期刊文献+

同态加密技术及其在云计算隐私保护中的应用 被引量:40

Survey on Homomorphic Encryption Algorithm and Its Application in the Privacy-Preserving for Cloud Computing
下载PDF
导出
摘要 云计算技术的快速发展使得云服务模式具备了广阔的应用空间,这种模式使用户具备了过往无法比拟的计算能力和存储空间等优势.在云服务模式下用户的隐私安全问题是其推广和应用中面临的首要问题,如何在计算数据的过程中,既保证数据的隐私性,又保证其可用性,是面临的一大难题,同态加密技术作为解决这一问题的关键手段,是近年来国际国内学界的热点问题.介绍了云计算隐私安全和同态加密研究进展、同态加密算法的分类、安全理论基础、全同态加密方案的实现技术以及同态加密技术在云计算隐私保护中的应用,重点对各类同态加密方案的优缺点进行了介绍和分析,提出了未来的研究方向. Cloud service mode has obtained broad application space with the rapid development of cloud computing technology. Such mode has provided users with incomparable computing power and storage space. However, privacy security of users is a primary problem in the promotion and application of the service mode. How to guarantee both the privacy and availability of data in the process of data computation remains a major challenge, and as a key means to solve this problem, homomorphic encryption technique has been a hot subject in international and domestic academic circles in recent years. In this paper, the privacy security of cloud computing, the research progress of homomorphic encryption and the application of homomorphic encryption technique in privacy protection of cloud computing are introduced. Analysis of advantages and disadvantages of various homomorphic encryption schemes is emphasized, and the future research direction is proposed.
作者 李宗育 桂小林 顾迎捷 李雪松 戴慧珺 张学军 LI Zong-Yu;GUI Xiao-Lin;GU Ying-Jie;LI Xue-Song;DAI Hui-Jun;ZHANG Xue-Jun(School of Electronics and Information Engineering, Xi'an Jiaotong University, Xi'an 710049, China;Shaanxi Province Key Laboratory of Computer Network (Xi'an Jiaotong University), Xi'an 710049, China;College of Computer Science and Technology, Guizhou University, Guiyang 550025, China;School of Electronics and Information Engineering, Lanzhou Jiaotong University, Lanzhou 730077, China)
出处 《软件学报》 EI CSCD 北大核心 2018年第7期1830-1851,共22页 Journal of Software
基金 国家自然科学基金(61472316 61762058) 陕西省重大基础研究项目(2016ZDJC-05) 陕西省重点研发项目(2017 ZDXM-GY-011)~~
关键词 云服务 同态加密 密文计算 隐私安全 cloud service homomorphic encryption cipher-text computation privacy security
  • 相关文献

参考文献5

二级参考文献85

  • 1XIANG Guang-li,CHEN Xin-meng,ZHU Ping,MA Jie.A Method of Homomorphic Encryption[J].Wuhan University Journal of Natural Sciences,2006,11(1):181-184. 被引量:8
  • 2Domingo-Ferrer J,Herrera-Joancomarti J. A new privacy homomorphism and applications [J]. Information Processing Letters,1996,60(5):277-282
  • 3VerykiosV, Bertino E. State of- the- art in Privacy- preserving Data Mining. SIGMOD,2004,33 (1)
  • 4Rizvi S J , Haritsa J R. Maintaining data privacy in association rule mining [A]// Proceedings of the 28th International Conference on Very Large Databases. Hong Kong,2002:682-693
  • 5Agrawal R, Srikant R. Privacy-preserving data mining [A]// Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data. United States, 2000:439-450
  • 6Agrawal D,Aggarwal C. On the design and quantification of privacy preserving data mining algorithms [A]//Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. Santa Barbara, United States: ACM Press,2001 :247-255
  • 7Cliffton C, Kantarcioglu M, Vaidya J. Tools for privacy preserving distributed data mining [J]. ACM SIGKDD Explorations Newsletter, 2004,4 (2) : 28-34
  • 8Yang Bingru. Knowledge Discovery Theory Based on Inner Mechanism: Construction, Realization and Application. Elliott & Fitzpatrick Inc. USA, 2004
  • 9UCI MachineLearningRepository. http://www, its. uei. edu/ ∽comleam/
  • 10Pinkas B. Cryptographic techniques for privacy-preserving data mining[J]. ACM SIGKDD Explorations Newsletter, 2006, 4 (2) : 12-19

共引文献88

同被引文献297

引证文献40

二级引证文献237

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部