期刊文献+

安全云环境中一种改进的多关键字检索方案

AN IMPROVED MULTI-KEYWORD SEARCH SCHEME IN SECURE CLOUD ENVIRONMENT
在线阅读 下载PDF
导出
摘要 为了降低硬件购置成本,许多机构倾向于使用稳健快速的云服务将他们的数据转包出去。然而,外包数据可能含有需要防护的敏感数据,而云提供商并不能可靠地满足这一要求。因此,必须采取防护措施,以保护敏感数据不受到云服务器和其他未授权机构的破坏。针对该问题,提出一种基于minhash函数的高效加密云数据隐私保护多关键字检索方法。该方法根据数据所有者生成并外包给云服务器的加密可检索索引进行加密云检索。已知检索内容后,服务器采用tf-idf加权法将检索内容与可检索索引相比较,除了鉴于隐私因素可被泄露的信息外,不需其他信息即可返回结果。基于公开的Enron数据集的仿真实验结果表明,该方法可保证用户只会检索到最相关的条目,不会对用户造成不必要的通信和计算负担。另外,在检索精度方面,也要优于现有的方法。 In order to reduce the purchase cost of hardware,many organisations tend to outsource their data utilising robust and fast services of clouds. However,the outsourced data may contain sensitive information that needs to be hidden. With which the cloud providers are not necessarily trusted. Therefore,some precautions are required to protect the sensitive data from being destroyed by both the cloud server and any other non-authorised party. To solve this problem,in this paper we propose a minhash function-based efficient privacypreserving and multi-keyword search method over encrypted cloud data. Search over encrypted cloud is performed through an encrypted searchable index that is generated by the data owner and outsourced to a cloud server. Given a querying content,by the weighted method of tf- idf,the server compares the content with the searchable index and returns the results without learning anything other than the information that is allowed to be leaked due to privacy factors. Results of simulative experiment based on open Enron data sets show that,this approach ensures that only the most relevant items are retrieved by the user with no unnecessary communication and computation burden on the user. In addition,the proposed method is better than the existing method in terms of the retrieval accuracy.
作者 郭秋滟
出处 《计算机应用与软件》 CSCD 2016年第4期103-107,168,共6页 Computer Applications and Software
关键词 云服务 minhash函数 隐私保护 检索 tf-idf加权法 检索精度 Services of clouds minhash functions Privacy-preserving Search The weighted method of tf-idf Retrieval accuracy
  • 相关文献

参考文献15

  • 1Wang C,Cao N,Li J,et al.Secure ranked keyword search over encrypted cloud data[C]//ICDCS’10,2010:253-262.
  • 2Kuzu M,Islam M S,Kantarcioglu M.Efficient similarity search over encrypted data[C]//Proceedings of the 2012 IEEE 28thInternational Conference on Data Engineering,ser.ICDE’12,2012:1156-1167.
  • 3Orencik C,Savas E.Efficient and secure ranked multi-keyword search on encrypted cloud data[C]//Proceedings of the 2012 Joint EDBT/ICDT Workshops.ACM,2012:186-195.
  • 4Cao N,Wang C,Li M,et al.Privacy-preserving multi-keyword ranked search over encrypted cloud data[C]//IEEE INFOCOM,2011:456-465.
  • 5孔凡新,刘丽.云环境下的隐私保护密文排序查询[J].计算机工程与设计,2014,35(1):47-50. 被引量:3
  • 6Ogata W,Kurosawa K.Oblivious keyword search[J].Journal of Complexity,2004,20(3):356-371.
  • 7Raykova M,Vo B,Bellovin S M,et al.Secure anonymous database search[C]//Proceedings of the 2009 ACM workshop on Cloud computing security,ser.CCSW 2009,ACM,2009:115-126.
  • 8程芳权,彭智勇,宋伟,王书林,崔一辉.云环境下一种隐私保护的高效密文排序查询方法[J].计算机学报,2012,35(11):2215-2227. 被引量:20
  • 9李倩,岳风顺,王国军.安全云存储中高效的多关键词查找方案[J].计算机科学,2012,39(12):158-161. 被引量:9
  • 10Chen Z,Wu C,Wang D,et al.Conjunctive keywords searchable encryption with efficient pairing,constant ciphertext and short trapdoor[C]//PAISI,2012:176-189.

二级参考文献46

  • 1史美林,姜进磊,孙瑞志,向勇(译).云计算[M].北京:机械工业出版社,2009.
  • 2Vaquero L M, Rodero-Merino L, Caeeres J, Lindner M A. A break in the clouds: Towards a cloud definition. ACM SIGCOMM Computer Communication Review, 2009, 39 (1) : 50-55.
  • 3Kamara S, Lauter K. Cryptographic cloud storage//Proceed ings of the Financial Cryptography Workshops. Tenerife, Canary Islands,Spain, 2010:136-149.
  • 4Cao Ning, Wang Cong, Li Ming, Ren Kui, Lou Wenjing. Privacy-preserving multi-keyword ranked search over encrypted cloud data//Proeeedings of the 30th IEEE Interna tional Conference on Computer Communications (INFOCOM 2011). Washington, USA, 2011:829-837.
  • 5Hacigumus H, Iyer B, Mehrotra S. Providing database as a serviee//Proceedings of the 18th International Conference on Data Engineering (ICDE 2002). San Jose, CA, USA, 2002: 29-40.
  • 6Song D, Wagner D, Perrig A. Practical techniques for sear- ches on encrypted data//Proceedings of the IEEE Symposium on Security and Privacy (S&P 2000). Berkeley, California, USA, 2000:44-55.
  • 7Wong W K, Cheung D W, Kao B, Mamoulis N. Secure kNN computation on encrypted databases//Proceedings of the 35th International Conference on Management of Data (SIGMOD 2009). Providence, Rhode Island, USA, 2009: 139-152.
  • 8Goh E J. Secure indexes. Cryptology ePrint Archive, 2003. http: //eprint. iacr. org/2003/216.
  • 9Boneh D, Crescenzo G, Ostrovsky R, Persiano G. Public key encryption with keyword search//Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques ( EUROCRYPT 2004). Interlaken, Switzerland, 2004: 506-522.
  • 10Boneh D, Kushilevitz E, Ostrovsky R, Skeith III W E. Pub- lie key eneryption that allows PIR queries//Proceedings of the 27th Annual International Cryptology Conference (CRYPTO 2007). Santa Barbara, CA, USA, 2007:50-67.

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部