计算机科学 ›› 2017, Vol. 44 ›› Issue (1): 149-154.doi: 10.11896/j.issn.1002-137X.2017.01.029
那海洋,杨庚,束晓伟
NA Hai-yang, YANG Geng and SHU Xiao-wei
摘要: 针对当前社会信息量大、隐私信息需要加密存储带来的检索难度大等问题,研究分析了现有的基于密文的可搜索加密方案,提出了一种基于B+树的多关键字密文排序方法。利用向量模型构建索引和查询陷门,根据相关性分数和关键字匹配度对检索结果进行排序。在真实数据集上进行了实验,结果证明本方案具有较高的检索效率。
[1] FENG Chao-sheng,QIN Zhi-guang,YUAN Ding.Techniques of Secure Storage for Cloud Data[J].Chinese Journal of Compu-ters,2015,38(1):150-163.(in Chinese) 冯朝胜,秦志光,袁丁.数据安全存储技术[J].计算机学报,2015,8(1):150-163. [2] SHEN Zhi-rong,XUE Wei,SHU Ji-wu.Surveyon the Research and Development of Searchable Encryption Schemes[J].Journal of Software,2014,25(4):880-895.(in Chinese) 沈志荣,薛巍,舒继武.可搜索加密机制研究与进展[J].软件学报,2014,25(4):880-895. [3] SONG D X,WAGNER D,PERRING A.Practical Techniquesfor Searches on Encrypted Data[C]∥IEEE Symposium on Security and Privacy,2000:44-55. [4] CURTMOLA R,GARAY J,KAMARA S,et al.Searchablesymmetric encryption:Improved definitions and efficient constructions[C]∥Proc of the 13th ACM Conference on Computer and Communications Security.New York:ACM,2006:79-88. [5] CAO Ning,WANG Cong,LI Ming,et al.Privacy-PreservingMulti-Keyword Ranked Search over Encrypted Cloud Data[C]∥Proc of INFOCOM.Shanghai:IEEE.2011:829-837. [6] WONG W K,CHEUNG W L,KAO B,et al.Secure kNN computation on encrypted databases[C]∥Proc of SIGMOD.New York:ACM,2009:139-152. [7] CHENG Fang-quan,PENG Zhi-yong,SONG Wei,et al.An Efficient Privacy-Preserving Rank Query over Encrypted Data in Cloud Computing[J].Chinese Journal of Computers,2012,35(11):2215-2227.(in Chinese) 程芳权,彭智勇,宋伟,等.云环境下一种隐私保护的高效密文排序查询方法[J].计算机学报,2012,35(11):2215-2227. [8] ZHANG Wei,XIAO Sheng,LIN Ya-ping,et al.Secure Ranked Multi-keyword Search for Multiple Data Owners in Cloud Computing[C]∥Proc of Dependable Systems and Networks (DSN).Atlanta:IEEE,2014:276-286. [9] IBRAHIM A,JIN H,YASSIN A,et al.Secure Rank-orderedSearch of Multi-keyword Trapdoor over Encrypted Cloud Data[C]∥Proc of Services Computing Conference (APSCC).Guilin:IEEE,2012:263-270. [10] KAMARA S,PAPAMANTHOU C.Parallel and Dynamic Sea-rchable Symmetric Encryption[M]∥Financial Cryptography and Data Security.Berlin:Springer Berlin Heidelberg,2013:258-274. [11] XIA Zhi-hua,WANG Xin-hui,SUN Xing-ming,et al.A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data[J].IEEE Transactions on Parallel and Distributed Systems,2016,7(2):340-352. [12] WANG Cong,CAO Ning,REN Kui,et al.Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data[J].IEEE Transactions on Parallel and Distributed Systems,2012,3(8):1467-1479. [13] SUN Wen-hai,WANG Bing,CAO Ning,et al.Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking[J].IEEE Transactions on Parallel and Distributed Systems,2013,25(11):3025-3035. [14] ZHANG Wei,LIN Ya-ping,XIAO Sheng,et al.Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing[J].IEEE Transactions on Computers, 2016,5(5):1566-1577 . [15] ZERR S,OLMEDILLA D,NEJDL W,et al.Zerber+R:Top-k retrieval from a confidential index[C]∥Proc of EDBT.New York:ACM,2009:439-449. [16] Lucene3.5.http://jakarta.apache.org/lucene. [17] LI Hong-wei,YANG Yi,TOM L,et al.Enabling Fine-grainedMulti-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data[J].IEEE Transactions on Dependable and Secure Computing,2016,13(3):312-325. |
No related articles found! |
|