浏览全部资源
扫码关注微信
1. 西安电子科技大学通信工程学院,陕西 西安 710071
2. 西安电子科技大学计算机学院,陕西 西安 710071
3. 西安电子科技大学网络与信息安全学院,陕西 西安 710071
4. 杭州师范大学理学院,浙江 杭州 310036
[ "孟倩(1989-),女,山东菏泽人,西安电子科技大学博士生,主要研究方向为密码学、图像加密与检索等。" ]
[ "马建峰(1963-),男,陕西西安人,博士,西安电子科技大学教授、博士生导师,主要研究方向为信息安全、密码学与无线网络安全等。" ]
[ "陈克非(1959-),男,陕西西安人,博士,杭州师范大学教授、博士生导师,主要研究方向为密码理论与应用、网络与信息安全技术等。" ]
[ "苗银宾(1988-),男,陕西西安人,博士,西安电子科技大学讲师,主要研究方向为信息安全与无线网络安全等。" ]
[ "杨腾飞(1987-),男,陕西咸阳人,西安电子科技大学博士生,主要研究方向为密码学、图像加密与检索等。" ]
网络出版日期:2018-04,
纸质出版日期:2018-04-25
移动端阅览
孟倩, 马建峰, 陈克非, 等. 基于云计算平台的物联网加密数据比较方案[J]. 通信学报, 2018,39(4):167-175.
Qian MENG, Jianfeng MA, Kefei CHEN, et al. Data comparable encryption scheme based on cloud computing in Internet of things[J]. Journal on communications, 2018, 39(4): 167-175.
孟倩, 马建峰, 陈克非, 等. 基于云计算平台的物联网加密数据比较方案[J]. 通信学报, 2018,39(4):167-175. DOI: 10.11959/j.issn.1000-436x.2018065.
Qian MENG, Jianfeng MA, Kefei CHEN, et al. Data comparable encryption scheme based on cloud computing in Internet of things[J]. Journal on communications, 2018, 39(4): 167-175. DOI: 10.11959/j.issn.1000-436x.2018065.
已有的短比较加密(SCE
short comparable encryption)方案能在确保物联网数据安全的前提下通过比较密文数据大小而推出明文数据大小。但 SCE 方案在密文比较以及生成标签的过程中会引入大量的计算和存储开销。为此,提出一种基于滑动窗口技术统一开窗的高效短比较加密(SCESW
short comparable encryption based on sliding window)方案。严格的安全分析表明,SCESW方案在标准模型下满足弱不可区分性且保障了数据的完整性和机密性。同时,实验性能分析表明,SCESW方案的存储开销是SCE方案的
<math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mn>1</mn> <mi>t</mi> </mfrac> <mo stretchy="false">(</mo><mi>t</mi><mi>></mi><mn>1</mn><mo stretchy="false">)</mo></math>
且效率高于SCE方案。
The previously proposed short comparable encryption (SCE) scheme can infer the plaintext relationship by comparing the ciphertexts relationship as well as ensuring data security in Internet of things.Unfortunately
it will incur high storage and computational burden during the process of comparing ciphertexts and generating tokens.To this end
an efficient short comparable encryption scheme called SCESW was proposed
which was utilizing the sliding window method with the same size window.Formal security analysis shows that the scheme can guarantee weak indistinguishability in standard model as well as data security and integrity.The experimental results demonstrate that the storage of the SCESW scheme is
<math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mn>1</mn> <mi>t</mi> </mfrac> <mo stretchy="false">(</mo><mi>t</mi><mi>></mi><mn>1</mn><mo stretchy="false">)</mo></math>
times shorter than that of the SCE scheme and the efficiency of the SCESW scheme is superior to that of the SCE scheme.
ATZORI L , IERA A , MORABITO G . The Internet of things:a survey [J ] . Computer Networks , 2010 , 54 ( 15 ): 2787 - 2805 .
AGRAWAL R , KIERNAN J , SRIKANT R , et al . Order preserving encryption for numeric data [C ] // ACM SIGMOD International Conference on Management of Data . 2004 : 563 - 574 .
AGRAWAL D , ABBADI A E , EMEKCI F , et al . Database management as a service:challenges and opportunities [C ] // International Conference on Data Engineering . 2009 : 1709 - 1716 .
KADHEM H , AMAGASA T , KITAGAWA H . A secure and efficient order preserving encryption scheme for relational databases [C ] // The International Conference on Knowledge Management and Information Sharing Valencia . 2010 : 25 - 35 .
LIU D , WANG S . Programmable order-preserving secure index for encrypted database query [C ] // International Conference on Cloud Computing . 2012 : 502 - 509 .
LEE S , TAE-JUN P , LEE D , et al . Chaotic order preserving encryption for efficient and secure queries on databases [J ] . IEICE Transactions on Information & Systems , 2009 , 92-D ( 11 ): 2207 - 2217 .
SHI E , BETHENCOURT J , CHAN T H H , et al . Multi-dimensional range query over encrypted data [C ] // 2007 IEEE Symposium on Security and Privacy . 2007 : 350 - 364 .
POPA R A , REDFIELD C M S , ZELDOVICH N , et al . CryptDB:protecting confidentiality with encrypted query processing [C ] // ACM Symposium on Operating Systems Principles . 2011 : 85 - 100 .
GAO Y , MIAO M , WANG J , et al . Secure approximate nearest neighbor search over encrypted data [C ] // Ninth International Conference on Broadband and Wireless Computing Communication and Applications . 2014 : 578 - 583 .
TANG Q , . Privacy preserving mapping schemes supporting comparison [C ] // The 2010 ACM Workshop on Cloud Computing Security Workshop . 2010 : 53 - 58 .
WANG C , CAO N , LI J , et al . Secure ranked keyword search over encrypted cloud data [C ] // International Conference on Distributed Computing System . 2010 : 253 - 262 .
DING Y , KLEIN K . Model-driven application-level encryption for the privacy of e-health data [C ] // Ares’10 International Conference on Availability Reliability and Security . 2010 : 341 - 346 .
FURUKAWA J . Request-based comparable encryption [M ] . Computer Security–ESORICS . 2013 : 129 - 146 .
FURUKAWA J , . Short comparable encryption [C ] // International Conference on Cryptology and Network Security . 2014 : 337 - 352 .
ZOU Q , WANG J , YE J , et al . Efficient and secure encrypted image search in mobile cloud computing [J ] . Soft Computing , 2016 : 1 - 11 .
ZHU Y , LIU L , CHEN X . Efficient first-price sealed-bid auction protocols from modified comparable encryption [C ] // International Conference on Broadband and Wireless Computing,Communication and Applications . 2015 : 417 - 421 .
GUO Z , FU Y , CAO C . Secure first-price sealed-bid auction scheme [J ] . EURASIP Journal on Information Security , 2017 , 2017 ( 1 ): 16 .
CHEN P , YE J , CHEN X . A new efficient request-based comparable encryption scheme [C ] // International Conference on Advanced Information Networking and Applications Workshops . 2015 : 436 - 439 .
KOÇC K . Analysis of sliding window techniques for exponentiation [J ] . Computers & Mathematics with Applications , 1995 , 30 ( 10 ): 17 - 24 .
0
浏览量
1304
下载量
4
CSCD
关联资源
相关文章
相关作者
相关机构