期刊文献+

云计算中基于双陷门技术的混合密文检索方案

Mixed Search over Encrypted Cloud Data based on Double-Trap
下载PDF
导出
摘要 密文检索是云计算中数据可用性的标志性体现。目前云计算中的多关键词模糊检索方案存在效率低、安全性差等问题。针对这个问题本文设计了一种基于双陷门技术的混合密文检索方案,首先,本文引入双索引结构用来支持多关键词检索;其次,本文引入Huffman编码树和DFSC改良了索引结构,提高了检索的效率并且减小索引存储空间;再次,本文通过TF-IDF规则隐藏关键词词频,增加检索过程安全性;最后,本文根据多关键词检索和模糊检索协同计算评分结果,经排序将结果值返回给用户。通过仿真实验结果表明本文方案能够提高检索的效率和降低索引存储开销。 Searchable Encryption is the sign of data availability in cloud computing. The multi-keyword fuzzy searchable Encryption schemes in cloud computing have several problems. They includes the efficiency is low and the safety is poor, etc. To solve this problem, this paper introduces a kind of mixed search over Encrypted cloud data based on privacy-preserving. Firstly, this paper introduces a doubleindexing structure to support multi-keyword searching. Secondly, this paper introduces the Huffman coding tree and DFSC to improve the retrieval efficiency, and reduce index-storage space. Thirdly, this paper introduces IF-IDF to increase retrieval security. Finally, this paper returned the result value to the user through sorting based on the result is cooperative scored between the multi-keyword searching and fuzzy searching. In this paper, the result of simulation experiment shows that improving the retrieval efficiency and reducing index-storage space.
作者 常良 张永胜 CHANG Liang;ZHANG Yong-sheng
出处 《信息技术与信息化》 2016年第9期69-75,共7页 Information Technology and Informatization
基金 山东省自然科学基金项目(ZR2011FM019) 山东省研究生教育创新计划项目(SDYC15042)资助
关键词 隐私保护 多关键词 模糊检索 双索引结构 Privacy-preserving Multi-keywords Fuzzy search Double-indexing structure
  • 相关文献

参考文献14

  • 1林闯,苏文博,孟坤,刘渠,刘卫东.云计算安全:架构、机制与模型评价[J].计算机学报,2013,36(9):1765-1784. 被引量:321
  • 2杨健,汪海航,王剑,俞定国.云计算安全问题研究综述[J].小型微型计算机系统,2012,33(3):472-479. 被引量:92
  • 3Google App Engine [EB/OL]. http://appengine.google.com.2008.
  • 4Song XD, Wagner D, Perrig A. Practical techniques for searches on encrypted data[C].Proceeding of IEEE Symposium on Security and Privacy, 2000, 44-55.
  • 5Goh E. Secure indexes[R]. Cryptology ePrintArchive, 2003(2003):216-235.
  • 6Cutmola R, Garay J, Kamara S, et al. Searchablesymmetric encryption: Improved definitions andefficient constructions[C]. Proceedings of the 13thACM Conference, CCS2006. New York: ACM Press, 2006:78-88.
  • 7Kamara S, Papamanthou C. Parallel and dynamicsearchable symmetric encryption[C]. Proceedingsof the Financial Cryptography and Data Security.LNCS7859, Berlin: Springer, 2013: 258-274.
  • 8Kamara S, Papamanthou C, Roeder T. Dynamicsearchable symmetric encryption[C]. Proceedings ofthe 19th ACM Conference, CCS2012. New York: ACMPress, 2012: 965-976.
  • 9Li J, Wang Q, Wang C, et al. Fuzzy keyword searchover encrypted data in cloud computing[C].Proceedingsof the 29th IEEE INFOCOM, IEEE Press, 2010: 1-5.
  • 10Wang C, Ren K, Yu S, et al. Achieving usable andprivacy assured similarity search over outsourcedcloud data[C].Proceedings of the 31th IEEE INFOCOM.IEEE Press, 2012: 451-459.

二级参考文献157

  • 1林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 2樊亚军,刘久文.TPM安全芯片设计与实现[J].信息安全与通信保密,2007,29(6):136-137. 被引量:5
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4张旻晋 桂文明 苏递生 等.从终端到网络的可信计算技术.信息技术快报,2006,4(2):21-34.
  • 5Brodkin. Gartner: seven cloud-computing security risks[DB/OL]. http://www.networkworld.comlnews/2008/070208-cloud. html, 2008-07-02.
  • 6Cao Tian-jie , Zhang Yong-ping, Wang Chu-jiao. Security protocol [ M]. Beijing: Beijing University of Posts and Telecommunications Press, 2009.
  • 7Aaram Yun, Shi Chun-hui, Yongdae Kim. On protecting integrity and confidentiality of cryptographic file system for outsourced storage [ C]. In CCSW'09: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, Chicago, Illinois, USA, 2009: 67- 75.
  • 8Carter J L, Wegman M N. Universal classes of hash functions (extended abstract) [ A]. STOC '77: Proceedings of the Ninth Annual ACM Symposium on Theory of Computing, New York, NY, USA [C]. ACMPress, 1977:106-112.
  • 9Wang Cong , Wang Qian , Ren Kui, et al. Ensuring data storage security in cloud computing [ C]. In IWQoS' 09: Proceedings of 17th International Workshop on Quality of Service, Charleston, SC, USA, 2009:1-9.
  • 10Adi Shamir. Identity-based cryptosystems and signature schemes [ C]. In Proceedings of CRYPTO'84 on Advances in Cryptology, Santa Barbara, California, USA, 1985 :47-53.

共引文献420

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部