期刊文献+

基于关键字的云加密数据隐私保护检索 被引量:8

Keyword-based Privacy-preserving Retrieval over Cloud Encrypted Data
下载PDF
导出
摘要 云计算技术的蓬勃发展,使得越来越多的企业和个人将数据外包存储到云端并通过云服务提供对数据的管理。查询是用户访问云端数据获取信息的必不可少的操作。这样,保护用户查询隐私和云端数据隐私以及快速提供满足用户需求的查询结果成为了关键问题。私有信息检索可使查询用户和数据库持有者在双方私有信息互不泄露的情况下完成查询操作。针对现有私有信息检索方案在云环境、大容量数据中的局限性,提出一个基于同态密码体制以及MapReduce的计算安全信息检索协议并使用批量查询方法降低协议通信复杂度。将提出的协议作为构建块,利用完美哈希函数工具构建基于关键字的云加密数据检索方案,方案兼具隐私性、查询的高效率以及基于关键字的实用性。 More and more organizations and individuals outsource their data storage into cloud and using cloud-based services provide data management.Query providing user capabilities of accessing cloud data and obtaining information,is an important component of cloud services.Thus,how to protect both privacy of user queries and data privacy in cloud while providing query services and eventually providing query results meeting needs quickly and timely has become a vital concern.The private information retrieval(PIR)protocol allows user to perform a query from a database without revealing his private information;meanwhile the privacy of the database will be protected.Corresponding to limitations encountered in the applications of existing PIR protocol in the cloud environment and large capacity data scenario,a computational PIR protocol based on additively homomorphic encryption scheme and MapReduce was proposed.The protocol uses the batch queries method to lower the communication complexity.Further,we used proposed protocol as the building-block as well as perfect hash function tool to construct a cloud keyword-based encrypted data retrieval scheme.The scheme combines high query efficiency and the practicality of keyword-based retrieval.
出处 《计算机科学》 CSCD 北大核心 2015年第S1期365-369 401,401,共6页 Computer Science
基金 科技支撑计划项目(2012BAH77F02 2012BAH77F05)资助
关键词 私有信息检索 加法同态加密 并行查询处理 关键字检索 Private information retrieval,Additively homomorphic encryption,Parallel query processes,Keyword-based
  • 相关文献

参考文献10

  • 1Paillier P.Public-key cryptosystems based on composite degree residuosity classes. Advances in Cryptology,Eurocrypt’99 . 1999
  • 2BUGIEL S,NURNBERGER S,SADEGHI A.Twin clouds:an archi-tecture for secure cloud computing. Workshop on Cryptographyand Security in Clouds . 2011
  • 3Pearson Siani,Yun Shen,Miranda Mowbray."A privacy manager forcloud computing.". Cloud Computing . 2009
  • 4Chang Y. C.Single Database Private Information Retrieval with LogarithmicCommunication. Information Security and Privacy:9th Australasian Conference . 2004
  • 5Blass W O,Pietro R D,Refik M,et al.PRISM-Privacy-preserving search in MapReduce. Privacy Enhancing Technologies . 2012
  • 6Vouk,M.A."Cloud computing—Issues. research and implementations". 30th In ternational Conference on Information Technology Interfaces,2008. ITI 2008 . 2008
  • 7Wayne A Jansen."Cloud Hooks: Security and Privacy Issues in Cloud Computing". 44th Hawaii InternationalConference on System Sciences . 2011
  • 8Kushilevitz E,Ostrovsky R.Replication is NOT needed:Single database, computationally-private information retrieval. IEEE Symposium on Foundations of Computer Science . 1997
  • 9Lipmaa,H.An oblivious transfer protocol with log-squared communication. Proceedings of ISC . 2005
  • 10Jeffrey Dean,Sanjay Ghemawat.MapReduce:simplified data processing on large clusters. Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation . 2004

共引文献1

同被引文献36

引证文献8

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部