期刊文献+

加密数据上的计算密码学技术研究综述 被引量:10

Cryptographic technologies enabling computation over encrypted data
下载PDF
导出
摘要 近年来机密数据被盗事件在国内外时有发生,其所带来的经济损失和社会影响持续加剧。尽管已有系统采取了若干安全措施,然而经验表明,攻击者往往能够通过各种方式攻入系统,盗取用户数据。为了从根本上保护数据机密性,应确保即使攻击者能够获取存储在服务器上数据的访问权限,数据机密性依然不受到威胁,即数据以加密形式存储在服务器上;另外,为了保持数据的可用性,应允许服务器在密文上进行计算。针对支持在加密数据上计算的密码学技术,如同态加密、函数加密、可搜索加密以及CryptDB和Monomi等应用系统进行了综述性介绍,并指出有待解决的关键问题和未来的研究方向。 In recent years, theft of confidential data is prevalent all over the world, thus bringing great costs to companies/ organizations and incurring personal data privacy breach. In order to prevent data leakage, almost all systems deployed nowadays adhere to the following strategy : try to prevent attackers from breaking into servers. The reasoning behind this strategy is that,if attackers are unable to break into the servers, then they cannot access the data stored on these servers as well. Nevertheless,experience has shown that the adversaries are still capable to find a way to break into the system and steal the data. To protect data confidentiality even against attackers who have access to all the stored data, the cryptographic community has proposed an alternative strategy, i. e. , store data in the encrypted form, compute over the encrypted data and never send the server the decryption key. In this way, even if an attacker reads all the data stored there, since the data is in the encrypted form and theserver never obtains the decryption key, with secure encryption scheme, the attacker will get no information about the plaintexts,thus protecting data confidentiality. There are several ways to compute over encrypted data and they provide different tradeoffs in the space of functionality, security, and efficiency. This paper gave a survey of researches in the literature on this topic, including homomorphic encryption, functional encryption, searchable encryption, as well as several systems designed for real-world applications, such as CryptDB and Monomi. Furthermore, it discussed some future research directions on this research topic as well.
作者 董秋香 关志 陈钟 Dong Qiuxiang;Guan Zhi;Chen Zhong(School of Electronics Engineering & Computer Science, Peking University, Beijing 100871 , China)
出处 《计算机应用研究》 CSCD 北大核心 2016年第9期2561-2572,共12页 Application Research of Computers
基金 国家自然科学基金资助项目(6117023) 国家"核高基"科技重大专项资助项目(2012ZX01039-004-009) 信息网络安全公安部重点实验室开放资助项目(C11606)
关键词 数据泄露 数据机密性 同态加密 函数加密 可搜索加密 CryptDB Monomi data leakage data confidentiality homomorphic encryption functional encryption searchable encryption CryptDB Monomi
  • 相关文献

参考文献2

二级参考文献154

  • 1Amazon. Amazon S3. http://aws.amazon.com/s3/.
  • 2Windows azure, http://www.microsoft.com/windowsazure/.
  • 3Weber T. Cloud computing after Amazon and Sony: Ready for primetime? 2011. http://www.bbc.co.uk/news/business-13451990.
  • 4Song D, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proc. of the 2000 IEEE Syrup. on Security and Privacy. Berkeley: IEEE Computer Society, 2000.44-55. [doi: 10. 1109/SECPRI.2000.848445].
  • 5Waters B, Balfanz D, Durfee G, Smetters D. Building an encrypted and searchable audit log. In: Proc. of the 1 lth Annual Network and Distributed System Security Symp. San Diego: The Internet Society, 2004. http://www.isoc.org/isoc/conferences/ndss/04/ proceedings/.
  • 6Goh E. Secure Indexes. In: Cryptology ePrint Archive. 2003. http://eprint.iacr.org/2OO3/216.pdf.
  • 7Golle P, Staddon J, Waters B. Secure conjunctive keyword search over encrypted data. In: Proc. of the 2nd Int'l Conf. on Applied Cryptography and Network Security (ACNS). Berlin, Heidelberg: Springer-Verlag, 2004. 31-45. [doi: 10.1007/978-3-540-24852- 1_3].
  • 8Wang C, Cao N, Li J, Ren K, Lou WJ. Secure ranked keyword search over encrypted cloud data. In: Proc. of the IEEE 30th Int'l Conf. on Distributed Computing Systems (ICDCS). Genoa: IEEE Computer Society, 2010. 253-262. [doi: 10.1109/ICDCS. 2010.34].
  • 9Li J, Wang Q, Wang C, Cao M, Ren K, Lou WJ. Fuzzy keyword search over encrypted data in cloud computing. In: Proc. of the IEEE INFOCOM Mini-Conf. San Diego: IEEE Computer Society, 2010. 1-5. [doi: 10.1109/INFCOM.2010.5462196].
  • 10Li M, Yu S, Cao N Lou W. Authorized private keyword search over encrypted data in cloud computing. In: Proc. of the IEEE Int'l Conf. on Distributed Computing Systems (ICDCS). Minneapolis: IEEE Computer Society, 2011. 383-392. [doi: 10.1109/ICDCS. 2011.55].

共引文献149

同被引文献64

引证文献10

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部