1MANADHATA P K.Big Data for Security:Challenges,Opportunities,and Examples[C]//Proceedings of the 2012 ACM Workshop on Building Analysis Datasets and Gathering Experience Returns for Security,Raleigh,North Carolina,USA,2012.
2YU S C,WANG C,REN K,et al.Achieving Secure,Scalable,and Fine-grained Data Access Control in Cloud Computing[C]//Proceedings of the INFOCOM'10,the 29th conference on Information communication,Piscataway,USA,2010:534-542.
3BELARE M and ROGAWAY P.Introduction to Modern Cryptography[J].Ucsd Cse,2005:207.
4GENTRY C,HALEVI S,SMART N P.Homomorphic Evaluation of The AES Circuit[M].Germany:Springer Berlin Heidelberg,2012.
5CATALANO D.Paillier's Cryptosystem Revisited[C]//in Proceedings of the 8th ACM conference on Computer and Communications Security,PA,USA,2001:206-214.
6BENDLIN R,DAMGARD I,ORLANDI C,et al.Semi-Homomorphic Encryption and Multiparty Computation[M].Germany:Springer Berlin Heidelberg,2011.
8ITANI W,KAYSSI A,CHEHAB A.Privacy As a Service:Privacy-Aware Data Storage and Processing in Cloud Computing Architectures[C]//Eighth IEEE International Conference on Dependable,Autonomic and Secure Computing,Washington DC,USA,2009:711-716.doi:10.1109/DASC.2009.139.
9CREESE S,HOPKINS P,PEARSON S,et al.Data Protection-Aware Design for Cloud Services[M].Germany:Springer Berlin Heidelberg,2009.
10PARAKH A,KAK S.Space Efficient Secret Sharing for Implicit Data Security[J].Information Science,2011,181(2):335-341.