期刊文献+

云环境下基于可搜索加密技术的密文全文检索研究 被引量:4

A STUDY OF CIPHERTEXT FULL-TEXT RETRIEVAL BASED ON SEARCHABLE ENCRYPTION IN CLOUD ENVIRONMENT
下载PDF
导出
摘要 为了解决云存储技术带来的数据安全和高效检索问题,在深入研究可搜索加密技术基础上,提出一种基于云存储的密文全文检索模型,给出基于可搜索加密技术的密文全文索引构建和检索策略,并对方案的安全性进行分析。实验表明,云存储环境下基于可搜索加密技术的密文全文检索方案既保证了数据的安全性,又具有很好的检索效率,可适用于海量数据的加密存储与高效安全检索。 To solve the problems of data security and efficient retrieval in cloud storage technology, on the basis of in-depth study searchable encryption, a ciphertext full-text retrieval model based on cloud storage is proposed. We give the ciphertext full-text index building and search strategies based on searchable encryption and analyze the security of the scheme. Experimental results show that the ciphertext full-text retrieval scheme based on searchable encryption in cloud environment not only ensures the security of data, but also has good retrieval efficiency, so it can be applied to the mass storage of data encryption and efficient security search.
出处 《计算机应用与软件》 2017年第4期35-41,共7页 Computer Applications and Software
基金 国家自然科学基金项目(61170037) 北京电子科技学院重点实验室项目(2014GC2-ZKJ)
关键词 云存储 可搜索加密 全文检索 密文全文索引 Cloud storage Searchable encryption Full-text retrieval Ciphertext full-text index
  • 相关文献

参考文献3

二级参考文献125

  • 1Hacigumus H, Iyer B, Mehrotra S. Providing database as a service [C] //Proc of International Conference on Data Engineering (ICDE), San Jose, California, USA, 2002: 29-40.
  • 2Li F F, Hadjieleftheriou M, Kollios G. Dynamic authenticated index structures for outsourced databases [C]//Proc of ACM Management of Data (SIGMOD), Chicago, IL, USA, 2006: 121-132.
  • 3Papadopoulos S, Papadias D, Cheng W, Tan K. Separating authentication from query execution in outsourced databases [C]//Proc of International Conference on Data Engineering(ICDE),Shanghai, China, 2009: 1148-1151.
  • 4Aameek S, Ling L. Sharoes: a data sharing platform for outsourced enterprise storage environments [C] //Proc of International Conference on Data Engineering (ICDE), Cancun, Mexico, 2008: 993-1002.
  • 5Hacigumus H, Iyer B, Li C, et al.Executing SQL over encrypted data in the database-service-provider model [C] //Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, Madison, Wisconsin, USA, 2002: 216-227.
  • 6Bijit Hore, Sharad Mehrotra, Gene Tsudik. A privacy-index for range queries [C] //Proceedings of the 30th VLDB conference, Toronto, Canada, 2004: 223-235.
  • 7Damiani E, Sabrina De Capitani di Vimercati, Finetti M, et al.. Implementation of a storage mechanism for untrusted DBMSs[C]// Proc of the second International IEEE Security in Storage Workshop, Washington DC, USA, 2003: 38.
  • 8Damiani E, Sabrina De Capitani di Vimercati, Jajodia S, et al.. Balancing confidentiality and efficiency in untrusted relational DBMSs [C] //Proc of the 10th ACM Conference on Computer and Communications Security, Washington DC,USA, 2003: 27-31.
  • 9Yun A, Shi C, Kim Y. On protecting integrity and confidentiality of cryptographic file system for outsourced storage [C] //Proc of ACM Workshop Cloud Computing Security (CCSW 2009). New York: ACM, 2009:67-76.
  • 10Rackspace. JungleDisk [EB/OL]. 2010 [ 2011-01-09 ]. http://www, jungledisk, com/.

共引文献103

同被引文献14

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部