计算机科学 ›› 2013, Vol. 40 ›› Issue (11): 131-136.

• 信息安全 • 上一篇    下一篇

云环境中基于多属性排序的密文检索方案

冯贵兰,谭良   

  1. 四川师范大学计算机学院 成都610101;四川师范大学计算机学院 成都610101
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金(60970113),国家自然科学基金青年基金(60903073),四川省教育厅青年基金项目(08zb02)和四川师范大学校级项目(11KYL03)资助

Multi-attribute Ranked Keyword Search over Encrypted Cloud Data

FENG Gui-lan and TAN Liang   

  • Online:2018-11-16 Published:2018-11-16

摘要: 密文检索是云提供数据加密存储服务的重要辅助功能。目前云环境中密文检索的排序搜索算法只根据关键词的单一局部属性进行文档相关性分数计算,因此存在查准率不高的问题。针对这个问题设计了一种基于多属性排序的密文检索方案,其思想是首先通过文档关键词的局部属性和全局属性构建多属性特征向量安全索引,其次根据用户选择的排序方式确定各局部属性和全局属性的权值,然后调用多属性评分公式进行文档相关性分数计算,最后根据分数排序返回用户最感兴趣的检索结果。实验表明,该方法能够有效提高检索速度和检索结果的准确性。

关键词: 数据加密,密文检索,云计算,多属性排序

Abstract: Searching on encrypted data is an important auxiliary function for cloud.Confidentiality-preserving rank-ordered search algorithm computes document relevance scores with one keyword local attribute,so its precision is low.To solve this problem,a multi-attribute ranked keyword search over encrypted cloud data was introduced.Firstly,cloud service provider(CSP)builds secure index of multi-attribute feature vector based on keyword local and global attributes.Secondly,the local attribute and global attribute weights are determined by users’ sort-by.And then,relevance score is calculated by multi-attribute ranking formula.Finally,CSP will return the interested results for the user.Experiments show that the method can improve the retrieval speed and the accuracy of search results effectively.

Key words: Data encryption,Search on encrypted data,Cloud computing,Multi-attribute ranked

[1] 张建勋,古志民,郑超.云计算研究进展综述[J].计算机应用研究,2010,27(2):429-433
[2] Amazon Elastic Compute Cloud(EC2).http://www.amazon.com/ec2/,2008-07-18
[3] Google App Engine.http://appengine.google.com [18 Jul 2008]
[4] Microsoft Live Mesh.http://www.mesh.com,2008-07-18
[5] Kamara S,Lauter K.Cryptographic cloud storage[C]∥Procee-dings of Financial Cryptography:Workshop on Real-Life CryptographicProtocols and Standardization 2010.January 2010
[6] Huang R W,Gui X L,Yu S,et al.Study of privacy preservingframework for cloud storage[J].Computer Scienceand Information Systems,2011,8(3):801-819
[7] Song D,Wagner D,Perrig A.Practical techniques for searcheson encrypted data[C]∥Proc.of IEEE Symposium on Security andPrivacy’00.2000
[8] Boneh D,Crescenzo G D,Ostrovsky R,et al.Public keyencryption with keyword search[C]∥Proc.of EUROCRYP’04,vo-lume3027 of LNCS.Springer,2004
[9] Gentry C.Fully homomorphic encryption using ideal lattices[C]∥Proceedings of the 41st ACM Symposiumon Theory of Computing(STOC''09).Bethesda,Maryland,USA,2009:169-178
[10] Gentry C.Computing arbitrary functions of encrypted data[J].Communications of the ACM,2010,53(3):97
[11] Swaminathan A,Mao Y,Su G-M,et al.Confidentiality-preserving rank-ordered search[C]∥Proc.of the Workshop on Storage Security and Survivability.2007
[12] Boldyreva A,Chenette N,Lee Y,et al.Order-preservingsymme-tric encryption[C]∥Proceedings of Eurocrypt’09,volume 5479of LNCS.Springer,2009
[13] Wang C,Cao N,Li J,et al.Secure ranked keywordsearch over encrypted cloud data[C]∥Proc.of ICDCS’10.2010
[14] Salton G,Wong A,Yang C S.A Vector Space Model for Automatic Indexing[J].Communications of the ACM,1975,18:613-620
[15] Zobel J,Moffat A.Inverted files for text search engines [J].ACM Computing Surverys,2006,38(2):16-31
[16] Rieardo B Y,Berthier R N.ModernInformationRetrieval[M].NewYork:ACM Press,1999,192:5-10
[17] Salton G,Clement T Y.On The Construction of Effective Vocabularies for Information Retrival[C]∥Proceeding of The 1973Meeting on Programming Languages and Information Retrieval.New York,ACM,1973:11

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!