期刊文献+

云环境下可验证关键词密文检索研究综述 被引量:3

Research on Verifiable Keyword Search over Encrypted Cloud Data: A Survey
下载PDF
导出
摘要 云计算便捷高效的特点使其拥有巨大的发展潜力,越来越多的企业与个人通过使用云计算提供的各类外包服务而获得实际收益。为了保护云端外包数据的私密性和一致性,具有隐私保护能力的可验证密文检索技术正逐渐成为当前云计算领域的一个研究热点。针对关键词密文检索的一致性验证问题,阐述现有研究工作主要采用的系统模型、威胁模型和通用框架;从可验证单关键词密文检索和可验证多关键词密文检索两个角度,综述现有研究工作的技术方案,并分析这些技术方案的优缺点;最后,通过综合分析和对比现有研究工作的研究重点及其所使用的关键技术,对现有工作进行总结,并展望未来可能的研究方向和趋势。 The convenience and efficiency of cloud computing have brought great potential for its development.More and more enterprises and individuals obtain real benefits by using various outsourcing services provided by cloud computing.In order to protect the confidentiality and integrity of outsourced data in the cloud, the keyword search over encrypted cloud data with privacy protection and integrity verification is becoming a research hotspot in the field of cloud computing.In this paper, we focus on the issue of the verifiable keyword search over encrypted data.The system models, threat models and frameworks adopted in the existing works are firstly introduced.Related works are overviewed from the aspects of verifiable single keyword search and verifiable multi-keyword search over encrypted data, and the ideas of these works are briefly described together with the advantages and disadvantages.At last, the conclusion is presented through a comprehensive analysis and comparison of the related works, and the possible research directions and trends in the future are prospected.
作者 周倩 戴华 盛文杰 胡正 杨庚 ZHOU Qian;DAI Hua;SHENG Wen-jie;HU Zheng;YANG Geng(School of Modern Posts,Nanjing University of Posts and Telecommunications,Nanjing 210023,China;School of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing 210023,China;Jiangsu Key Laboratory of Big Data Security and Intelligent Processing,Nanjing 210023,China)
出处 《计算机科学》 CSCD 北大核心 2022年第10期272-278,共7页 Computer Science
基金 国家自然科学基金面上项目(61872197,61972209,61902199) 中国博士后自然科学基金项目(2019M651919) 南京邮电大学自然科学基金(NY217119,NY219142)。
关键词 云计算 隐私保护 一致性验证 关键词检索 Cloud computing Privacy protection Integrity verification Keyword search
  • 相关文献

参考文献4

二级参考文献13

共引文献17

同被引文献27

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部