期刊文献+

云环境中语义感知密文检索研究综述

Research on Semantic-aware Ciphertext Rtrieval in Cloud Environments:A Survey
下载PDF
导出
摘要 随着云计算、大数据技术的不断发展,数据拥有者愈发倾向于将数据外包给云服务器。为了保证这些数据的安全,许多在云环境下进行的隐私保护密文检索技术被不断提出。但传统的隐私保护检索方案通常没有考虑关键词和文档之间的语义联系。为了解决这个问题,近年来,针对云环境的语义感知密文检索方案成为了研究的热点。针对基于云环境的语义感知密文检索问题,首先展示了现有研究工作主要采用的系统模型、安全模型和检索框架;接着按提取语义的核心技术对现有的语义感知密文检索方案进行分类并分别作研究和综述,阐述其优点与不足;最后,对现有研究工作进行总结,并对该领域未来的研究方向进行探讨。 With the continuous development of cloud computing and big data technology,data owners are increasingly inclined to outsource their data to cloud servers.In order to ensure the security of these data,many privacy-preserving ciphertext retrieval techniques in cloud environments have been proposed.However,the traditional privacy-preserving search schemes usually do not consider the semantic relationship between keywords and documents.To address this problem,in recent years,semantic-aware ciphertext retrieval schemes for cloud environments have become a research hotspot..This paper presents the existing research work on semantic-aware ciphertext retrieval in cloud environments,showcasing the system models,security models,and retrieval frameworks mainly adopted.It categorizes and summarizes existing semantic-aware searchable encryption schemes from the perspective of core technology for semantic expansion,illustrating their advantages and limitations.Finally,it concludes the existing research work and discusses future research directions in this field.
作者 刘源龙 戴华 李张晨 周倩 易训 杨庚 LIU Yuanlong;DAI Hua;LI Zhangchen;ZHOU Qian;YI Xun;YANG Geng(School of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing 210023,China;Jiangsu Key Laboratory of Big Data Security and Intelligent Processing,Nanjing 210023,China;School of Modern Posts,Nanjing University of Posts and Telecommunications,Nanjing 210023,China;School of Computing Technologies,RMIT University,Melbourne 3001,Australia)
出处 《计算机科学》 CSCD 北大核心 2024年第11期298-306,共9页 Computer Science
基金 国家自然科学基金面上项目(62372244,61972209,61872197) 江苏省研究生科研创新计划项目(KYCX22_0984)。
关键词 云计算 隐私保护 语义感知 关键词检索 可搜索加密 Cloud computing Privacy protection Semantic aware Keyword retrieval Searchable encryption
  • 相关文献

参考文献4

二级参考文献57

  • 1Song XD,Wagner D,Perrig A.Practical techniques for searches on encrypted data.In:Proc.of the IEEE Symp.on Security and Privacy.IEEE Press,2000.44-55.[doi:10.1109/SECPRI.2000.84B445].
  • 2Boneh D,Di Crescenzo G,Ostrovsky R,Persiano G.Public key encryption with keyword search.In:Camenisch LJ,Cachin C,eds.Proc.of the Advances in Cryptology-EUROCRYPT 2004.LNCS 3027,Berlin:Springer-Verlag,2004.506-522.[doi:10.1007/978-3-540-24676-3J0].
  • 3Feng DG,Zhang M,Zhang Y,Xu Z.Study on cloud computing security.Ruan Jian Xue Bao/Joumal of Softwase,2011,22(1):71-83(in Chinese with English abstract).http://www.jos.org.cn/1000-9B25/3958.htxn[doi:10.3724/SP.J.1001.2011.03958].
  • 4Goh E.Secure indexes.Technical Report,20037216,IACR ePrint Cryptography Archive,2003.http://eprinUacr.org/2003/216.
  • 5Chang Y,Mitzenmacher M.Privacy preserving keyword searches on remote encrypted data.In:Ioannidis J,Keromytis A,Yung M,eds.Proc.of the Applied Cryptography and Network Security.LNCS 3531,Berlin:Springer-Verlag,2004.391-421.[doi:10.1007/11496137一30].
  • 6Curtmola R,Garay J,Kamara S,Ostrovsky R.Searchable symmetric encryption:Improved definitions and efficient constructions.In:Proc.of the 13th ACM Conf.on Computer and Communications Security (CCS 2006).New York:ACM Press,2006.79-88.
  • 7Van Liesdonk P,Sedghi S,Doumen J,Hartel P,Jonker W.Computationally efficient searchable symmetric encryption.In:Jonker W,Petkovic M,eds.Proc.of the Secure Data Management.LNCS 6358,Berlin;Springer-Verlag,2010,87-100.[doi:10.1007/978-3-642-15546-8-7].
  • 8Kamara S,Papamanthou C,Roeder T.Dynamic searchable symmetric encryption.In:Proc.of the 19th ACM Conf.on Computer and Communications Security (CCS 2012).New York:ACM Press,2012.965-976.[doi;10.1145/2382196.2382298].
  • 9Kamara S,Papamanthou C.Parallel and dynamic searchable symmetric encryption.In:Sadeghi AR,ed.Proc.of the Financial Cryptography and Data Security.LNCS 7859,Berlin:Springer-Verlag,2013.258-274.[doi:10.1007/978-3-642-39884-122].
  • 10Golle P,Staddon J,Waters B.Secure conjunctive keyword search over encrypted data.In:Jakobsson Mj Yung M,Zhou J,eds.Proc.of the Applied Cryptography and Network Security.LNCS 3089,Berlin:Springer-Verlag,2004.31-45.[doi:10.1007/978-3-540-24852-1一3].

共引文献121

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部