期刊文献+

面向多关键字的模糊密文搜索方法 被引量:18

Multi-Keyword Fuzzy Search over Encrypted Data
下载PDF
导出
摘要 围绕多关键字的模糊匹配和数据安全性保障问题,展开对多关键字模糊搜索方法的研究,提出一种面向多关键字的模糊密文搜索方案.该方案以布隆过滤器(Bloom filter)为基础,使用对偶编码函数和位置敏感Hash函数来对文件索引进行构建,并使用距离可恢复加密算法对该索引进行加密,实现了对多关键字的密文模糊搜索.同时方案不需要提前设置索引存储空间,从而大大降低了搜索的复杂度.除此之外,该方案与已有方案相比不需要预定义字典库,降低了存储开销.实验分析和安全分析表明,该方案不仅能够实现面向多关键字的密文模糊搜索,而且保证了方案的机密性和隐私性. Cloud computing is one of the most important and promising technologies.Data owners can outsource their sensitive data in a cloud and retrieve them whenever and wherever they want.But for protecting data privacy,sensitive data have to be encrypted before storing,which abandons traditional data utilization based on plaintext keyword search.Around the multi-keyword fuzzy matching and data security protection problems,we propose a multi-keyword fuzzy search method on the encrypted data.Based on the Bloom filter,our scheme uses dual coding function and the position sensitive Hash function to build file index.In the meantime,it uses the distance recoverable encryption arithmetic to encrypt the file index,consequently achieving the function which is facing the multi-keyword to fuzzy search over the encrypted data.Meanwhile,the scheme does not need to set index storage space in advance,which greatly reduces the complexity of the search.Compared with the existing solutions,the scheme does not need predefined dictionary library which lowers the storage overhead in consequence.Experimental analysis and security analysis show that the proposed scheme not only achieves the multi-keyword fuzzy search over the encrypted data,and guarantees the confidentiality and privacy.
出处 《计算机研究与发展》 EI CSCD 北大核心 2017年第2期348-360,共13页 Journal of Computer Research and Development
基金 国家科技重大专项基金项目(2013ZX03002006) 辽宁省科技攻关项目(2013217004) 中央高校基本科研业务费专项资金(N130317002) 沈阳市科技基金项目(F14-231-1-08)~~
关键词 云存储 布隆过滤器 可搜索加密机制 位置敏感Hash函数 多关键字模糊搜索 cloud storage Bloom filter(BF) searchable encryption position sensitive Hash function multi-keyword fuzzy search
  • 相关文献

参考文献3

二级参考文献12

  • 1秦军,王正飞,谈子敬,汪卫,施伯乐.一种数据库加密及密钥管理方法[J].计算机应用与软件,2006,23(12):5-7. 被引量:3
  • 2朱琪美,张世庆.分簇无线传感器网络中的密钥分组管理方案研究[J].计算机测量与控制,2007,15(2):216-218. 被引量:3
  • 3P Horster,M Michels,H Petersen.Authenticated encryption schemes with low communication costs[J].Electronics Letters,1994,30(15):1212-1213.
  • 4K Nyberg,R A Rneppel.A new signature scheme based on the DSA giving message recovery[A].1st ACM Conference on Computer and Communications security[C].New York:ACM Press,1993.58-61.
  • 5W Lee,C Chang.Authenticated encryption scheme without using a one-way function[J].Electronics Letters,1995,31(19):1656-1657.
  • 6K Chen.Signature with message recovery[J].Electronics Letters,1998,34(20):1934.
  • 7Y Zheng.Digital signcryption or how to achieve cost (signature & encryption)cost(signature)+cost (encryption)[A].CRYPTO′97,LNCS 1294[C].Berlin:Springer-Verlag,1997.165-179.
  • 8K Nyberg,R A Rneppel.Message recovery for signature schemes based on the discrete logarithm problem[A].In Advances in Cryptography-Proceedings of EUROCRYPT′94[C].Berlin:Springer-Verlag,1995.175-190.
  • 9Y Zheng.Signcryption and its application in efficient public key solutions[A].In Information Security Workshop (ISW′97),LNCS 1396[C].Berlin:Springer-Verlag,1997.291-312.
  • 10RANKL W,EFFING W.智能卡大全[M].王卓人,王锋,译.北京:电子工业出版社,2002.

共引文献9

同被引文献70

引证文献18

二级引证文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部