计算机科学 ›› 2015, Vol. 42 ›› Issue (3): 136-139.doi: 10.11896/j.issn.1002-137X.2015.03.028
方忠进,周 舒,夏志华
FANG Zhong-jin, ZHOU Shu and XIA Zhi-hua
摘要: 随着个人和企业用户产生的数据量越来越多,云存储的价格便宜、存储空间使用灵活等优势也越来越明显。随着大量的数据外包到云服务器端,用户一般采用加密方法实现对敏感数据的保护和使用限制,这使得传统的基于明文的搜索方案不再适用。如何在保护隐私的基础上实现高效的数据文件搜索是首要考虑的问题。在已有的加密数据搜索方案的基础上,分析中文所特有的模糊音和多义的特点,利用中文和英文实现关键词的同义词构建,并建立关键词的模糊音词和同义词集合,提出了基于关键词的加密云数据模糊搜索方案,实现了对中文模糊音和同义关键词的搜索并利用伪随机函数对私钥进行保护。最后通过安全性分析和系统实验验证了该方案具有较高的安全性、良好的实用性和较高的搜索成功率。
[1] Song D,Wagner D,Perrig A.Practical Techniques for Searches on Encrypted Data[C]∥Proceedings of IEEE Symposium on Security and Privacy.2000:44-55 [2] Goh E J.Secure Indexes.Cryptology ePrint Archive,Report2003/216.http://eprint.iacr.org/,2003 [3] Chow R,Golle P,Jakobsson M,et al.Controlling Data in theCloud:Outsourcing Computation without Outsourcing Control[C]∥Proceedings of ACM Workshop on Cloud Computing Security (CCSW’09).New York,2009:85-90 [4] Boneh D,Crescenzo G D,Ostrovsky R,et al.Public Key Encryption with Keyword Search[C]∥Proceedings of International Conference on Theory and Applications of Cryptographic Techniques (Eurocrypt’04).Interlaken,Switzerland,Vol.3027,2004:506-522 [5] 李春艳,张学杰.基于基准测试的高性能计算云研究[J].计算机科学,2013,40(12):23-30 [6] Li J,Wang Q,Wang C,et al.Fuzzy keyword search over en-crypted data in cloud computing[C]∥Proc.of IEEE INFOCOM,Mini-Conference.2010:441-445 [7] Hwang Y H,Lee P J.Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System[C]∥Proceedings of International Conference on Pairing-Based Cryptography (Pairing’07).2007:2-22 [8] Ballard L,Kamara S,Monrose F.Achieving Efficient Conjunctive Keyword Searches over Encrypted Data[C]∥Proceedings of International Conference on Information and Communications Security (ICICS’05).Vol.3783,2005:414-426 [9] Boneh D,Waters B.Conjunctive,Subset,and Range Queries on Encrypted Data[C]∥Proceedings of TCC’07.2007:535-554 [10] 林闯,苏文博,孟坤,等.云计算安全:架构、机制与模型评价[J].计算机学报,2013,36(9):1765-1784 [11] Li J,Wang Q,Wang C,et al.Fuzzy Keyword Search over Encrypted Data in Cloud Computing[C]∥IEEE INFOCOM 2010 Mini-Conference.San Diego,CA,March 2010 [12] Cao N,Wang C,Li M,et al.Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data[C]∥Proceedings of IEEE INFOCOM 2011.2011:829-837 [13] Hore B,Mehrotra S,Canim M,et al.Secure multidimensionalrange queries over outsourced data[J].The VLDB Journal, 2012(21):333-358 [14] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83 [15] Wang Peng,Ravishankar C V.Secure and Efficient Range Queries on Outsourced Databases Using R-trees[C]∥ICDE Conference.2013:314-325 [16] Curtmola R,Garay J A,Kamara S,et al.Searchable symmetric encryption:improved definitions and efficient constructions [C]∥Proc.of ACM CCS.2006:79-88 [17] Golle P,Staddon J,Waters B.Secure Conjunctive Keyword Search over Encrypted Data[C]∥Proceedings of Applied Cryptography and Network Security Conference (ACNS’04).2004:31-45 |
No related articles found! |
|