浏览全部资源
扫码关注微信
1. 湖南大学信息科学与工程学院,湖南 长沙 410082
2. 湖南商学院旅游管理学院,湖南 长沙 410205
[ "吴志强(1977-),男,湖南涟源人,湖南大学博士生,主要研究方向为网络安全、并行计算。" ]
[ "李肯立(1971-),男,湖南娄底人,湖南大学教授、博士生导师,主要研究方向为并行计算、网格计算和DNA计算等。" ]
[ "郑蕙(1978-),女,湖南长沙人,湖南商学院讲师,主要研究方向为大数据安全、旅游电子商务。" ]
网络出版日期:2017-08,
纸质出版日期:2017-08-25
移动端阅览
吴志强, 李肯立, 郑蕙. 高效可扩展的对称密文检索架构[J]. 通信学报, 2017,38(8):79-93.
Zhi-qiang WU, Ken-li LI, Hui ZHENG. Efficient and scalable architecture for searchable symmetric encryption[J]. Journal on communications, 2017, 38(8): 79-93.
吴志强, 李肯立, 郑蕙. 高效可扩展的对称密文检索架构[J]. 通信学报, 2017,38(8):79-93. DOI: 10.11959/j.issn.1000-436x.2017166.
Zhi-qiang WU, Ken-li LI, Hui ZHENG. Efficient and scalable architecture for searchable symmetric encryption[J]. Journal on communications, 2017, 38(8): 79-93. DOI: 10.11959/j.issn.1000-436x.2017166.
现有可搜索加密方案通常索引的构建、检索效率不高,数据节点的维护不便,难以适应分布式密文检索要求。针对现有密文检索方案出现的一些问题,提出了可拆分密文倒排索引架构,改善了密文索引的并行构建性能,简化了数据增删维护过程,增强了与传动 NoSQL 系统的兼容性。采用检索结果集中化倒排索引方法,提高分布式密文检索系统检索效率。所提方案满足被广泛采用的选择关键词攻击下的不可区分性(IND-CKA)安全标准。结合 Cassandra 对多种性能进行了验证,实验数据表明,本架构对分布式、海量密文数据环境具有很好的适用性。
The existing encryption schemes were usua11y poor of index construction and maintenance,which was difficu1t to meet the retrieva1 requirements for distributed ciphertext.Aiming at the above shortage of existing schemes,a structure of separab1e ciphertext inverted index was proposed for improving the performance of para11e1 constructing cryptograph index,simp1ifying the data maintenance process,and increasing the compatibi1ity with the traditiona1 NoSQL system.The method of centra1ized inverted index was adopted to improve the retrieva1 efficiency of distributed retrieva1 system.Then,the proposed scheme was proved to meet the wide1y adopted IND-CKA security standard.Fina11y,Cassandra was combined to eva1uate the severa1 performance parameters,and the experimenta1 resu1ts show proposed architecture has good app1icabi1ity to the distributed and massive encrypted data environment.
SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data [C ] // IEEE Symposium on Security and Privacy IEEE Computer Society . 2000 : 44 - 55 .
GOH E J . Secure Indexes [J ] . IACR Cryptology ePrint Archive , 2003 , 2003 :216.
CURTMOLA R , GARAY J , KAMARA S , et al . Searchable symmetric encryption:improved definitions and efficient constructions [C ] // ACM Conference on Computer and Communications Security . ACM , 2006 : 895 - 934 .
KAMARA S , PAPAMANTHOU C , ROEDER T . Dynamic searchable symmetric encryption [C ] // ACM Conference on Computer & Communications Security . 2015 : 965 - 976 .
CHASE M , KAMARA S . Structured encryption and controlled disclosure [M ] . Advances in Cryptology-ASIACRYPT 2010 . Springer Berlin Heidelberg , 2010 : 577 - 594 .
LIESDONK P V , SEDGHI S , DOUMEN J , et al . Computationally efficient searchable symmetric encryption [C ] // Secure Data Management,VLDB Workshop,SDM 2010 . Singapore , 2010 : 87 - 100 .
CASH D , JAEGER J , JARECKI S , et al . Dynamic searchable encryption in very-large databases:data structures and implementation [C ] // Network and Distributed System Security Symposium . 2014 .
KAMARA S , PAPAMANTHOU C . Parallel and dynamic searchable symmetric encryption [M ] . Financial Cryptography and Data Security . Springer Berlin Heidelberg , 2013 : 258 - 274 .
KUROSAWA K , OHTAKI Y . UC-secure searchable symmetric encryption [J ] . Lecture Notes in Computer Science , 2012 , 7397 : 258 - 274 .
ELGAMAL T . A public key cryptosystem and a signature scheme based on discrete logarithms [J ] . IEEE Transactions on Information Theory , 1985 , 31 ( 4 ): 469 - 472 .
DIFFIE W , HELLMAN M E . New directions in cryptography [J ] . IEEE Transactions on Information Theory , 1976 , 22 ( 6 ): 644 - 654 .
CASH D , JARECKI S , JUTLA C , et al . Highly-scalable searchable symmetric encryption with support for boolean queries [M ] . Advances in Cryptolog-CRYPTO 2013 . Springer Berlin Heidelberg , 2013 : 353 - 373 .
FANG L , SUSILO W , GE C , et al . Public key encryption with keyword search secure against keyword guessing attacks without random oracle [J ] . Information Sciences An International Journal , 2013 , 238 ( 7 ): 221 - 241 .
POPA R A , REDFIELD C M S , ZELDOVICH N , et al . CryptDB:protecting confidentiality with encrypted query processing [C ] // SOSP . 2011 : 85 - 100 .
NAVEED M , KAMARA S , WRIGHT C V . Inference attacks on property-preserving encrypted databases [C ] // ACM Sigsac Conference on Computer and Communications Security . 2015 : 644 - 655 .
DIJK M V , GENTRY C , HALEVI S , et al . Fully homomorphic encryption over the integers [C ] // International Conference on Theory and Applications of Cryptographic Techniques . Springer-Verlag , 2010 : 24 - 43 .
STEFANOV E , VAN DIJK M , SHI E , et al . Path ORAM:an extremely simple oblivious RAM protocol [C ] // ACM Sigsac Conference on Computer & Communications Security . 2013 : 299 - 310 .
CATTELL . Scalable SQL and NoSQL data stores [J ] . ACM Sigmod Record , 2010 , 39 ( 4 ): 12 - 27 .
STEFANOV E , PAPAMANTHOU C , SHI E . Practical dynamic searchable encryption with small leakage [C ] // Network and Distributed System Security Symposium . 2014 .
LAKSHMAN A , MALIK P . Cassandra:a decentralized structured storage system [J ] . ACM Sigops Operating Systems Review , 2010 , 44 ( 2 ): 35 - 40 .
BELLARE M , BOLDYREVA A O'NEILL A . Deterministic and efficiently searchable encryption [C ] // International Cryptology Conference on Advances in Cryptology . Springer-Verlag , 2006 : 535 - 552 .
LI R , LIU A X , WANG A L , et al . Fast range query processing with strong privacy protection for cloud computing [J ] . IEEE/ACM Transactions on Networking , 2016 , 24 ( 4 ): 2305 - 2318 .
LI J , WANG Q , WANG C , et al . Fuzzy keyword search over encrypted data in cloud computing [J ] . In INFOCOM , 2012 , 3 ( 9 ): 1 - 5 .
CHASE M , SHEN E . Substring-searchable symmetric encryption [J ] . Proceedings on Privacy Enhancing Technologies , 2015 ( 2 ): 263 - 281 .
CAO N , WANG C , LI M , et al . Privacy-preserving multi-keyword ranked search over encrypted cloud data [J ] . IEEE Transactions on Parallel & Distributed Systems , 2011 , 25 ( 1 ): 829 - 837 .
XIA Z , WANG X , SUN X , et al . A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data [J ] . IEEE Transactions on Parallel & Distributed Systems , 2015 , 27 ( 2 ):1.
NAVEED M , PRABHAKARAN M , GUNTER C A . Dynamic searchable encryption via blind storage [C ] // S&P . 2014 : 639 - 654 .
LIU C , ZHU L , WANG M , et al . Search pattern leakage in searchable encryption:attacks and new construction [J ] . Information Sciences , 2014 , 265 ( 5 ): 176 - 188 .
0
浏览量
1604
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构