期刊文献+

安全云存储中高效的多关键词查找方案 被引量:9

Efficient Multi-keyword Search over Secure Cloud Storage
下载PDF
导出
摘要 用户在租赁了云服务提供商(Cloud Service Provider,CSP)的存储空间之后,为了保护隐私,通常将文件以密文的形式存储在CSP上。这给在密文数据上进行关键词查找带来了问题。在本应用场景中,CSP被视为潜在攻击者。提出了支持多关键词查找的安全高效的云计算方案。该方案基于二叉排序树结构,在保证用户数据的安全和隐私的前提下,支持授权用户对文件的多关键词查询,让用户可以随时随地享受多关键词查询服务。 To protect users' privacy,data stored in cloud service provider(CSP) usually needs to be encrypted before being sent to CSP.It brings about a problem that how users search files using keywords over encrypted cloud data.In lots of scenarios,CSP is considered as a potential attacker.According to characteristics of cloud computing,we proposed an efficient privacy-preserving approach to support multi-keyword search over encrypted data(short for PPMKS),which is based on binary sort tree for search(short for BSTS).In our PPMKS,authorized users can easily search ciphertext files using multiple keywords,which can make users enjoy the service of multi-keyword search over encrypted data anywhere and anytime.
出处 《计算机科学》 CSCD 北大核心 2012年第12期158-161,176,共5页 Computer Science
基金 国家自然科学基金(61073037) 教育部博士点基金(20110162110043)资助
关键词 多关键词查找 二叉排序树 云服务提供商 云存储 Multi-keyword search BSTS CSP Cloud storage
  • 相关文献

参考文献18

  • 1高巍.2010年中国通信产业十大关键词点评文章(三) 云计算[J].数据通信,2011(1):5-6. 被引量:2
  • 2李乔,郑啸.云计算研究现状综述[J].计算机科学,2011,38(4):32-37. 被引量:431
  • 3史美林,姜进磊,孙瑞志,向勇(译).云计算[M].北京:机械工业出版社,2009.
  • 4Li C, Lu J, Lu Y. Efficient merging and filtering algorithms for approximate string searehes[C]//Proceedings of ICDE. 2008.
  • 5BehmA, JiS, LiC, etal. Spaee-eonstrained gram- based indexing for efficient approximate string seareh[C]//Proceedings of ICDE. 2009.
  • 6Ji S, Li G, Li C, et al. Efficient interactive fuzzy keyword search [C]//Proceedings of ACM WWW. 2009.
  • 7P, ellare M, Boldyreva A, Neil A O. Deterministic and efficiently searchable encryption[C]//Proceedings of Crypto 2007. LCNS, Vol 4622,2007.
  • 8Song D, Wagner D, Perrig A. Practical techniques for searches on encrypted data[C]//Proceedings of IEEE Security and Priva cy. 2000.
  • 9Goh E-J. Secure indexes[R]. 2003.
  • 10Boneh D, Crescenzo G D, Ostrovsky R, et al. Public key encryp- tion with keyword search [C] // Proceedings of EUROCRYP. 2004.

二级参考文献49

  • 1Leavitt N. Is Cloud Computing Really Ready for Prime Time? [J]. IEEE Computer Society Press, 2009,42 ( 1 ) :15 20.
  • 2Armbrust M, Fox A, Grith R, et al. Above the clouds:A Berkeley View of Cloud Computing[R]. UCB/EECS-2009-28. Berkeley, USA:Electrical Engineering and Computer Sciences, University of California at Berkeley, 2009.
  • 3Vaquero L, Rodero-Marino L, Caceres J, et al. A break in the clouds: towards a cloud definition [J]. SIGCOMM Computer Communication Review, 2009,39 ( 1 ) : 50-55.
  • 4Lenk A,Klems M, Nimis J, et al. What' s inside the Cloud? An Architectural Map of the Cloud Landscape[C]//Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing. 2009 : 23-31.
  • 5Amazon Web Services[EB/OL]. http://aws, amazon, corn/.
  • 6Hadoop[EB/OL]. http://hadoop, apache, org/core.
  • 7Dean J, Ghemawat S. MapReduce: Simplied data processing on large clusters[C]//Proceedings of the 6th Symposium on Operating Systems Design and Implementation. San Francisco, CA, 2004,11(18):137-150.
  • 8Hbase[EB/OL]. http://hadoop, apache, org/hbase/.
  • 9Zookeeper[EB/OL]. http://hadoop, apache, org/zookeeper/.
  • 10Google app engine[EB/OL]. http://appengine, google, com.

共引文献434

同被引文献70

  • 1马显彬.汉语同音现象分析[J].语文研究,2005(2):15-18. 被引量:11
  • 2王静帆,邬晓钧,夏云庆,郑方.中文信息检索系统的模糊匹配算法研究和实现[J].中文信息学报,2007,21(6):59-64. 被引量:17
  • 3Song D X,Wagner D,Perrig A.Practical techniques or searches on encrypted data[C]//Proceedings of the IEEE Symposium on Security and Privacy.Piscataway N J:IEEE,2000:36-49.
  • 4Goh E J.Secure indexes[J/OL].[2014-01-05].http://epriat.iacr.org/2003/216.
  • 5Boneh D,Waters B.Conjunctive,subset,and range queries on encrypted data[C]//Theory of Cryptography,Berlin Heidelberg:Springer,2007:535-554.
  • 6Katz J,Sahai A,Waters B.Predicate encryption supporting disjunctions,polynomi-al equations,and inner products[C]//Advances in Cryptology-EUROCRYPT2008.Berlin Heidelberg:Springer,2008:146-162.
  • 7Li J,Wang Q,Wang C,et al.Fuzzy keyword search over encrypted data in cloud computing[C]//INFOCOM,2010 Proceedings IEEE,Piscataway N J:IEEE,2010:1-5.
  • 8Kuzu M,Islam M S,Kantarcioglu M.Efficient similarity search over encrypted data[C]//Data Engineering(ICDE),2012 IEEE28th International Conference on,Piscataway N J:IEEE,2012:1156-1167.
  • 9Zhang Z,Hadjieleftheriou M,Ooi B C,et al.Bedtree:An all-purpose index structure for string similarity search based on edit distance[C]//Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data,New York:ACM,2010:915-926.
  • 10Chuah M,Hu W.Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data[C]//Distributed Computing Systems Workshops(ICDCSW),2011 31st International Conference on,Piscataway N J:IEEE,2011:273-281.

引证文献9

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部