期刊文献+

针对网络信息系统的个人隐私保护方案 被引量:4

Personal Privacy Protection Scheme for Network Information Systems
下载PDF
导出
摘要 提出一个针对网络信息系统中的个人隐私保护方案.隐私数据被提交给服务器端存储之前,方案将对其进行加密,使得密文即使泄露也难以破译,从而保证了数据的安全性.为了支持密文相关的各类查询,方案还设计了文本索引方法和查询转换方法,使得部分用户查询可以在服务器端执行,而无需解密数据,从而提高了数据查询效率.最后,理论分析和实验评估验证了方案的安全性和有效性. This paper presents an effective scheme for the problem of personal privacy protection in a network information system. Be- fore being submitted to store at the server's database of a network information system,the privacy data first will be encrypted,such that the encrypted data even if being stolen unfortunately cannot be understood. Then, to support a variety of query operations over encrypt- ed data,this paper designs and implements an index method and a query translation method,such that a great part of a user's query op- eration can be executed at the server's side without the need to decrypt data,consequently improving the query efficiency. Last,both the theoretical analysis and experimental evaluation validate the security and effectiveness of our proposed scheme.
出处 《小型微型计算机系统》 CSCD 北大核心 2015年第6期1291-1295,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61202171 51379176)资助 中国博士后科学基金项目(2013T60623 2012M521251)资助 浙江省自然科学基金项目(LY12F01016 LQ13F020009 LQ13D010001 Y15F020066)资助
关键词 信息系统 隐私保护 加密索引 查询转换 information systems privacy protection encryption and index query translation
  • 相关文献

参考文献9

  • 1Kevin K. Cryptography in the database: the last line of defense[M]. USA:Addison-Wesley Educational Publishers Inc. ,2008.
  • 2William S. Password encoding and network security: principles and practices[M]. Beijing : Electronic Industry Press,2012.
  • 3Domingo FJ. A new privacy homomorphism and applications[J]. Information Processing Letters, 1996 ,60(5) :277-282.
  • 4Chung S S,Ozsoyoglu G. Anti-tamper databases: processing aggre?gate queries over encrypted databases[C]. Proc. of the 22nd Inter?national Conference on Data Engineering Workshops, Atlanta, GA , USA: IEEE Computer Society ,2006 :98-98.
  • 5Wu Z,Xu G ,Zong Y ,et al. Executing SQL queries over encrypted character strings in the database-as-service model[J]. Knowledge?based Systems,2012 ,35 :332-348.
  • 6Wang Z, DaiJ, Wang W ,et al. Fast query over encrypted character data in database[J] . Communications in Information and Systems, 2004,4 (4) :289-300.
  • 7崔宾阁,刘大昕,王桐.支持快速查询的数据库加密方法研究[J].计算机科学,2006,33(6):115-118. 被引量:13
  • 8LiJ, Wang Q, Wang C, et al. Fuzzy keyword search over encrypted data in could computing[C]. Proc. of the 29th Conference on Computer Communications. New York:ACM Press,2010:l-5.
  • 9WilliamS著,张焕国译.密码编码学与网络安全:原理与实践[M].北京:电子工业出版社,2012.

二级参考文献10

  • 1Oracle. Oracle9i database security for eBusiness, http://www.oracle.com/technology/deploy/ security/oraclegi/pdf/gisecbpa.pdf. 2001
  • 2Fanghanel T. Using encryption for secure data storage in mobile database systems: [Ph D dissertation]. Jena,Germany:Friedrich Schiller University, 2002
  • 3Hacigumus H, Lyer B, Li Chen, et al. Executing SQL over encrypted data in the database-serve-provider model. The 2002 ACM SIGMOD Int'1 Conf on Management of Data, Madison, Wisconsin, 2002
  • 4王正飞 王曼 汪卫 等.数据库中加密字符数据的存储与查询[J].计算机研究与发展,2004,41(1):66-71.
  • 5TPC-H. Benchmark specification, http://www. tpc. org,2004
  • 6Waters B R, Balfanz D, Durfee G, et al. Building an encrypted and searchable audit log. In: The 11^th Network and Distributed System Security(NDSS)Symposium,San Diego,California,2004
  • 7Chang Yan-Cheng, Mitzenmacher M. Privacy preserving keyword searches on remote encrypted data. In: Proceedings of ACNS 2005,Lecture Notes in Computer Science 3531, Springer-Verlag,2005. 442-455
  • 8Song D Xiaodong, Wagner D, Perrig A. Practical techniques for searches on encrypted data. The IEEE Symp on Security and Privacy, Oakland, California, 2000
  • 9Haeigumus H, Lyer Bala, Mehrotra S. Providing database as a service. The 18th Int'l Conf On Data Engineering,San Jose,California, 2002
  • 10He Jingmin, Wang Min. Cryptography and relational database management system. Interactive Dialogue with Educator form Across State, 2001

共引文献12

同被引文献17

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部