期刊文献+

一种云环境中密文数据的模糊多关键词检索方案 被引量:7

Fuzzy Multi-keyword Retrieval Scheme over Encrypted Data in Cloud Computing
下载PDF
导出
摘要 越来越多的企业和个人用户将大量的数据存储在云服务器。为了保障数据隐私,重要数据以密文形式存储在云端,但却给数据检索操作带来严峻挑战。传统的基于明文的检索方案不再适用,已有的基于密文的检索方案存在不支持模糊检索或多关键词检索、效率较低、空间开销较大、不支持检索结果排序等问题。因此,研究安全高效的密文检索方法具有重要意义。提出了一种新的云环境中密文数据的模糊多关键词检索方案,该方案能够从云服务器上检索出包含有指定多个关键词的密文,支持模糊关键词检索,并且不会向云服务器和其他攻击者泄露与数据和检索相关的任何明文信息;使用计数型布隆过滤器和MinHash算法构建索引向量和查询向量,使得索引构建和查询过程更加高效,且排序结果更加准确。安全性分析和性能评估表明该方案具有高安全性、可靠性、检索效率和准确率。 Nowadays more and more enterprise and individual users store a large amount of data in the cloud. To protect data privacy, important data has to be encrypted before being stored in the cloud, which brings a severe challenge to the retrieval of data. Traditional retrieval schemes based on plaintext have not been applicable, and existing retrieval schemes based on ciphertext have many shortcomings, some of which do not support fuzzy search or multi-keyword search, poor efficiency or large space overhead, or do not return ranking results. Therefore, researching secure and effi- cient retrieval scheme on ciphertext is of great significance. A new fuzzy multi-keyword retrieval scheme over encrypted data in cloud computing was proposed, which can retrieve the ciphertext containing multiple keywords from cloud ser- ver, support fuzzy keyword search, and will not leak any plaintext information of data and retrieval to cloud server and other attackers. In the scheme, counting bloom filter and MinHash algorithm are used to construct index vectors and query vectors, which makes the process of building index and querying more efficient, and the ranking results more accu- rate. The security analysis and performance evaluation show that our scheme has high security, reliability, retrieval effi- ciency and accuracy.
出处 《计算机科学》 CSCD 北大核心 2017年第5期146-152,共7页 Computer Science
基金 国家自然科学基金(61602351 61502359 61303117) 武汉科技大学国家自然科学基金预研项目(2015XG005) 智能信息处理与实时工业系统湖北省重点实验室开放基金项目(2016znss10B)资助
关键词 云计算 模糊检索 多关键词检索 密文数据 安全索引 Cloud computing, Fuzzy search, Multi-keyword search, Encrypted data, Secure index
  • 相关文献

参考文献2

二级参考文献58

  • 1ARMBRUST M, FOX A, GRIFFITH R. Above the clouds: a berkeley view of cloud computing[EB/OL], http://www.eecs.berkeley.edu/Pubs/ TechRpts/2009/EEC S-2009-28.html, 2009.
  • 2BUGIEL S, NLrRNBERGER S, SADEGHI A. Twin clouds: an archi- tecture for secure cloud computing[A]. Workshop on Cryptography and Security in Clouds[C]. Zurich, Switzerland, 2011.1-11.
  • 3KAMARA S, LAUTER K. Cryptographic cloud storage[J]. Financial Cryptography and Data Security, 2010,6054:136-149.
  • 4LI J, KROHN M, MAZI D. Secure untrusted data repository (SUNDR)[A]. Proceedings of the 6th Symposium on Operating Sys- tems Design and Implementation[C]. San Francisco, CA, USA, 2004. 91-106.
  • 5GOH E J. Secure indexes[A]. Proceedings of the 2004 Workshop on Information Security Applications[C]. Jeju Island, Korea, 2004.73-86.
  • 6SONG D X, WAGNER D, PERRIG A. Practical techniques or searches on encrypted data[A]. Proceedings of the IEEE Symposium on Security and Privacy[C].CA,USA,2000.36-49.
  • 7BONEH D, CRESCENZO G D, OSTROVSKY R. Public key encryp- tion with keyword search[A]. Proc of EUROCRYP'04[C]. Interlaken, Switzerland, 2004.506-522.7.
  • 8PAILLIER P. Public-key cryptosystems based on composite degree residu- osity clmmes[A]. Proceedings of the International Conference on the Theory and Applications of Cryptograhic Techniques (EUROCRYPT'99)[C]. Prague, Czech Republic, 1999.223-238.
  • 9BETHENCOURT J, SONG D, WATERS B. New constructions and practical applications for private stream searching (extended ab- stract)[A]. Proceedings of the IEEE Symposium on Security and Pri- vacy (SP'06)[C]. Oakland, California, USA, 2006. 134-139.
  • 10BETHENCOURT J, SONG D, WATERS B. New techniques for private stream searching[J]. ACM Transactions on Information and System Security, 2009, 12(3): 1-32.

共引文献19

同被引文献30

引证文献7

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部