期刊文献+

基于同态加密的全文检索方案设计与实现 被引量:5

Design and Implementation of Full Text Retrieval Scheme Based on Homomorphic Encryption
下载PDF
导出
摘要 为了有效保障外包数据的安全性,满足用户高效检索储存在云中的数据。提出一种基于同态加密的云存储全文检索方案。该方案以整数向量加密技术为基础,建立向量空间模型,进而在密文下计算检索向量与文档向量的余弦相似度,进行检索。方案利用加密算法的同态性,在上传文件,检索以及下载文件的整个过程中,云服务器均无法获取明文数据,方案可进行多关键词检索。在第三方不可信云存储场景中具有准确和更高的检索效率,方案描述简单,保证了用户数据的机密性,在实际场景中具有良好的应用。 In order to effectively protect the security of outsourced data,it satisfies the problem of users efficiently searching data stored in the cloud.A cloud storage full-text retrieval scheme based on homomorphic encryption is proposed.Based on the integer vector encryption technology,the scheme establishes a vector space model,and then calculates the cosine similarity between the search vector and the document vector in ciphertext for retrieval.The scheme utilizes the homomorphism of the encryption algorithm.During the process of uploading files,retrieving and downloading files,the cloud server cannot obtain plaintext data,and the scheme can perform multi-keyword retrieval.It has accurate and higher retrieval efficiency in the third-party untrusted cloud storage scenario.The scheme description is simple,ensuring the confidentiality of user data,and has good application in practical applications.
作者 韩邦 李子臣 汤永利 HAN Bang;LI Zichen;TANG Yongli(School of Computer Science and Technology,Henan Polytechnic University,Jiaozuo,Henan 454003,China;School of Information Engineering,Beijing Institute of Graphic Communication,Beijing 102600,China)
出处 《计算机工程与应用》 CSCD 北大核心 2020年第21期103-107,共5页 Computer Engineering and Applications
基金 国家自然科学基金(No.61370188) 北京市教委科研计划重点项目(No.KZ201510015015,No.KZ201710015010) “十三五”国家密码发展基金(No.MMJJ20170122) 河南理工大学创新型科研团队(No.T2018-1)。
关键词 云存储 同态性 向量空间模型 整数向量加密 多关键词 cloud storage homomorphism vector space model integer vector encryption multiple keywords
  • 相关文献

参考文献6

二级参考文献54

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1240

同被引文献54

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部