked search were studied,and the main ideas of those methods were discussed in detail.Finally,the conclusions about current works were given,and the future research directions were proposed simultaneously.

Key words: Outsourced cloud, Data privacy, Multi-keyword search, Encrypted data search, Ranked search

中图分类号: 

  • TP309.7
[1]LI H,SUN W H,LI F H,et al.Secure and Privacy-Preserving Data Storage Service in Public Cloud[J].Journal of Computer Research and Development,2014,51(7):1397-1409.(in Chinese)<br /> 李晖,孙文海,李凤华,等.公共云存储服务数据安全及隐私保护技术综述[J].计算机研究与发展,2014,51(7):1397-1409.<br /> [2]ZHANG Y Q,WANG X F,LIU X F,et al.Survey on Cloud Computing Security[J].Journal of Software,2016,27(6):1328-1348.(in Chinese)<br /> 张玉清,王晓菲,刘雪峰,等.云计算环境安全综述[J].软件学报,2016,27(6):1328-1348.<br /> [3]HASHIZUME K,ROSADO D G,FERNNDEZ-MEDINA E,et al.An analysis of security issues for cloud computing[J].Journal of Internet Services and Applications,2013,4(1):1-13.<br /> [4]FERNANDES D A B,SOARES L F B,GOMES J V,et al.Security issues in cloud environments:a survey[J].International Journal of Information Security,2014,13(2):113-170.<br /> [5]ESPOSITO C,CASTIGLIONE A,POP F,et al.Challenges of Connecting Edge and Cloud Computing:A Security and Forensic Perspective[J].IEEE Cloud Computing,2017,4(2):13-17.<br /> [6]MIAO Y,MA J,LIU X,et al.m2-ABKS:Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting[J].Journal of Medical Systems,2016,40(11):1-12.<br /> [7]ZHANG L L,ZHANG Y Q,LIU X F,et al.Efficient Conjunctive Keyword Search over Encrypted Electronic Medical Records[J].Journal of Software,2016,27(6):1577-1591.(in Chinese)<br /> 张丽丽,张玉清,刘雪峰,等.对加密电子医疗记录有效的连接关键词的搜索[J].软件学报,2016,27(6):1577-1591.<br /> [8]YANG Y,MA M.Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for ehealth clouds[J].IEEE Transactions on Information Forensics and Security,2016,11(4):746-759.<br /> [9]WANG G F,LIU C Y,PAN H Z,et al.Survey on Insider Threats to Cloud Computing[J].Chinese Journal of Computers,2017,40(2):296-316.(in Chinese)<br /> 王国峰,刘川意,潘鹤中,等.云计算模式内部威胁综述[J].计算机学报,2017,40(2):296-316.<br /> [10]TIAN H L,ZHANG Y,LI C,et al.A Survey of Confidentiality Protection for Cloud Databases[J].Chinese Journal of Compu-ters,2017,40(10):2245-2270.(in Chinese)<br /> 田洪亮,张勇,李超,等.云环境下数据库机密性保护技术研究综述[J].计算机学报,2017,40(10):2245-2270.<br /> [11]KHALIL I M,KHREISHAH A,AZEEM M.Cloud computing security:a survey[J].Computers,2014,3(1):1-35.<br /> [12]SINGH S,JEONG Y S,PARK J H.A survey on cloud computing security:Issues,threats,and solutions[J].Journal of Network and Computer Applications,2016,75(1):200-222.<br /> [13]LI J W,JIA C F,LIU Z L,et al.Survey on the Searchable Encryption[J].Journal of Software,2015,26(1):109-128.(in Chinese)<br /> 李经纬,贾春福,刘哲理,等.可搜索加密技术研究综述[J].软件学报,2015,26(1):109-128.<br /> [14]DONG X L,ZHOU J,CAO Z F,et al.Research Advances on Secure Searchable Encryption[J].Journal of Computer Research and Development,2017,54(10):2107-2120.(in Chinese)<br /> 董晓蕾,周俊,曹珍富,等.可搜索加密研究进展[J].计算机研究与发展,2017,54(10):2107-2120.<br /> [15]CAO N,WANG C,LI M,et al.Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data[C]//30th IEEE Annual Conference on Computer Communications (INFOCOM).IEEE,2011:829-837.<br /> [16]WONG W K,CHEUNG D W,KAO B,et al.Secure knn computation on encrypted databases[C]//2009 ACM SIGMOD International Conference on Management of Data.ACM,2009:139-152.<br /> [17]CAO N,WANG C,LI M,et al.Privacy-preserving multi-keyword ranked search over encrypted cloud data[J].IEEE Tran-sactions on Parallel and Distributed Systems,2014,25(1):222-233.<br /> [18]FU Z,SUN X,LIU Q,et al.Achieving efficient cloud search services:multi-keyword ranked search over encrypted cloud data supporting parallel computing [J].IEICE Transactions on Communications,2015,98(1):190-200.<br /> [19]SUN W,WANG B,CAO N,et al.Privacy-preserving multi-keyword text search in the cloud supporting similarity-basedran-king[C]//8th ACM SIGSAC Symposium on Information,Computer and Communications Security.ACM,2013:71-82.<br /> [20]XIA Z,WANG X,SUN X,et al.A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J].IEEE Transactions on Parallel and Distributed Systems,2016,27(2):340-352.<br /> [21]SALTON G,HARMAN D.Information retrieval[M].New<br /> York:John Wiley and Sons Ltd.,2003.<br /> [22]CHEN C,ZHU X J,SHEN P S,et al.An Efficient Privacy-Preserving Ranked Keyword Search Method[J].IEEE Transactions on Parallel and Distributed Systems,2016,27(4):951-963.<br /> [23]ZHU X Y,DAI H,YI X,et al.MUSE:An Efficient and Accurate Verifiable Privacy-preserving Multi-Keyword Text Search over Encrypted Cloud Data[J].Security and Communication Networks,2017,2017(2):1-17.<br /> [24]LI J,WANG Q,WANG C,et al.Fuzzy Keyword Search over<br /> Encrypted Data in Cloud Computing[J].International Journal of Engineering Research and Applications,2014,4(7):441-445.<br /> [25]WANG C,REN K,YU S,et al.Achieving usable and privacy-assured similarity search over outsourced cloud data[C]//31st IEEE Conference on Computer Communications(INFOCOM).IEEE,2012:451-459.<br /> [26]LI J G,TIAN X X,ZHOU A Y,et al.Privacy Preserving Fuzzy Keyword Search in Database as a Service Paradigm[J].Chinese Journal of Computers,2016,39(2):414-428.(in Chinese)<br /> 李晋国,田秀霞,周傲英,等.面向DaaS保护隐私的模糊关键词查询[J].计算机学报,2016,39(2):414-428.<br /> [27]YANG Y,YANG S L,KE M,et al.Ranked Fuzzy Keyword Search Based on Simhash over Encrypted Cloud Data[J].Chinese Journal of Computers,2017,40(2):431-444.(in Chinese)<br /> 杨旸,杨书略,柯闽,等.加密云数据下基于Simhash的模糊排序搜索方案[J].计算机学报,2017,40(2):431-444.<br /> [28]DEY A,JENAMANI M,THAKKAR J J,et al.Lexical TF-IDF:An n-gram Feature Space for Cross-Domain Classification of Sentiment Reviews[C]//International Conference on Pattern Recognition and Machine Intelligence.Springer,Cham,2017:380-386.<br /> [29]WANG B,YU S,LOU W,et al.Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud[C]//33rd IEEE Conference on Computer Communications(INFOCOM).IEEE,2014:2112-2120.<br /> [30]GÖGE C,WAAGE T,HOMANN D,et al.Improving Fuzzy<br /> Searchable Encryption with Direct Bigram Embedding[C]//Trust,Privacy and Security in Digital Business.Cham:Sprin-ger,2017:115-129.<br /> [31]FU Z,WU X,GUAN C,et al.Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement[J].IEEE Transactions on Information Forensics and Security,2016,11(12):2706-2716.<br /> [32]WANG K X,LI Y X,ZHOU F C,et al.Multi-keyword fuzzy Search over Encrypted Data[J].Journal of Computer Research and Development,2017,54(2):348-360.(in Chinese)<br /> 王恺璇,李宇溪,周福才,等.面向多关键词的模糊密文搜索方法[J].计算机研究与发展,2017,54(2):348-360.<br /> [33]SHI X J,HU S P.Fuzzy Multi-Keyword Query on Encrypted<br /> Data in the Cloud[C]//4th International Conference on Applied Computing and Information Technology/3rd International Conference on Computational Science/ Intelligence and Applied Informatics/1st International Conference on Big Data,Cloud Computing,Data Science & Engineering (ACIT-CSII-BCD).IEEE,2016:419-425.<br /> [34]KRISHNA C R,MITTAL S A.Privacy Preserving synonym<br /> based fuzzy multi-keyword ranked search over encrypted cloud data[C]//2016 IEEE International Conference on Computing,Communication and Automation (ICCCA).IEEE,2016:1187-1194.<br /> [35]WANG J,YU X,ZHAO M,et al.Privacy-Preserving Ranked Multi-keyword Fuzzy Search on Cloud Encrypted DataSuppor-ting Range Query[J].Arabian Journal for Science & Enginee-ring,2015,40(8):2375-2388.<br /> [36]FU Z,SUN X,LINGE N,et al.Achieving effective cloud search services:multi-keyword ranked search over encrypted cloud data supporting synonym query[J].IEEE Transactions on Consumer Electronics,2014,60(1):164-172.<br /> [37]XIA Z,ZHU Y,SUN X,et al.Secure semantic expansion based search over encrypted cloud data supporting similarity ranking[J].Journal of Cloud Computing Advances Systems & Applications,2014,3(1):1-11.<br /> [38]FU Z J,SUN X M,JI S,et al.Towards efficient content-aware search over encrypted outsourced data in cloud[C]//33rd IEEE Conference on Computer Communications (INFOCOM).IEEE,2016:1-9.<br /> [39]FU Z,HUANG F,REN K,et al.Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data[J].IEEE Transactions on Information Forensics and Security,2017,12(8):1874-1884.<br /> [40]SAINI V,CHALLA R K,KHAN N S,et al.An Efficient Multi-keyword Synonym-Based Fuzzy Ranked Search Over Outsourced Encrypted Cloud Data[C]//9th International Conference on Advanced Computing and Communication Technologies (ICACCT).2016:433-441.<br /> [41]FU Z,SUN X,XIA Z,et al.Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing[C]//32nd IEEE International Performance,Computing,and Communications Conference (IPCCC).IEEE,2013:1-8.<br /> [42]ZHAO R,LI H,YANG Y,et al.Privacy-preserving personalized search over encrypted cloud data supporting multi-keyword ranking[C]//6th International Conference on Wireless Communications and Signal Processing (WCSP).IEEE,2014:1-6.<br /> [43]FU Z,REN K,SHU J,et al.Enabling personalized search over encrypted outsourced data with efficiency improvement[J].IEEE Transactions on Parallel and Distributed Systems,2016,27(9):2546-2559.<br /> [44]GENNARO R,GENTRY C,PARNO B,et al.Non-Interactive<br /> verifiable computing:outsourcing computation to untrusted workers[C]//30th International Cryptology Conference (CRYPTO).2010:465-482.<br /> [45]SUN W,WANG B,CAO N,et al.Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(11):3025-3035.<br /> [46]WAN Z,DENG R H.VPSearch:Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data[J].IEEE Transactions on Dependable and Secure Computing,2016,PP(99):1-12.
[1] 管健, 汪璟玢, 卞倩虹. 基于城市安全知识图谱的多关键词流式并行检索算法[J]. 计算机科学, 2019, 46(2): 35-41.
[2] 张蜀男, 蔡英, 范艳芳, 夏红科. 云存储中高效密文检索的中文数据加密方案[J]. 计算机科学, 2018, 45(6): 124-129.
[3] 姚寒冰,邢娜娜,周俊伟,李勇华. 支持结果排序的安全密文检索方法研究[J]. 计算机科学, 2018, 45(5): 123-130.
[4] 何亨,夏薇,张继,金瑜,李鹏. 一种云环境中密文数据的模糊多关键词检索方案[J]. 计算机科学, 2017, 44(5): 146-152.
[5] 那海洋,杨庚,束晓伟. 基于B+树的多关键字密文排序检索方法[J]. 计算机科学, 2017, 44(1): 149-154.
[6] 陈超群,李志华. 一种面向隐私保护的密文检索算法[J]. 计算机科学, 2016, 43(Z11): 346-351.
[7] 刘树波,李艳敏,刘梦君. 基于密文检索的位置服务用户隐私保护方案[J]. 计算机科学, 2015, 42(4): 101-105.
[8] 冯贵兰,谭良. 云环境中基于多属性排序的密文检索方案[J]. 计算机科学, 2013, 40(11): 131-136,157.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 编辑部. 新网站开通,欢迎大家订阅![J]. 计算机科学, 2018, 1(1): 1 .
[2] 雷丽晖,王静. 可能性测度下的LTL模型检测并行化研究[J]. 计算机科学, 2018, 45(4): 71 -75, 88 .
[3] 夏庆勋,庄毅. 一种基于局部性原理的远程验证机制[J]. 计算机科学, 2018, 45(4): 148 -151, 162 .
[4] 厉柏伸,李领治,孙涌,朱艳琴. 基于伪梯度提升决策树的内网防御算法[J]. 计算机科学, 2018, 45(4): 157 -162 .
[5] 王欢,张云峰,张艳. 一种基于CFDs规则的修复序列快速判定方法[J]. 计算机科学, 2018, 45(3): 311 -316 .
[6] 孙启,金燕,何琨,徐凌轩. 用于求解混合车辆路径问题的混合进化算法[J]. 计算机科学, 2018, 45(4): 76 -82 .
[7] 张佳男,肖鸣宇. 带权混合支配问题的近似算法研究[J]. 计算机科学, 2018, 45(4): 83 -88 .
[8] 伍建辉,黄中祥,李武,吴健辉,彭鑫,张生. 城市道路建设时序决策的鲁棒优化[J]. 计算机科学, 2018, 45(4): 89 -93 .
[9] 刘琴. 计算机取证过程中基于约束的数据质量问题研究[J]. 计算机科学, 2018, 45(4): 169 -172 .
[10] 钟菲,杨斌. 基于主成分分析网络的车牌检测方法[J]. 计算机科学, 2018, 45(3): 268 -273 .