计算机科学 ›› 2015, Vol. 42 ›› Issue (Z6): 365-369.

• 信息安全 • 上一篇    下一篇

基于关键字的云加密数据隐私保护检索

俞志斌,周彦晖   

  1. 西南大学计算机与信息科学学院 重庆400715,西南大学计算机与信息科学学院 重庆400715
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受科技支撑计划项目(2012BAH77F02,2012BAH77F05)资助

Keyword-based Privacy-preserving Retrieval over Cloud Encrypted Data

YU Zhi-bin and ZHOU Yan-hui   

  • Online:2018-11-14 Published:2018-11-14

摘要: 云计算技术的蓬勃发展,使得越来越多的企业和个人将数据外包存储到云端并通过云服务提供对数据的管理。查询是用户访问云端数据获取信息的必不可少的操作。这样,保护用户查询隐私和云端数据隐私以及快速提供满足用户需求的查询结果成为了关键问题。私有信息检索可使查询用户和数据库持有者在双方私有信息互不泄露的情况下完成查询操作。针对现有私有信息检索方案在云环境、大容量数据中的局限性,提出一个基于同态密码体制以及MapReduce的计算安全信息检索协议并使用批量查询方法降低协议通信复杂度。将提出的协议作为构建块,利用完美哈希函数工具构建基于关键字的云加密数据检索方案,方案兼具隐私性、查询的高效率以及基于关键字的实用性。

Abstract: More and more organizations and individuals outsource their data storage into cloud and using cloud-based services provide data management.Query providing user capabilities of accessing cloud data and obtaining information,is an important component of cloud services.Thus,how to protect both privacy of user queries and data privacy in cloud while providing query services and eventually providing query results meeting needs quickly and timely has become a vital concern.The private information retrieval (PIR) protocol allows user to perform a query from a database without revealing his private information;meanwhile the privacy of the database will be protected.Corresponding to limitations encountered in the applications of existing PIR protocol in the cloud environment and large capacity data scenario,a computational PIR protocol based on additively homomorphic encryption scheme and MapReduce was proposed.The protocol uses the batch queries method to lower the communication complexity.Further,we used proposed protocol as the building-block as well as perfect hash function tool to construct a cloud keyword-based encrypted data retrieval scheme.The scheme combines high query efficiency and the practicality of keyword-based retrieval.

Key words: Private information retrieval,Additively homomorphic encryption,Parallel query processes,Keyword-based retrieval

[1] Vouk M A.Cloud computing — Issues,research and implementations[C]∥30th International Conference on Information Technology Interfaces,2008(ITI 2008).IEEE,2008:31-40
[2] Jansen W A.Cloud Hooks:Security and Privacy Issues in Cloud Computing[J].Hawaii International Conference on System Scien-ces,2011:1-10
[3] Ren K,Wang C,Wang Q.Security Challenges for the Public Cloud[J].Internet Computing,IEEE,2012,16(1):69-73
[4] Bugiel S,Nurnberger S,Sadeghi A.Twin clouds:all architecture for secure computing [C]∥Workshop on Cryptography and Security in Clouds.Zurich,Switzerland,2011:1-l1
[5] Pearson S,Shen Y,Mowbray M.A Privacy Manager For Cloud Computing[J].Cloud Computing,2009,5931:90-106
[6] Chor B,Goldreich O,Kushilevitz E,et al.Private information retrieval[C]∥Foundations of Computer Science,1995.IEEE,1995:41-50
[7] Kushilevitz E,Ostrovsky R.Replication Is Not Needed:Single Database,Computationally-Private Information Retrieval (Extended Abstract)[C]∥PROC.of 38th Annu.IEEE Symp.on Foundation of Computer Science.1997:364-373
[8] Yoshida R,Cui Y,Sekino T,et al.Practical Searching over Encrypted Data by Private Information Retrieval[J].Global Telecommunications Conference,IEEE,2011:1-5
[9] Rafail O,William E,Skeith III.A survey of single-database private information retrieval:techniques and applications[C]∥Public Key Cryptography(PKC 2007).2007:393-411
[10] Boneh D,Kushilevitz E,Ostrovsky R,et al.Public Key Encryption That Allows PIR Queries[J].Lecture Notes in Computer Science,2007,4622:50-67
[11] Beimel A,Ishai Y,Malkin T.Reducing the Servers Computation in Private Information Retrieval:PIR with Preprocessing[C]∥CRYPTO 2000.2000:56-74
[12] Sion R.On the Computational Practicality of Private Information Retrieval[C]∥Proceedings of the Network and Distributed Systems Security Symposium,2007.Stony Brook Network Security and Applied Cryptography Lab Tech Report,2007
[13] Kamara S,Raykova M.Parallel Homomorphic Encryption[J].Lecture Notes in Computer Science,2011
[14] Chang Y C.Single Database Private Information Retrieval with Logarithmic Communication[C]∥Information Security and Privacy:9th Australasian Conference,Sydney,Australia,2004.Berlin,Germany:Springer,2004:50-61
[15] Pietro R D,nen M,Blass E,et al.PRISM-Privacy-Preserving Search in MapReduce[J].Privacy Enhancing Technologies,volume 7384 of Lecture Notes in Computer Science,2012
[16] Melchor C A,Crespin B,Gaborit P,et al.High-speed private information retrieval computation on GPU[C]∥IEEE SECURWARE.2008:263-272
[17] Beimel A,Ishai Y,Malkin T.Reducing the Servers Computation in Private Information Retrieval:PIR with Preprocessing[C]∥CRYPTO 2000.2000:56-74
[18] Lipmaa H.An Oblivious Transfer Protocol with Log-SquaredCommunication[C]∥Proc.Information Security Conf.(ISC ’05).2005
[19] Stern J P.A New and Efficient All-Or-Nothing Disclosure of Secrets Protocol[J].Lecture Notes in Computer Science,1998:357-371
[20] Paillier P.Public-key cryptosystems based on composite degree residuosity classes[C]∥UROCRYPT.1999:223-238
[21] Dean J,Ghemawat S.MapReduce:simplified data processing on large clusters[C]∥Proceedings of 6th Conference on Symposium on Operatins Systems Design and Implementation(OSDI’04).2004
[22] Ishai Y,Kushilevitz E,Ostrovsky R,et al.Batch Codes andTheir Applications[C]∥Proceedings of the 36th Annual ACM Symposium on Theory of Computing.2004:262-271
[23] Yoshida R,Cui Y,Shigetomi R,et al.The Practicality of theKeyword Search Using Pir[C]∥International Symposium on Information Theory and Its Applications(ISITA 2008).2008:1-6
[24] Botelho F C,Galinkin D,Meira W,et al.External perfect hashing for very large key sets[C]∥Proceedings of the Sixteenth ACM Conference on Conference on Information and Knowledge Mana(CIKM ’07).2007:653-662
[25] Botelho F C,Lacerda A,Menezes G V,et al.Minimal perfect hashing:A competitive method for indexing internal memory[J].Information Sciences,2011,181(13):2608-2625

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!