[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

计算机科学 ›› 2015, Vol. 42 ›› Issue (3): 136-139.doi: 10.11896/j.issn.1002-137X.2015.03.028

• 信息安全 • 上一篇    下一篇

基于关键词的加密云数据模糊搜索策略研究

方忠进,周 舒,夏志华   

  1. 南京信息工程大学计算机与软件学院 南京210044;南京信息工程大学滨江学院 南京210044;南京信息工程大学江苏省网络监控工程中心 南京210044,南京信息工程大学计算机与软件学院 南京210044;南京信息工程大学江苏省网络监控工程中心 南京210044,南京信息工程大学计算机与软件学院 南京210044;南京信息工程大学江苏省网络监控工程中心 南京210044
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金(61173141),江苏省普通高校研究生科研创新计划项目(CXZZ12_0512),江苏省网络监控工程中心开放基金课题资助

Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords

FANG Zhong-jin, ZHOU Shu and XIA Zhi-hua   

  • Online:2018-11-14 Published:2018-11-14

摘要: 随着个人和企业用户产生的数据量越来越多,云存储的价格便宜、存储空间使用灵活等优势也越来越明显。随着大量的数据外包到云服务器端,用户一般采用加密方法实现对敏感数据的保护和使用限制,这使得传统的基于明文的搜索方案不再适用。如何在保护隐私的基础上实现高效的数据文件搜索是首要考虑的问题。在已有的加密数据搜索方案的基础上,分析中文所特有的模糊音和多义的特点,利用中文和英文实现关键词的同义词构建,并建立关键词的模糊音词和同义词集合,提出了基于关键词的加密云数据模糊搜索方案,实现了对中文模糊音和同义关键词的搜索并利用伪随机函数对私钥进行保护。最后通过安全性分析和系统实验验证了该方案具有较高的安全性、良好的实用性和较高的搜索成功率。

关键词: 云存储,模糊搜索,关键词,同义词,加密搜索

Abstract: With the increasing amount of data generated by individuals and business users,the advantages of cloud sto-rage such as lower price and flexible use of storage space are obvious.As a large amount of data are outsourced to the cloud server,encryption methods are used to achieve protection and limitations of sensitive data generally.It makes traditional search scheme based on plaintext no longer applicable.How to achieve efficient file search on the basis of privacy protection is the primary consideration.On the basis of the existing encrypted data search schemes,Chinese characteristics of homophone and polysemy were analyzed,and synonyms of keyword were constructed using Chinese and English,and the sets were constructed respectively.Fuzzy search scheme over encrypted cloud data based on keywords was proposed.Search of Chinese fuzzy pinyin and synonyms is achieved,and the private key is protected by pseudo-random function.High security,good practicability and high searching success rate of the system were verified by security analysis and system experiment.

Key words: Cloud storage,Fuzzy search,Keywords,Synonyms,Searchable encryption

[1] Song D,Wagner D,Perrig A.Practical Techniques for Searches on Encrypted Data[C]∥Proceedings of IEEE Symposium on Security and Privacy.2000:44-55
[2] Goh E J.Secure Indexes.Cryptology ePrint Archive,Report2003/216.http://eprint.iacr.org/,2003
[3] Chow R,Golle P,Jakobsson M,et al.Controlling Data in theCloud:Outsourcing Computation without Outsourcing Control[C]∥Proceedings of ACM Workshop on Cloud Computing Security (CCSW’09).New York,2009:85-90
[4] Boneh D,Crescenzo G D,Ostrovsky R,et al.Public Key Encryption with Keyword Search[C]∥Proceedings of International Conference on Theory and Applications of Cryptographic Techniques (Eurocrypt’04).Interlaken,Switzerland,Vol.3027,2004:506-522
[5] 李春艳,张学杰.基于基准测试的高性能计算云研究[J].计算机科学,2013,40(12):23-30
[6] Li J,Wang Q,Wang C,et al.Fuzzy keyword search over en-crypted data in cloud computing[C]∥Proc.of IEEE INFOCOM,Mini-Conference.2010:441-445
[7] Hwang Y H,Lee P J.Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System[C]∥Proceedings of International Conference on Pairing-Based Cryptography (Pairing’07).2007:2-22
[8] Ballard L,Kamara S,Monrose F.Achieving Efficient Conjunctive Keyword Searches over Encrypted Data[C]∥Proceedings of International Conference on Information and Communications Security (ICICS’05).Vol.3783,2005:414-426
[9] Boneh D,Waters B.Conjunctive,Subset,and Range Queries on Encrypted Data[C]∥Proceedings of TCC’07.2007:535-554
[10] 林闯,苏文博,孟坤,等.云计算安全:架构、机制与模型评价[J].计算机学报,2013,36(9):1765-1784
[11] Li J,Wang Q,Wang C,et al.Fuzzy Keyword Search over Encrypted Data in Cloud Computing[C]∥IEEE INFOCOM 2010 Mini-Conference.San Diego,CA,March 2010
[12] Cao N,Wang C,Li M,et al.Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data[C]∥Proceedings of IEEE INFOCOM 2011.2011:829-837
[13] Hore B,Mehrotra S,Canim M,et al.Secure multidimensionalrange queries over outsourced data[J].The VLDB Journal, 2012(21):333-358
[14] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83
[15] Wang Peng,Ravishankar C V.Secure and Efficient Range Queries on Outsourced Databases Using R-trees[C]∥ICDE Conference.2013:314-325
[16] Curtmola R,Garay J A,Kamara S,et al.Searchable symmetric encryption:improved definitions and efficient constructions [C]∥Proc.of ACM CCS.2006:79-88
[17] Golle P,Staddon J,Waters B.Secure Conjunctive Keyword Search over Encrypted Data[C]∥Proceedings of Applied Cryptography and Network Security Conference (ACNS’04).2004:31-45

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!