一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機號碼
標題
留言內(nèi)容
驗證碼

云存儲中一種支持可驗證的模糊查詢加密方案

朱小玉 劉琴 王國軍

朱小玉, 劉琴, 王國軍. 云存儲中一種支持可驗證的模糊查詢加密方案[J]. 電子與信息學(xué)報, 2017, 39(7): 1741-1747. doi: 10.11999/JEIT160971
引用本文: 朱小玉, 劉琴, 王國軍. 云存儲中一種支持可驗證的模糊查詢加密方案[J]. 電子與信息學(xué)報, 2017, 39(7): 1741-1747. doi: 10.11999/JEIT160971
ZHU Xiaoyu, LIU Qin, WANG Guojun. Fuzzy Searchable Encryption Scheme Supporting Verification in Cloud Storage[J]. Journal of Electronics & Information Technology, 2017, 39(7): 1741-1747. doi: 10.11999/JEIT160971
Citation: ZHU Xiaoyu, LIU Qin, WANG Guojun. Fuzzy Searchable Encryption Scheme Supporting Verification in Cloud Storage[J]. Journal of Electronics & Information Technology, 2017, 39(7): 1741-1747. doi: 10.11999/JEIT160971

云存儲中一種支持可驗證的模糊查詢加密方案

doi: 10.11999/JEIT160971
基金項目: 

國家自然科學(xué)基金(61632009, 61472451, 61272151, 61402161)

Fuzzy Searchable Encryption Scheme Supporting Verification in Cloud Storage

Funds: 

The National Natural Science Foundation of China (61632009, 61472451, 61272151, 61402161)

  • 摘要: 針對當前可查詢加密方案大多不支持模糊查詢的不足,并且無法應(yīng)對惡意服務(wù)器的威脅,云計算亟需為用戶提供一種允許拼寫錯誤并且可以驗證查詢結(jié)果正確性的加密方案。同時考慮到云存儲中數(shù)據(jù)經(jīng)常更新,提出一種動態(tài)云存儲中支持可驗證的模糊查詢加密方案。該方案通過編輯距離生成模糊關(guān)鍵詞集,并基于偽隨機函數(shù)、隨機排列函數(shù)等技術(shù)構(gòu)建安全索引,從而保護用戶的數(shù)據(jù)隱私。通過RSA累加器和哈希函數(shù)驗證查詢結(jié)果的正確性,用于檢測惡意攻擊者的非法行為。安全分析證明該方案能夠保護用戶的隱私安全,并具有可驗證性。實驗結(jié)果表明該方案具有可行性與有效性。
  • SONG D X, WAGNER D, and PERRIG A. Practical techniques for searches on encrypted data[C]. IEEE Symposium on Security Privacy, Berkeley, CA, USA, 2000: 44-55.
    林鵬, 江頡, 陳鐵明. 云環(huán)境下關(guān)鍵詞搜索加密算法研究[J]. 通信學(xué)報, 2015, 36(Z1): 1-7. doi: 10.11959/j.issn.1000-436x. 2015307.
    LIN Peng, JIANG Jie, and CHEN Tieming. Application of keyword searchable encryption in cloud[J]. Journal on Communications, 2015, 36(Z1): 1-7. doi: 10.11959/j.issn. 1000-436x.2015307.
    CAO Ning, WANG Cong, LI Ming, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1): 222-233. doi: 10.1109/TPDS.2013.45.
    XIA Zhihua, WANG Xinhui, SUN Xingming, et al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(2): 340-352. doi: 10. 1109/TPDS.2015.2401003.
    FU Zhangjie, SUN Xingming, LIU Qi, et al. Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing[J]. IEICE Transactions on Communications, 2015, 98(1): 190-200. doi: 10.1587/transcom.E98.B.190.
    李真, 蔣瀚, 趙明昊. 一個自主授權(quán)的多用戶可搜索加密方案[J]. 計算機研究與發(fā)展, 2015, 52(10): 2313-2322. doi: 10.7544 /issn1000-1239.2015.20150504.
    LI Zhen, JIANG Han, and ZHAO Minghao. A discretionary searchable encryption scheme in multi-user settings[J]. Journal of Computer Research and Development, 2015, 52(10): 2313-2322. doi: 10.7544/issn1000-1239.2015.20150504.
    LI Jin, WANG Qian, WANG Cong, et al. Fuzzy keyword search over encrypted data in cloud computing[C]. IEEE International Conference on Computer Communications, San Diego, CA, USA, 2010: 1-5.
    CHAI Qi and GONG Guang. Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers[C]. IEEE International Conference on Communications, Ottawa, Canada, 2012: 917-922.
    WANG J, YU X, and ZHAO M. Fault-tolerant verifiable keyword symmetric searchable encryption in hybrid cloud[J]. International Journal of Network Security, 2015, 17(4): 471-483.
    SUN W, LIU X, LOU W, et al. Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data[C]. IEEE Conference on Computer Communications, Hong Kong, China, 2015: 2110-2118.
    ZHANG W, LIN Y, and GU Q. Catch you if you misbehave: Ranked keyword search results verification in cloud computing[J]. IEEE Transactions on Cloud Computing, 2015, 6(1): 1-14. doi: 10.1109/TCC.2015.2481389.
    KUROSAWA K and OHTAKI Y. UC-secure searchable symmetric encryption[C]. International Conference on Financial Cryptography and Data Security, Kralendijk, Bonaire, 2012: 285-298.
    KAMARA S, PAPAMANTHOU C, and ROEDER T. Dynamic searchable symmetric encryption[C]. ACM Conference on Computer and Communications Security, Raleigh, NC, USA, 2012: 965-976.
    KAMARA S and PAPAMANTHOU C. Parallel and dynamic searchable symmetric encryption[C]. International Conference on Financial Cryptography and Data Security, Okinawa, Japan, 2013: 258-274.
    KUROSAWA K and OHTAKI Y. How to update documents verifiably in searchable symmetric encryption[C]. International Conference on Cryptology and Network Security, Paraty, Brazil, 2013: 309-328.
    GENNARO R, HALEVI S, and RABIN T. Secure hash- and-sign signatures without the random oracle[C]. International Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech Republic, 1999: 123-139.
  • 加載中
計量
  • 文章訪問數(shù):  1533
  • HTML全文瀏覽量:  268
  • PDF下載量:  360
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2016-09-26
  • 修回日期:  2017-02-20
  • 刊出日期:  2017-07-19

目錄

    /

    返回文章
    返回