期刊文献+

一种云计算环境下的加密模糊检索方案 被引量:4

Vague-keyword Search under Encrypted Environment in Cloud Computing
下载PDF
导出
摘要 随着移动终端的发展,云计算也越来越普及,很多敏感数据被集中存储到云存储器上。为了保证数据的私密性,这些数据在上传时应该经过加密,这就使得传统数据检索方案的可行性降低。一些在加密环境下的数据检索方案,只能处理准确的关键字检索,对于拼写错误、格式错误的情况则无法进行正常查询,因此不适用于云计算。提出了一种基于k-gram索引的模糊关键字在加密环境下的检索方案。这种方案可以提供一种安全、高效的数据存取服务。 As there is a significant development in potable devices market recently,cloud computing is more commonly implemented.Confidential datas are accumulated and stored in cloud servers.To ensure the datas are secured,they should be encrypted when being uploaded,which makes efficient searching among them a much complicated task.Traditional searching programmes in encrypted environments are able to find the data only if the keywords is exactly correct,but will fail if spelling errors or format errors occur.These programmes are hence not suitable for cloud computing.We introduced a high efficiency programme which can deal with even vague keyword searching in the encrypted environment.
出处 《计算机科学》 CSCD 北大核心 2011年第B10期99-100,105,共3页 Computer Science
基金 云南省自然基金项目(2008CD0084)资助
关键词 云计算 加密 模糊检索 Cloud computing Encryption Fuzzy search
  • 相关文献

参考文献5

  • 1Li Jin,Wang Qian,Wang Cong, et al. Fuzzy Keyword Search over Encrypted Data in Cloud Computing [C]// Proceedings of INFOCOM'2010. 2010 : 441-445.
  • 2An Introduction to Information Retrieval[M]. Cambridge University Press, 2008.
  • 3Goh E-J. Secure Indexes[Z]. Stanford University, March 2004.
  • 4Kamara S, Kistin S, Lauter K. Cryptographic Cloud Storage[Z]. January 2010.
  • 5Shay A,Adam K,Calvin N, et al. Encrypted Keyword Search in a Distributed Storage System.

同被引文献32

  • 1冯凯,龙金花.基于云计算信息检索课程网络教学系统初探[J].南昌教育学院学报,2012,27(1):67-68. 被引量:3
  • 2张唯维.云计算用户数据传输与存储安全方案研究[D].北京:北京邮电大学,2011.
  • 3ARSHAD J, TOWNEND P. Cloud computing security: opportunities and pitfalls[ J ]. International Journal of Grid and High Performance Compu- ting,2012,4( 1 ) :52--66.
  • 4Overall cloud computing security risk assessment analysis [ EB/OL ]. [ 2012 - 12 -01 ] http ://wenku. baldu, com/view/3caee9tO4693daefSef 73d02. html.
  • 5ZHU Huahong, HE Qianhua, TANG Hong, et al. Voiceprint-biometric template design and authentication based on cloud computing security[ C] //Proc. 2011 International Conference on Cloud and Service Com- puting. Hong Kong, China: [ s. n. ] ,2011:302-308.
  • 6LI Jin, WANG Qian, WANG Cong, et al. Fuzzy keyword search over en- crypted data in cloud computing [ EB/OL ]. [ 2012 - 12 - 05 ] http :// www. docin, corn/p-360587334, html.
  • 7Song D X,Wagner D,Perrig A.Practical techniques for searches on encrypted data[C] //Proc of IEEE Symposium on Security and Privacy.[S.l.] :IEEE Press,2000:44-55.
  • 8Wang Cong,Cao Ning,Li Jin,et al.Secure ranked keyword search over encrypted cloud data[C] //Proc of IEEE International Conference on Distributed Computing Systems.2010:253-262.
  • 9Chang Yancheng,Mitzenmacher M.Privacy preserving keyword searches on remote encrypted data[C] //Proc of the 3rd International Conference on Applied Cryptography and Network Security.Berlin:Springer,2005:442-455.
  • 10Sun Wenhai,Wang Bing,Cao Ning,et al.Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking[J].IEEE Trans on Parallel and Distributed Systems,2014,25(11):3025-3035.

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部