期刊文献+

基于错检期望值的密文索引技术 被引量:5

Cryptograph Index Technology Based on Wrong Hit Expectation
下载PDF
导出
摘要 如何提高密文数据库的查询效率是数据库加密技术面临的一个主要问题.密文索引技术是提高数据库中密文查询效率的手段之一,但现有的密文索引方法存在查询命中率低和信息泄露衡量问题.本文首先根据查询概率的实际分布情况,提出整体错检期望值的概念,以此为基础提出一种适用于非等概率查询的复合桶划分密文索引技术,并给出了相应的密文查询策略.然后,针对密文索引的信息泄露问题给出衡量和消减方法.最后,通过实验对算法进行了分析和验证. How to improve the query efficiency in cryptograph database is a primary problem of database encryption technology. Cryptograph index technology is one of the methods to improve cryptograph query efficiency in database, but there are many problems in cryptograph index methods such as low query hit rate and information disclosure measure. At first, basing on the actual distribute condition of query probability, the conception of whole-wrong-hit expectation is proposed, and a complex-bucket-partition cryptograph index technology that adapts for unequal-probability query and cryptograph query strategy are proposed. Then, a measure and an elimination method are presented focus on the detecting problem of cryptograph index. Finally, the algorithm is analyzed and validated by experiments.
出处 《小型微型计算机系统》 CSCD 北大核心 2010年第1期113-118,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60773100)资助 国家"十一五"规划项目(2006BAK05B02)资助 河北省自然科学基金(F2009000475)资助
关键词 密文索引 桶划分 错检期望值 密文查询 K-匿名 cryptograph index bucket partitioning wrong hit expectation cryptograph query k-anonymity
  • 相关文献

参考文献12

二级参考文献70

  • 1戴一奇,尚杰,陈卫,苏中民.一种新的数据库加密密钥管理方案[J].清华大学学报(自然科学版),1995,35(4):43-47. 被引量:17
  • 2于涵,赵亮,徐伟军,牛夏牧,沈昌祥.一种新的数据库加密及密文索引方法研究[J].电子学报,2005,33(B12):2539-2542. 被引量:5
  • 3杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 4戴一奇,尚杰,苏中民.密文数据库的快速检索[J].清华大学学报(自然科学版),1997,37(4):24-27. 被引量:21
  • 5戴一奇,清华大学学报,1995年,35卷,4期,43页
  • 6陈卫,清华大学学报,1994年,34卷,1期,99页
  • 7Song D X, Wagner D, Perrig A. Practical Techniques for Searches on Encrypted Data. In: Reiter M, Needham R, Eds. Proceedings of 2000IEEE Symposium on Security and Privacy. Berlin/Heidelberg:Springer-Verlag, 2000:44-55.
  • 8Denning D E. Field Encryption and Authentication. In: Chaum D, Ed.Advances in Cryptology-Crypto'83. Berlin/Heidelberg: Springer-Verlag, 1984:231-247.
  • 9Ahitub N, Lapid Y, Nenmann S. Processing encrypted data[ J]. Communications of the ACM, 1987,30 ( 9 ) : 777 -785.
  • 10Rivest R L, Adleman L, Dertouzous M L. On data banks and privacy homomorphisms [ A ]. Foundations of Secure Computations [ C ]. Academic Press, 1978. 169 - 179.

共引文献72

同被引文献46

  • 1王元珍,冯超.数据库加密系统的研究与实现[J].计算机工程与应用,2005,41(8):170-172. 被引量:44
  • 2朱勤,于守健,乐嘉锦,骆轶姝.外包数据库系统安全机制研究[J].计算机科学,2007,34(2):152-156. 被引量:17
  • 3Melnik S, Raghavan S, Yang B. Building a distributed full-text index for the web[J]. ACM Transactions on Information Systems, 2001, 19(3): 217-241.
  • 4Goh E J, Shacham H, Modadugu N, et al. Securing remote untrusted storage [C]// Proceedings of the 10th Network and Distributed System Security (NDSS 2003). San Diego, California, USA, 2003: 131-145.
  • 5Song D, Wagner D, Perrig A. Practical techniques for searches on encrypted data[C]// Proceedings of IEEE Symposium on Security and Privacy (S&P 2000). Berkeley, California, USA, 2000:44-55.
  • 6Boneh D, Crescenzo G D, Ostrovsky R, et al. Public- key encryption with keyword search[C] // Proceedings of 23rd Annual Eurocrypt Conference. Interlaken, Switzerland, 2004: 506-522.
  • 7Ning Cao, Cong Wang, Ming Li, et al. Privacy-pre- serving multi-keyword ranked search over encrypted cloud data [C]// IEEE INFOCOM 2011. Shanghai, China, 2011: 829-837.
  • 8Guoqiang Gao, Ruixuan Li, Xiwu Gu, et al. Mimir: term-distributed indexing and search for secret docu- ments[C]// The 6th International Conference on Col- laborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010). Chicago, IL, USA, 2010: 1-9.
  • 9HACIGUMUS H, IYER B, LIChen, et al. Executing SQL over en- crypted data in the database-service-provider model[ C ]//Proc ofACM SIGMOD International Conference on Management of data. New York : ACM Press,2002:216-227.
  • 10GENTRY C. Fully homomorphic encryption using ideal lattices[ C]/! Proc of the 41st Annual ACM Symposium on Theory of Computing. New York :ACM Press ,2009 : 169-178.

引证文献5

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部