Computer Science ›› 2024, Vol. 51 ›› Issue (11): 298-306.doi: 10.11896/jsjkx.231000111
• Information Security • Previous Articles Next Articles
LIU Yuanlong1, DAI Hua1,2, LI Zhangchen1, ZHOU Qian3, YI Xun4, YANG Geng1,2
CLC Number:
[1] SUN P.Security and Privacy Protection in Cloud Computing:Discussions and Challenges[J].Journal of Network and Computer Applications,2020,160:1-22. [2] LU J,XIAO R,JIN S.A Survey for Cloud Data Security[J].Journal of Electronics & Information Technology,2021,43(4):881-891. [3] PARAST K,SINDHAY C,NIKAM S,et al.Cloud Computing Security:A Survey of Service-based Models[J].Computers & Security,2022,114:1-14. [4] ALAHMAD S,KAHTAN H,ALZOUBI I,et al.Mobile Cloud Computing Models Security Issues:A Systematic Review[J].Journal of Network and Computer Applications,2021,190:1-17. [5] WANG T,LIANG Y,TIAN Y,et al.Solving Coupling Security Problem for Sustainable Sensor-cloud Systems based on Fog Computing[J].IEEE Transactions on Sustainable Computing,2021,6(1):43-53. [6] MTHUNZI N,BENKHELIFA E,BOSAKOWSKI T,et al.Cloud Computing Security Taxonomy:from an Atomistic to a Holistic View[J].Future Generation Computer Systems,2020,107:620-644. [7] ERMAKOVA T,FABIAN B,KORNACKA M,et al.Security and Privacy Requirements for Cloud Computing in Healthcare:Elicitation and Prioritization from a Patient Perspective[J].ACM Transactions on Management Information Systems,2020,11(2):1-29. [8] TIAN H,ZHANG Y,LI C,et al.A Survey of Confidentiality Protection for Cloud Databases[J].Chinese Journal of Compu-ters,2017,40(10):2245-2270. [9] HASSAN J,SHEHZAD D,HABIB U,et al.The rise of cloudcomputing:data protection,privacy,and open research challenges-a systematic literature review(SLR)[J].Computational Intelligence and Neuroscience,2022,2022:1-26. [10] CAO N,WANG C,LI M,et al.Privacy-preserving multi-key-word ranked search over encrypted cloud data[J].IEEE Tran-sactions on Parallel and Distributed Systems,2013,25(1):222-233. [11] SUN P J.Privacy protection and data security in cloud compu-ting:a survey,challenges,and solutions[J].IEEE Access,2019,7:147420-147452. [12] MELL P.The NIST Definition of Cloud Computing[J].Communications of the ACM,2010,53(6):50-50. [13] LI J W,JIA C F,LIU Z L.Survey on the Searchable Encryption[J].Journal of Software,2015,26(1):109-128. [14] DONG X L,ZHOU J,CAO Z F.Research Advances on SecureSearchable Encryption[J].Journal of Computer Research and Development,2017,54(10):2107-2120. [15] FU Z,SUN X,LINGE N,et al.Achieving effective cloud search services:multi-keyword ranked search over encrypted cloud data supporting synonym query[J].IEEE Transactions on Consumer Electronics,2014,60(1):164-172. [16] WONG W,CHEUNG D,KAO B,et al.Secure kNN computa-tion on encrypted databases[C]//Proceedings of the ACM SIGMOD International Conference on Management of Data.Providence:ACM,2009:139-152. [17] XIA Z,ZHU Y,SUN X,et al.Secure semanticexpansion based search over encrypted cloud data supporting similarity ranking[J].Journal of Cloud Computing Advances Systems & Applications,2014,3(1):1-11. [18] SUN X,ZHU Y,XIA Z,et al.Secure keyword-based ranked semantic search over encrypted cloud data[J].Proceedings of the Advanced Science and Technology Letters(MulGraB 2013),2013,31:271-283. [19] SUN X,ZHU Y,XIA Z,et al.Privacy-preserving keyword-based semantic search over encrypted cloud data[J].International Journal of Security and Its Applications,2014,8(3):9-20. [20] SAINI V,CHALLA R K,KHAN N S.An efficient multi-keyword synonym-based fuzzy ranked search over outsourced encrypted cloud data[C]//Advanced Computing andCommu-nication Technologies:Proceedings of the 9th ICACCT.Singapore:Springer,2016:433-441. [21] MOATAZ T,SHIKFA A,CUPPENS-BOULAHIA N,et al.Semantic search over encrypted data[C]//International Confe-rence on Telecommunications 2013.Casablanca:IEEE,2013:1-5. [22] MILLER G A.WordNet:a lexical database for English[J].Communications of the ACM,1995,38(11):39-41. [23] FU Z,SHU J,SUN X,et al.Smart cloud search services:verifiable keyword-based semantic search over encrypted cloud data[J].IEEE Transactions on Consumer Electronics,2014,60(4):762-770. [24] GUAN Z,LIU X,WU L,et al.Cross-lingual multi-keywordrank search with semantic extension over encrypted data[J].Information Sciences,2020,514:523-540. [25] LIU G,YANG G,BAI S,et al.FSSE:An effective fuzzy semantic searchable encryption scheme over encrypted cloud data[J].IEEE Access,2020,8:71893-71906. [26] YU J,LU P,ZHU Y,et al.Toward securemultikeyword top-kretrieval over encrypted cloud data[J].IEEE Transactions on Dependable and Secure Computing,2013,10(4):239-250. [27] MIRANDA-JIMENEZ S,GELBUKH A,SIDOROV G.Summarizing conceptual graphs for automatic summarization task[C]//Conceptual Structures for STEM Research and Education:20th International Conference on Conceptual Structures 2013.Mumbai:Springer,2013:245-253. [28] POH G S,MOHAMAD M S,ZABA M R.Structured encryption for conceptual graphs[C]//International Workshop on Security.Berlin:Springer,2012:105-122. [29] CHASE M,KAMARA S.Structured encryption and controlled disclosure[C]//Advances in Cryptology-ASIACRYPT 2010:16th International Conference on the Theory and Application of Cryptology and Information Security.Singapore:Springer,2010:577-594. [30] FU Z,HUANG F,SUN X,et al.Enabling semantic search based on conceptual graphs over encrypted outsourced data[J].IEEE Transactions on Services Computing,2016,12(5):813-823. [31] FU Z,HUANG F,REN K,et al.Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data[J].IEEE Transactions on Information Forensics and Security,2017,12(8):1874-1884. [32] FU Z,SUN X,JI S,et al.Towards efficient content-awaresearch over encrypted outsourced data in cloud[C]//IEEE INFOCOM 2016-The 35th Annual IEEE International Confe-rence on Computer Communications.San Francisco:IEEE,2016:1-9. [33] FU Z,XIA L,SUN X,et al.Semantic-aware searching over encrypted data for cloud computing[J].IEEE Transactions on Information Forensics and Security,2018,13(9):2359-2371. [34] MIKOLOV T,CHEN K,CORRADO G,et al.Efficient estimation of word representations in vector space[J].arXiv:1301.13781,2013. [35] LIU Y,FU Z.Secure search service based on word2vec in the public cloud[J].International Journal of Computational Science and Engineering,2019,18(3):305-313. [36] ZHANG Y,WANG Y,LI Y.Searchable public key encryption supporting semantic multi-keywords search[J].IEEE Access,2019,7:122078-122090. [37] CHEN L,XUE Y,MU Y,et al.CASE-SSE:Context-Aware Semantically Extensible Search-able Symmetric Encryption for Encrypted Cloud Data[J].IEEE Transactions on Services Computing,2022,16(2):1011-1022. [38] ZHANG M,CHEN Y,HUANG J.SE-PPFM:A searchable encryption scheme supporting privacy-preserving fuzzy multikeyword in cloud systems[J].IEEE Systems Journal,2020,15(2):2980-2988. [39] DAI X,DAI H,YANG G,et al.An efficient and dynamic semantic-aware multi keyword ranked search scheme over encrypted cloud data[J].IEEE Access,2019,7:142855-142865. [40] BLEI D M,NG A Y,JORDAN M I.Latent dirichlet allocation[J].Journal of Machine Learning Research,2003,3(Jan):993-1022. [41] DAI H,DAI X,YI X,et al.Semantic-aware Multi-keywordRanked Search Scheme over Encrypted Cloud Data[J].Journal of Network and Computer Applications,2019,147:102442. [42] DAI X,DAI H,RONG C,et al.Enhanced semantic-aware multi-keyword ranked search scheme over encrypted cloud data[J].IEEE Transactions on Cloud Computing,2020,10(4):2595-2612. [43] ZHOU Q,DAI H,HU Z,et al.Accuracy-first and efficiency-first privacy-preserving semantic-awa-re ranked searches in the cloud[J].International Journal of Intelligent Systems,2022,37(11):9213-9244. [44] ZHOU Q,DAI H,HU Z,et al.SAPMS:A Semantic-Aware Privacy-Preserving Multi-keyword Search Scheme in Cloud[C]//Asia-Pacific Web(APWeb) and Web-Age Information Management(WAIM) Joint International Conference on Web and Big Data.Nanjing:Springer,2022:251-263. [45] ZHOU Q,DAI H,LIU Y,et al.A novel semantic-aware search scheme based on BCI-tree index over encrypted cloud data[J].World Wide Web,2023,6:3055-3079. [46] KENTON J D M W C,TOUTANOVA L K.BERT:Pre-training of Deep Bidirectional Transformers for Language Understanding[C]//Proceedings of NAACL-HLT.Minneapolis:ACL,2019:4171-4186. [47] FU Z,WANG Y,SUN X,et al.Semantic and secure search over encrypted outsourcing cloud based on BERT[J].Frontiers of Computer Science,2022,16:1-8. [48] HU Z,DAI H,LIU Y,et al.CSMRS:An Efficient and Effective Semantic-aware Ranked Search Scheme over Encrypted Cloud Data[C]//2022 IEEE 25th International Conf-erence on Computer Supported Cooperative Work in Design(CSCWD).Hangzhou:IEEE,2022:699-704. [49] LANG B,WANG J,LI M,et al.Semantic-based compound keyword search over encrypted cloud data[J].IEEE Transactions on Services Computing,2018,14(3):850-863. [50] YANG W,ZHU Y.A verifiable semantic searching scheme by optimal matching over encrypted data in public cloud[J].IEEE Transactions on Information Forensics and Security,2020,16:100-115. [51] ZHAO L,CHEN L.A Linear Distinguisher and its Application for Analyzing Privacy-Preserving Transformation Used in Verifiable(Outsourced) Computation[C]//Proceedings of the 2018 on Asia Conference on Computer and Commu-nications Security.New York:Association for Computing Machinery,2018:253-260. |
[1] | LI Zhi, LIN Sen, ZHANG Qiang. Edge Cloud Computing Approach for Intelligent Fault Detection in Rail Transit [J]. Computer Science, 2024, 51(9): 331-337. |
[2] | FU Yanming, ZHANG Siyuan. Privacy Incentive Mechanism for Mobile Crowd-sensing with Comprehensive Scoring [J]. Computer Science, 2024, 51(7): 397-404. |
[3] | WANG Tian, SHEN Wei, ZHANG Gongxuan, XU Linli, WANG Zhen, YUN Yu. Soft Real-time Cloud Service Request Scheduling and Multiserver System Configuration for ProfitOptimization [J]. Computer Science, 2024, 51(6A): 230900099-10. |
[4] | LAN Yajie, MA Ziqiang, CHEN Jiali, MIAO Li, XU Xin. Survey on Application of Searchable Attribute-based Encryption Technology Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230800016-14. |
[5] | SUN Min, DING Xining, CHENG Qian. Federated Learning Scheme Based on Differential Privacy [J]. Computer Science, 2024, 51(6A): 230600211-6. |
[6] | TAN Zhiwen, XU Ruzhi, WANG Naiyu, LUO Dan. Differential Privacy Federated Learning Method Based on Knowledge Distillation [J]. Computer Science, 2024, 51(6A): 230600002-8. |
[7] | WANG Chenzhuo, LU Yanrong, SHEN Jian. Study on Fingerprint Recognition Algorithm for Fairness in Federated Learning [J]. Computer Science, 2024, 51(6A): 230800043-9. |
[8] | SHAO Tong, LI Chuan, XUE Lei, LIU Yang, ZHAO Ning, CHEN Qing. Forward and Backward Secure Dynamic Searchable Encryption Schemes Based on vORAM [J]. Computer Science, 2024, 51(6A): 230500098-9. |
[9] | TANG Xin, DI Nongyu, YANG Hao, LIU Xin. Optimum Proposal to secGear Based on Skiplist [J]. Computer Science, 2024, 51(6A): 230700030-5. |
[10] | HAN Yujie, XU Zhijie, YANG Dingyu, HUANG Bo, GUO Jianmei. CDES:Data-driven Efficiency Evaluation Methodology for Cloud Database [J]. Computer Science, 2024, 51(6): 111-117. |
[11] | XU Yicheng, DAI Chaofan, MA Wubin, WU Yahui, ZHOU Haohao, LU Chenyang. Particle Swarm Optimization-based Federated Learning Method for Heterogeneous Data [J]. Computer Science, 2024, 51(6): 391-398. |
[12] | LIU Daoqing, HU Hongchao, HUO Shumin. N-variant Architecture for Container Runtime Security Threats [J]. Computer Science, 2024, 51(6): 399-408. |
[13] | WANG Dong, LI Zheng, XIAO Bingbing. Blockchain Coin Mixing Scheme Based on Homomorphic Encryption [J]. Computer Science, 2024, 51(3): 335-339. |
[14] | XU Chengzhi, XU Lei, XU Chungen. Dynamic Searchable Symmetric Encryption Based on Protected Search Mode of Updatable Encryption [J]. Computer Science, 2024, 51(3): 340-350. |
[15] | YOU Feifu, CAI Jianping, SUN Lan. Census Associated Multiple Attributes Data Release Based on Differential Privacy [J]. Computer Science, 2024, 51(3): 368-377. |
|