[1]朱艳琴,王琴琴,王婷婷,等.基于云计算的可查询加密研究综述[J].南京师大学报(自然科学版),2014,37(01):8.
 Zhu Yanqin,Wang Qinqin,Wang Tingting,et al.A Survey of Searchable Encryption Based on Cloud Computing[J].Journal of Nanjing Normal University(Natural Science Edition),2014,37(01):8.
点击复制

基于云计算的可查询加密研究综述()
分享到:

《南京师大学报(自然科学版)》[ISSN:1001-4616/CN:32-1239/N]

卷:
第37卷
期数:
2014年01期
页码:
8
栏目:
出版日期:
2014-03-30

文章信息/Info

Title:
A Survey of Searchable Encryption Based on Cloud Computing
作者:
朱艳琴王琴琴王婷婷罗喜召
苏州大学计算机科学与技术学院,江苏 苏州 215006
Author(s):
Zhu YanqinWang QinqinWang TingtingLuo Xizhao
School of Computer Science and Technology,Soochow University,Suzhou 215006,China
关键词:
云计算可查询加密密码学
Keywords:
cloud computingsearchable encryptioncryptography
分类号:
TP392
文献标志码:
A
摘要:
随着云计算时代的到来,吸引着人们将复杂的数据管理外包给云服务器端.在以更经济、更灵活方式管理数据的同时,个人隐私和数据安全问题一直令人担忧.加密是一种常用的维护数据隐私的方法,但它不支持有效的数据操作.可查询加密技术通过加密保证数据的安全性,同时也支持在密文上的某些计算,在一定程度上解决了云计算环境中的隐私保护和数据可用性问题.本文结合可查询加密的4种应用场景,对可查询加密的关键技术和安全问题进行了分析,并对已有的方案做了分类对比,指出了该领域面临的挑战和未来的研究方向.
Abstract:
With the advent of cloud computing,people are inspired to outsource their data management to the cloud server.While it is a more economical and more flexible way to manage data,privacy security issue has been worrisome.Encryption is a common method for maintaining data privacy,but it does not support efficient data manipulation.Searchable encryption(SE)ensures the security of data by encryption and also supports some computation on the ciphertext.To a certain extent,it solves the privacy protection and data availability in cloud computing environment.With four scenarios,this paper analyzes the main technologies and security problems for searchable encryption.Then classification and comparison on existing schemes are given.At last,the suggestions for future research are put forward.

参考文献/References:

[1] 史英杰,孟小峰.云数据管理系统中查询技术研究综述[J].计算机学报,2013,36(2):209-225.
[2]Song D X,Wagner D,Perrig A.Practical techniques for searches on encrypted data[C]//2000 IEEE Symposium on Security and Privacy.Berkeley,CA:IEEE,2000:44-55.
[3]Boneh D,Di Crescenzo G,Ostrovsky R,et al.Public key encryption with keyword search[C]//Advances in Cryptology-Eurocrypt 2004.Berlin Heidelberg:Springer,2004:506-522.
[4]Yang G,Tan C H,Huang Q,et al.Probabilistic public key encryption with equality test[C]//Topics in Cryptology-CT-RSA 2010.Berlin Heidelberg:Springer,2010:119-131.
[5]Tang Q.Towards public key encryption scheme supporting equality test with fine-grained authorization[C]//Information Security and Privacy.Berlin Heidelberg:Springer,2011:389-406.
[6]Tang Q.Public key encryption schemes supporting equality test with authorisation of different granularity[J].International Journal of Applied Cryptography,2012,2(4):304-321.
[7]Gentry C.A Fully Homomorphic Encryption Scheme[M].South Carolina:BiblioBazaar,2009.
[8]Raykova M,Vo B,Bellovin S M,et al.Secure anonymous database search[C]//Proceedings of the 2009 ACM Workshop on Cloud Computing Security.New York:ACM,2009:115-126.
[9]Agrawal R,Kiernan J,Srikant R,et al.Order preserving encryption for numeric data[C]//Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data.New York:ACM,2004:563-574.
[10]Boldyreva A,Chenette N,Lee Y,et al.Order-preserving symmetric encryption[C]//Advances in Cryptology-EUROCRYPT 2009.Berlin Heidelberg:Springer,2009:224-241.
[11]Tang Q.Privacy preserving mapping schemes supporting comparison[C]//Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop.New York:ACM,2010:53-58.
[12]Katz J,Lindell Y.Introduction to Modern Cryptography[M].Florida:CRC Press,2008.
[13]Mohamad M S,Poh G S.Verifiable structured encryption[C]//Information Security and Cryptology.Berlin Heidelberg:Springer,2013:137-156.
[14]Goldreich O,Ostrovsky R.Software protection and simulation on oblivious RAMs[J].Journal of the ACM(JACM),1996,43(3):431-473.
[15]Lu H,Gu D,Jin C,et al.Reducing extra storage in searchable symmetric encryption scheme[C]//2012 IEEE 4th International Conference on Cloud Computing Technology and Science(CloudCom).Taipei:IEEE Computer Society,2012:255-262.
[16]Yang Y,Lu H,Weng J.Multi-user private keyword search for cloud computing[C]//2011 IEEE Third International Conference on Cloud Computing Technology and Science(CloudCom).Athens:IEEE Computer Society,2011:264-271.
[17]Popa R A,Zeldovich N.Multi-key searchable encryption[J/OL].Cryptology ePrint Archive,Report 2013/508.[2013-10-10]http://eprint.iacr.org.
[18]Boneh D,Franklin M.Identity-based encryption from the Weil pairing[C]//Advances in Cryptology—CRYPTO 2001.Berlin Heidelberg:Springer,2001:213-229.
[19]Chang Y C,Mitzenmacher M.Privacy preserving keyword searches on remote encrypted data[C]//Applied Cryptography and Network Security.Berlin Heidelberg:Springer,2005:442-455.
[20]Curtmola R,Garay J,Kamara S,et al.Searchable symmetric encryption:improved definitions and efficient constructions[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.New York:ACM,2006:79-88.
[21]Smart N P,Vercauteren F.Fully homomorphic encryption with relatively small key and ciphertextsizes[C]//Public Key Cryptography–PKC 2010.Berlin Heidelberg:Springer,2010:420-443.
[22]Goh E J.Secure indexes[J/OL].Cryptology ePrint Archive,Report 2003/216.[2013-10-10]http://eprint.iacr.org.
[23]Bloom B H.Space/time trade-offs in hash coding with allowable errors[J].Communications of the ACM,1970,13(7):422-426.
[24]Berkovits S.How to broadcast a secret[C]//Advances in Cryptology—EUROCRYPT’91.Berlin Heidelberg:Springer,1991:535-541.
[25]Dong C,Russello G,Dulay N.Shared and searchable encrypted data for untrusted servers[C]//Data and Applications Security XXII.Berlin Heidelberg:Springer,2008:127-143.
[26]Boneh D,Kushilevitz E,Ostrovsky R,et al.Public key encryption that allows PIR queries[C]//Advances in Cryptology-CRYPTO 2007.Berlin Heidelberg:Springer,2007:50-67.
[27]Rhee H S,Park J H,Susilo W,et al.Trapdoor security in a searchable public-key encryption scheme with a designated tester[J].Journal of Systems and Software,2010,83(5):763-771.
[28]Tang Q,Chen L.Public-key encryption with registered keyword search[C]//Public Key Infrastructures,Services and Applications.Berlin Heidelberg:Springer,2010:163-178.
[29]Bellare M,Boldyreva A,O’Neill A.Deterministic and efficiently searchable encryption[C]//Advances in Cryptology-CRYPTO 2007.Berlin Heidelberg:Springer,2007:535-552.
[30]Ibraimi L,Nikova S,Hartel P,et al.Public-key encryption with delegated search[C]//Applied Cryptography and Network Security.Berlin Heidelberg:Springer,2011:532-549.
[31]Li J,Wang Q,Wang C,et al.Fuzzy keyword search over encrypted data in cloud computing[C]//2010 Proceedings IEEE INFOCOM.San Diego:IEEE,2010:1-5.
[32]Kamara S,Papamanthou C,Roeder T.Dynamic searchable symmetric encryption[C]//Proceedings of the 2012 ACM Conference on Computer and Communications Security.Raleigh:ACM,2012:965-976.
[33]Kamara S,Papamanthou C.Parallel and dynamic searchable symmetric encryption[C]//Financial Cryptography and Data Security.Berlin Heidelberg:Springer,2013:258-274.
[34]Chai Q,Gong G.Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers[C]//2012 IEEE International Conference on Communications(ICC).Ottawa:IEEE Computer Society,2012:917-922.

相似文献/References:

[1]施珺,李慧,周立东,等.基于云计算的安全数据存储研究[J].南京师大学报(自然科学版),2012,35(03):138.
 Shi Jun,Li Hui,Zhou Lidong.Research of Security Data Storage Based on Cloud Computing[J].Journal of Nanjing Normal University(Natural Science Edition),2012,35(01):138.
[2]许 波,彭志平,陈 珂,等.云计算中虚拟机管理系统的研究与开发[J].南京师大学报(自然科学版),2014,37(01):93.
 Xu Bo,Peng Zhiping,Chen Ke,et al.Research and Development of Virtual Machine Management System in Cloud Computing[J].Journal of Nanjing Normal University(Natural Science Edition),2014,37(01):93.
[3]苏淑霞.粒子群算法在云计算任务调度中的应用[J].南京师大学报(自然科学版),2014,37(04):145.
 Su Shuxia.Application of Particle Swarm Optimization Algorithmon Cloud Computing Task Scheduling[J].Journal of Nanjing Normal University(Natural Science Edition),2014,37(01):145.
[4]张 岚,何雪莹,曹芳东.互联网旅游企业云服务创新对品牌资产价值影响研究[J].南京师大学报(自然科学版),2020,43(02):78.[doi:10.3969/j.issn.1001-4616.2020.02.013]
 Zhang Lan,He Xueying,Cao Fangdong.Research on the Influence of Cloud Service Innovation ofInternet Tourism Enterprises on Brand Equity Value[J].Journal of Nanjing Normal University(Natural Science Edition),2020,43(01):78.[doi:10.3969/j.issn.1001-4616.2020.02.013]
[5]孙 鉴,吴隹伟,刘陈伟,等.一种基于改进人工鱼群的云计算任务调度算法[J].南京师大学报(自然科学版),2024,(01):91.[doi:10.3969/j.issn.1001-4616.2024.01.011]
 Sun Jian,Wu Zhuiwei,Liu Chenwei,et al.A Cloud Computing Task Scheduling Algorithm Based on Improved Artificial Fish Warm[J].Journal of Nanjing Normal University(Natural Science Edition),2024,(01):91.[doi:10.3969/j.issn.1001-4616.2024.01.011]

备注/Memo

备注/Memo:
收稿日期:2013-10-10.
基金项目:国家自然科学基金(61373164)、江苏省产学研前瞻性联合研究项目(BY2013030-06)、苏州市应用基础研究计划项目(SYG201238).
通讯联系人:朱艳琴,博士,教授,研究方向:计算机网络与信息安全.E-mai:yqzhu@suda.edu.cn
更新日期/Last Update: 2014-03-30