计算机科学 ›› 2024, Vol. 51 ›› Issue (11): 298-306.doi: 10.11896/jsjkx.231000111
刘源龙1, 戴华1,2, 李张晨1, 周倩3, 易训4, 杨庚1,2
LIU Yuanlong1, DAI Hua1,2, LI Zhangchen1, ZHOU Qian3, YI Xun4, YANG Geng1,2
摘要: 随着云计算、大数据技术的不断发展,数据拥有者愈发倾向于将数据外包给云服务器。为了保证这些数据的安全,许多在云环境下进行的隐私保护密文检索技术被不断提出。但传统的隐私保护检索方案通常没有考虑关键词和文档之间的语义联系。为了解决这个问题,近年来,针对云环境的语义感知密文检索方案成为了研究的热点。针对基于云环境的语义感知密文检索问题,首先展示了现有研究工作主要采用的系统模型、安全模型和检索框架;接着按提取语义的核心技术对现有的语义感知密文检索方案进行分类并分别作研究和综述,阐述其优点与不足;最后,对现有研究工作进行总结,并对该领域未来的研究方向进行探讨。
中图分类号:
[1] SUN P.Security and Privacy Protection in Cloud Computing:Discussions and Challenges[J].Journal of Network and Computer Applications,2020,160:1-22. [2] LU J,XIAO R,JIN S.A Survey for Cloud Data Security[J].Journal of Electronics & Information Technology,2021,43(4):881-891. [3] PARAST K,SINDHAY C,NIKAM S,et al.Cloud Computing Security:A Survey of Service-based Models[J].Computers & Security,2022,114:1-14. [4] ALAHMAD S,KAHTAN H,ALZOUBI I,et al.Mobile Cloud Computing Models Security Issues:A Systematic Review[J].Journal of Network and Computer Applications,2021,190:1-17. [5] WANG T,LIANG Y,TIAN Y,et al.Solving Coupling Security Problem for Sustainable Sensor-cloud Systems based on Fog Computing[J].IEEE Transactions on Sustainable Computing,2021,6(1):43-53. [6] MTHUNZI N,BENKHELIFA E,BOSAKOWSKI T,et al.Cloud Computing Security Taxonomy:from an Atomistic to a Holistic View[J].Future Generation Computer Systems,2020,107:620-644. [7] ERMAKOVA T,FABIAN B,KORNACKA M,et al.Security and Privacy Requirements for Cloud Computing in Healthcare:Elicitation and Prioritization from a Patient Perspective[J].ACM Transactions on Management Information Systems,2020,11(2):1-29. [8] TIAN H,ZHANG Y,LI C,et al.A Survey of Confidentiality Protection for Cloud Databases[J].Chinese Journal of Compu-ters,2017,40(10):2245-2270. [9] HASSAN J,SHEHZAD D,HABIB U,et al.The rise of cloudcomputing:data protection,privacy,and open research challenges-a systematic literature review(SLR)[J].Computational Intelligence and Neuroscience,2022,2022:1-26. [10] CAO N,WANG C,LI M,et al.Privacy-preserving multi-key-word ranked search over encrypted cloud data[J].IEEE Tran-sactions on Parallel and Distributed Systems,2013,25(1):222-233. [11] SUN P J.Privacy protection and data security in cloud compu-ting:a survey,challenges,and solutions[J].IEEE Access,2019,7:147420-147452. [12] MELL P.The NIST Definition of Cloud Computing[J].Communications of the ACM,2010,53(6):50-50. [13] LI J W,JIA C F,LIU Z L.Survey on the Searchable Encryption[J].Journal of Software,2015,26(1):109-128. [14] DONG X L,ZHOU J,CAO Z F.Research Advances on SecureSearchable Encryption[J].Journal of Computer Research and Development,2017,54(10):2107-2120. [15] FU Z,SUN X,LINGE N,et al.Achieving effective cloud search services:multi-keyword ranked search over encrypted cloud data supporting synonym query[J].IEEE Transactions on Consumer Electronics,2014,60(1):164-172. [16] WONG W,CHEUNG D,KAO B,et al.Secure kNN computa-tion on encrypted databases[C]//Proceedings of the ACM SIGMOD International Conference on Management of Data.Providence:ACM,2009:139-152. [17] XIA Z,ZHU Y,SUN X,et al.Secure semanticexpansion based search over encrypted cloud data supporting similarity ranking[J].Journal of Cloud Computing Advances Systems & Applications,2014,3(1):1-11. [18] SUN X,ZHU Y,XIA Z,et al.Secure keyword-based ranked semantic search over encrypted cloud data[J].Proceedings of the Advanced Science and Technology Letters(MulGraB 2013),2013,31:271-283. [19] SUN X,ZHU Y,XIA Z,et al.Privacy-preserving keyword-based semantic search over encrypted cloud data[J].International Journal of Security and Its Applications,2014,8(3):9-20. [20] SAINI V,CHALLA R K,KHAN N S.An efficient multi-keyword synonym-based fuzzy ranked search over outsourced encrypted cloud data[C]//Advanced Computing andCommu-nication Technologies:Proceedings of the 9th ICACCT.Singapore:Springer,2016:433-441. [21] MOATAZ T,SHIKFA A,CUPPENS-BOULAHIA N,et al.Semantic search over encrypted data[C]//International Confe-rence on Telecommunications 2013.Casablanca:IEEE,2013:1-5. [22] MILLER G A.WordNet:a lexical database for English[J].Communications of the ACM,1995,38(11):39-41. [23] FU Z,SHU J,SUN X,et al.Smart cloud search services:verifiable keyword-based semantic search over encrypted cloud data[J].IEEE Transactions on Consumer Electronics,2014,60(4):762-770. [24] GUAN Z,LIU X,WU L,et al.Cross-lingual multi-keywordrank search with semantic extension over encrypted data[J].Information Sciences,2020,514:523-540. [25] LIU G,YANG G,BAI S,et al.FSSE:An effective fuzzy semantic searchable encryption scheme over encrypted cloud data[J].IEEE Access,2020,8:71893-71906. [26] YU J,LU P,ZHU Y,et al.Toward securemultikeyword top-kretrieval over encrypted cloud data[J].IEEE Transactions on Dependable and Secure Computing,2013,10(4):239-250. [27] MIRANDA-JIMENEZ S,GELBUKH A,SIDOROV G.Summarizing conceptual graphs for automatic summarization task[C]//Conceptual Structures for STEM Research and Education:20th International Conference on Conceptual Structures 2013.Mumbai:Springer,2013:245-253. [28] POH G S,MOHAMAD M S,ZABA M R.Structured encryption for conceptual graphs[C]//International Workshop on Security.Berlin:Springer,2012:105-122. [29] CHASE M,KAMARA S.Structured encryption and controlled disclosure[C]//Advances in Cryptology-ASIACRYPT 2010:16th International Conference on the Theory and Application of Cryptology and Information Security.Singapore:Springer,2010:577-594. [30] FU Z,HUANG F,SUN X,et al.Enabling semantic search based on conceptual graphs over encrypted outsourced data[J].IEEE Transactions on Services Computing,2016,12(5):813-823. [31] FU Z,HUANG F,REN K,et al.Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data[J].IEEE Transactions on Information Forensics and Security,2017,12(8):1874-1884. [32] FU Z,SUN X,JI S,et al.Towards efficient content-awaresearch over encrypted outsourced data in cloud[C]//IEEE INFOCOM 2016-The 35th Annual IEEE International Confe-rence on Computer Communications.San Francisco:IEEE,2016:1-9. [33] FU Z,XIA L,SUN X,et al.Semantic-aware searching over encrypted data for cloud computing[J].IEEE Transactions on Information Forensics and Security,2018,13(9):2359-2371. [34] MIKOLOV T,CHEN K,CORRADO G,et al.Efficient estimation of word representations in vector space[J].arXiv:1301.13781,2013. [35] LIU Y,FU Z.Secure search service based on word2vec in the public cloud[J].International Journal of Computational Science and Engineering,2019,18(3):305-313. [36] ZHANG Y,WANG Y,LI Y.Searchable public key encryption supporting semantic multi-keywords search[J].IEEE Access,2019,7:122078-122090. [37] CHEN L,XUE Y,MU Y,et al.CASE-SSE:Context-Aware Semantically Extensible Search-able Symmetric Encryption for Encrypted Cloud Data[J].IEEE Transactions on Services Computing,2022,16(2):1011-1022. [38] ZHANG M,CHEN Y,HUANG J.SE-PPFM:A searchable encryption scheme supporting privacy-preserving fuzzy multikeyword in cloud systems[J].IEEE Systems Journal,2020,15(2):2980-2988. [39] DAI X,DAI H,YANG G,et al.An efficient and dynamic semantic-aware multi keyword ranked search scheme over encrypted cloud data[J].IEEE Access,2019,7:142855-142865. [40] BLEI D M,NG A Y,JORDAN M I.Latent dirichlet allocation[J].Journal of Machine Learning Research,2003,3(Jan):993-1022. [41] DAI H,DAI X,YI X,et al.Semantic-aware Multi-keywordRanked Search Scheme over Encrypted Cloud Data[J].Journal of Network and Computer Applications,2019,147:102442. [42] DAI X,DAI H,RONG C,et al.Enhanced semantic-aware multi-keyword ranked search scheme over encrypted cloud data[J].IEEE Transactions on Cloud Computing,2020,10(4):2595-2612. [43] ZHOU Q,DAI H,HU Z,et al.Accuracy-first and efficiency-first privacy-preserving semantic-awa-re ranked searches in the cloud[J].International Journal of Intelligent Systems,2022,37(11):9213-9244. [44] ZHOU Q,DAI H,HU Z,et al.SAPMS:A Semantic-Aware Privacy-Preserving Multi-keyword Search Scheme in Cloud[C]//Asia-Pacific Web(APWeb) and Web-Age Information Management(WAIM) Joint International Conference on Web and Big Data.Nanjing:Springer,2022:251-263. [45] ZHOU Q,DAI H,LIU Y,et al.A novel semantic-aware search scheme based on BCI-tree index over encrypted cloud data[J].World Wide Web,2023,6:3055-3079. [46] KENTON J D M W C,TOUTANOVA L K.BERT:Pre-training of Deep Bidirectional Transformers for Language Understanding[C]//Proceedings of NAACL-HLT.Minneapolis:ACL,2019:4171-4186. [47] FU Z,WANG Y,SUN X,et al.Semantic and secure search over encrypted outsourcing cloud based on BERT[J].Frontiers of Computer Science,2022,16:1-8. [48] HU Z,DAI H,LIU Y,et al.CSMRS:An Efficient and Effective Semantic-aware Ranked Search Scheme over Encrypted Cloud Data[C]//2022 IEEE 25th International Conf-erence on Computer Supported Cooperative Work in Design(CSCWD).Hangzhou:IEEE,2022:699-704. [49] LANG B,WANG J,LI M,et al.Semantic-based compound keyword search over encrypted cloud data[J].IEEE Transactions on Services Computing,2018,14(3):850-863. [50] YANG W,ZHU Y.A verifiable semantic searching scheme by optimal matching over encrypted data in public cloud[J].IEEE Transactions on Information Forensics and Security,2020,16:100-115. [51] ZHAO L,CHEN L.A Linear Distinguisher and its Application for Analyzing Privacy-Preserving Transformation Used in Verifiable(Outsourced) Computation[C]//Proceedings of the 2018 on Asia Conference on Computer and Commu-nications Security.New York:Association for Computing Machinery,2018:253-260. |
|