期刊文献+

基于云计算的可查询加密研究综述 被引量:1

A Survey of Searchable Encryption Based on Cloud Computing
下载PDF
导出
摘要 随着云计算时代的到来,吸引着人们将复杂的数据管理外包给云服务器端.在以更经济、更灵活方式管理数据的同时,个人隐私和数据安全问题一直令人担忧.加密是一种常用的维护数据隐私的方法,但它不支持有效的数据操作.可查询加密技术通过加密保证数据的安全性,同时也支持在密文上的某些计算,在一定程度上解决了云计算环境中的隐私保护和数据可用性问题.本文结合可查询加密的4种应用场景,对可查询加密的关键技术和安全问题进行了分析,并对已有的方案做了分类对比,指出了该领域面临的挑战和未来的研究方向. With the advent of cloud computing, people are inspired to outsource their data management to the cloud server. While it is a more economical and more flexible way to manage data,privacy security issue has been worrisome. Encryption is a common method for maintaining data privacy, but it does not support efficient data manipulation. Searchable encryption ( SE ) ensures the security of data by encryption and also supports some computation on the ciphertext. To a certain extent,it solves the privacy protection and data availability in cloud computing environment. With four scenarios, this paper analyzes the main technologies and security problems for searchable encryption. Then classification and comparison on existing schemes are given. At last,the suggestions for future research are put forward.
出处 《南京师大学报(自然科学版)》 CAS CSCD 北大核心 2014年第1期8-16,共9页 Journal of Nanjing Normal University(Natural Science Edition)
基金 国家自然科学基金(61373164) 江苏省产学研前瞻性联合研究项目(BY2013030-06) 苏州市应用基础研究计划项目(SYG201238)
关键词 云计算 可查询加密 密码学 cloud computing searchable encryption cryptography
  • 相关文献

参考文献34

  • 1史英杰,孟小峰.云数据管理系统中查询技术研究综述[J].计算机学报,2013,36(2):209-225. 被引量:46
  • 2Song D X, Wagner D ,Perrig A. Practical techniques for searches on encrypted data[ C ]//2000 IEEE Symposium on Security and Privacy. Berkeley, CA : IEEE ,2000:44-55.
  • 3Boneh D, Di Crescenzo G, Ostrovsky R, et al. Public key encryption with keyword search [ C ]//Advances in Cryptology- Eurocrypt 2004. Berlin Heidelberg :Springer,2004:506-522.
  • 4Yang G, Tan C H, Huang Q, et al. Probabilistic public key encryption with equality test [ C ]//Topics in Cryptology-CT-RSA 2010. Berlin Heidelberg : Springer, 2010 : 119-131.
  • 5Tang Q. Towards public key encryption scheme supporting equality test with fine-grained authorization [ C ]//Information Security and Privacy. Berlin Heidelberg : Springer,2011:389-406.
  • 6Tang Q. Public key encryption schemes supporting equality test with authorisation of different granularity [ J ]. International Journal of Applied Cryptography,2012,2(4) :304-321.
  • 7Gentry C. A Fully Homomorphic Encryption Scheme [ M ]. South Carolina:BiblioBazaar,2009.
  • 8Raykova M, Vo B, Bellovin S M, et al. Secure anonymous database search [ C ]//Proceedings of the 2009 ACM Workshop onCloud Computing Security. New York : ACM ,2009 : 115-126.
  • 9Agrawal R, Kiernan J, Srikant R, et al. Order preserving encryption for numeric data [ C ]//Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data. New York:ACM ,2004:563-574.
  • 10Boldyreva A, Chenette N, Lee Y, et al. Order-preserving symmetric encryption [ C ]//Advances in Cryptology-EUROCRYPT 2009. Berlin Heidelberg: Springer, 2009 : 224-241.

二级参考文献70

  • 1Abadi D J. Data management in the cloud: 1.imitations and opportunities. Bulletin of the IEEE Computer Society Tech nical Committee on Data Engineering, 2009, 32(1): 3--12.
  • 2周傲英.数据密集型计算数据管理技术面临的挑战.中国计算机学会通讯,2009,5(7):50-54.
  • 3Chang F, Dean J, Ghemawat S, Hsieh W C, Wallach D A, Burrows M, Chandra T, Fikes A, Gruber R E. Bigtable A distributed storage system for structured data//Proceedings of the 7th Conference on Symposium on Operating Systems Design and Implementation(OSDI2006). Seattle, 2006 7 15.
  • 4Cooper B F, Ramakrishnan R, Srivastava U, Silberstein A, Bohannon P, Jacobsen H, Puz N, Weaver D, Yerneni R. PNUTS: Yahoo[ 's hosted data serving platform//Proceed ings of the 34th Conference on Very Large Databases (VLI)B2008). Auckland, 2008 1277-1288.
  • 5Pavlo A, Paulson E, Rasin A, Abadi D J, DeWitt D J, Mad den S, Stonebraker M. A comparison of approaches to large- scale data analysis//Proceedings of the 2010 International Conference on Management of Data (SIGMOD2009). Rhode Island, 2009:165 178.
  • 6Stonebraker M J, Abadi D, DeWitt D J, Madden S, Paulson E, Pavlo A, Rasin A. MapReduce and parallel DBMSs.- friends or foes? Communications of the ACM, 2010, 53(1) 64 71.
  • 7Shi Y, Meng X, Zhao J, Hu X, Liu B, Wang H. Bench marking cloud-based data management systems//Proceedings of the 2nd Workshop on Cloud Data Management (CloudDB2010). Toronto, 2010= 47 54.
  • 8Abouzeid A, Pawlikowski K B, Abadi D, Silberschatz A, Rasin A. HadoopDB An architectural hybrid of MapReduce and DBMS technologies for analytical workloads//Proceed- ings of the 35th Conference on Very Large Databases (VLDB2009). Lyon, 2009:922 933.
  • 9Thusoo A, Sarma J, Jain N, Shao Z, Chakka P, Anthony S, Liu H, Wyekoff P, Murthy R. Hive: A warehousing solu tion over a map reduce framework//Proceedings of the 35th Conference on Very Large Databases (VLDB2009). Lyon, 2009:1626-1629.
  • 10Robert L G, Yunhong G. On the varieties of clouds for data intensive computing. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering, 2009, 32 (1): 44-50.

共引文献45

同被引文献53

引证文献1

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部