浏览全部资源
扫码关注微信
1. 北京邮电大学计算机学院,北京 100876
2. 北京邮电大学网络安全学院,北京 100876
[ "王娜(1988- ),女,湖南衡阳人,北京邮电大学在站博士后,主要研究方向为密码算法及安全协议、物联网安全、云计算安全、大数据隐私保护、移动互联网安全等" ]
[ "郑坤(1996- ),男,辽宁葫芦岛人,北京邮电大学硕士生,主要研究方向为移动边缘计算安全、雾计算与云计算安全、大数据隐私保护、可信计算等" ]
[ "付俊松(1989- ),男,河北唐山人,博士,北京邮电大学助理教授,主要研究方向为云计算、分布式网络安全、信息检索、隐私保护、软件安全等" ]
[ "李剑(1976- ),男,陕西西安人,博士,北京邮电大学教授,主要研究方向为智能网络安全、量子密码学、移动通信安全、物联网安全等" ]
网络出版日期:2020-07,
纸质出版日期:2020-07-25
移动端阅览
王娜, 郑坤, 付俊松, 等. 基于分块的移动边缘计算密文检索方法[J]. 通信学报, 2020,41(7):95-102.
Na WANG, Kun ZHENG, Junsong FU, et al. Method of ciphertext retrieval in mobile edge computing based on block segmentation[J]. Journal on communications, 2020, 41(7): 95-102.
王娜, 郑坤, 付俊松, 等. 基于分块的移动边缘计算密文检索方法[J]. 通信学报, 2020,41(7):95-102. DOI: 10.11959/j.issn.1000-436x.2020142.
Na WANG, Kun ZHENG, Junsong FU, et al. Method of ciphertext retrieval in mobile edge computing based on block segmentation[J]. Journal on communications, 2020, 41(7): 95-102. DOI: 10.11959/j.issn.1000-436x.2020142.
针对云计算密文检索方案的效率问题,提出了基于分块的移动边缘计算密文检索方案。首先,引入了边缘服务器计算文档相似性得分,从而减少了云服务器的计算开销,提升了云服务器的处理效率;其次,在MRSE方案基础上通过分块方法过滤掉大部分与查询无关的关键词,从而提高了计算文档相似性得分的效率。理论分析和实验结果表明,所提方案在已知背景威胁模型下是安全的,与现有方案相比,所提方案在具有相同安全性的同时具有更高的检索效率。
Aiming at the efficiency of cloud computing ciphertext retrieval scheme
a method of ciphertext retrieval in mobile edge computing based on block segmentations was proposed.Firstly
the edge server was introduced to calculate the document similarity score
thereby the computational cost of cloud server was reduced and the processing efficiency of cloud server was improved.Secondly
most keywords that are not related to the query were filtered out by a method of block segmentations based on the MRSE scheme
thereby the efficiency of calculating the document similarity score was improved.Theoretical analysis and experimental results show that the solution is safe under the known background threat model.Compared with the existing scheme
the proposed scheme has the same security and higher retrieval efficiency.
WANG N , FU J , BHARGAVA B , et al . Efficient retrieval over documents encrypted by attributes in cloud computing [J ] . IEEE Transactions on Information Forensics and Security , 2018 , 13 ( 10 ): 2653 - 2667 .
HASHEM I A T , YAQOOB I , ANUAR N B , et al . The rise of “big data” on cloud computing:review and open research issues [J ] . Information Systems , 2015 , 47 : 98 - 115 .
张佳乐 , 赵彦超 , 陈兵 , 等 . 边缘计算数据安全与隐私保护研究综述 [J ] . 通信学报 , 2018 , 39 ( 3 ): 1 - 21 .
ZHANG J L , ZHAO Y C , CHEN B , et al . Survey on data security and privacy-preserving for the research of edge computing [J ] . Journal on Communications , 2018 , 39 ( 3 ): 1 - 21 .
贾维嘉 , 周小杰 . 雾计算的概念、相关研究与应用 [J ] . 通信学报 , 2018 , 39 ( 5 ): 153 - 165 .
JIA W J , ZHOU X J . Concepts,issues,and applications of fog computing [J ] . Journal on Communications , 2018 , 39 ( 5 ): 153 - 165 .
SATYANARAYANAN M . The emergence of edge computing [J ] . Computer , 2017 , 50 ( 1 ): 30 - 39 .
ROMAN R , LOPEZ J , MAMBO M . Mobile edge computing,fog et al.:a survey and analysis of security threats and challenges [J ] . Future Generation Computer Systems , 2018 , 78 : 680 - 698 .
FAN K , YIN J , ZHANG K , et al . EARS-DM:efficient auto correction retrieval scheme for data management in edge computing [J ] . Sensors , 2018 , 18 ( 11 ):3616.
MIAO Y , MA J , LIU X , et al . Lightweight fine-grained search over encrypted data in fog computing [J ] . IEEE Transactions on Services Computing , 2018 , 12 ( 5 ): 772 - 785 .
WANG N , FU J , LI J , et al . Source-location privacy protection based on anonymity cloud in wireless sensor networks [J ] . IEEE Transactions on Information Forensics and Security , 2019 , 15 ( 1 ): 100 - 114 .
WANG C , WANG Q , REN K , et al . Privacy-preserving public auditing for data storage security in cloud computing [C ] // Proceedings of International Conference on Computer Communications . Piscataway:IEEE Press , 2010 : 1 - 9 .
ESPOSITO C , CASTIGLIONE A , POP F , et al . Challenges of connecting edge and cloud computing:a security and forensic perspective [J ] . IEEE Cloud Computing , 2017 , 4 ( 2 ): 13 - 17 .
KHALIL I M , KHREISHAH A , AZEEM M . Cloud computing security:a survey [J ] . Computers , 2014 , 3 ( 1 ): 1 - 35 .
SINGH S , JEONG Y S , PARK J H . A survey on cloud computing security:issues,threats,and solutions [J ] . Journal of Network and Computer Applications , 2016 , 75 : 200 - 222 .
CHANG Y C , MITZENMACHER M . Privacy preserving keyword searches on remote encrypted data [C ] // International Conference on Applied Cryptography and Network Security . Berlin:Springer , 2005 : 442 - 455 .
CURTMOLA R , GARAY J , KAMARA S , et al . Searchable symmetric encryption:improved definitions and efficient constructions [J ] . Journal of Computer Security , 2011 , 19 ( 5 ): 895 - 934 .
WANG C , CAO N , REN K , et al . Enabling secure and efficient ranked keyword search over outsourced cloud data [J ] . IEEE Transactions on Parallel and Distributed Systems , 2011 , 23 ( 8 ): 1467 - 1479 .
CAO N , WANG C , LI M , et al . Privacy-preserving multi-keyword ranked search over encrypted cloud data [J ] . IEEE Transactions on Parallel and Distributed Systems , 2014 , 25 ( 1 ): 222 - 233 .
WONG W K , CHEUNG D W , KAO B , et al . Secure kNN computation on encrypted databases [C ] // Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data . New York:ACM Press , 2009 : 139 - 152 .
SUN W , WANG B , CAO N , et al . Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking [C ] // Proceedings of the 8th ACM SIGSAC Symposium on Information,Computer and Communications Security . New York:ACM Press , 2013 : 71 - 82 .
FU Z , SUN X , LIU Q , et al . Achieving efficient cloud search services:multi-keyword ranked search over encrypted cloud data supporting parallel computing [J ] . IEICE Transactions on Communications , 2015 , 98 ( 1 ): 190 - 200 .
XIA Z , WANG X , SUN X , et al . A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data [J ] . IEEE Transactions on Parallel and Distributed Systems , 2015 , 27 ( 2 ): 340 - 352 .
CHEN C , ZHU X , SHEN P , et al . An efficient privacy-preserving ranked keyword search method [J ] . IEEE Transactions on Parallel and Distributed Systems , 2016 , 27 ( 4 ): 951 - 963 .
WODI B H , LEUNG C K , CUZZOCREA A , et al . Fast privacy-preserving keyword search on encrypted outsourced data [C ] // IEEE International Conference on Big Data . Piscataway:IEEE Press , 2019 : 1 - 10 .
徐光伟 , 史春红 , 王文涛 , 等 . 基于语义扩展的多关键词可搜索加密算法 [J ] . 计算机研究与发展 , 2019 , 56 ( 10 ): 2193 - 2206 .
XU G W , SHI C H , WANG W T , et al . Multi-keyword searchable encryption algorithm based on semantic extension [J ] . Journal of Computer Research and Development , 2019 , 56 ( 10 ): 2193 - 2206 .
CHEN J , HE K , DENG L , et al . EliMFS:achieving efficient,leakage-resilient,and multi-keyword fuzzy search on encrypted cloud data [J ] . IEEE Transactions on Services Computing , 2017 , 99 ( 99 ):1.
ZHONG H , LI Z , XU Y , et al . Two-stage index-based central keyword-ranked searches over encrypted cloud data [J ] . Science China Information Sciences , 2020 , 63 ( 3 ): 1 - 3 .
FU S , ZHANG Q , JIA N , et al . A privacy-preserving fuzzy search scheme supporting logic query over encrypted cloud data [J ] . Mobile Networks and Applications , 2020 ( 4 ): 1 - 12 .
GUAN Z , LIU X , WU L , et al . Cross-lingual multi-keyword rank search with semantic extension over encrypted data [J ] . Information Sciences , 2020 , 514 : 523 - 540 .
MU Y , YAO H . Encrypted data retrieval scheme based on bloom filter [C ] // Proceedings of the 18th International Symposium on Distributed Computing and Applications for Business Engineering and Science . Piscataway:IEEE Press , 2019 : 249 - 252 .
SALTON G , WONG A , YANG C S . A vector space model for automatic indexing [J ] . Communications of the ACM , 1975 , 18 ( 11 ): 613 - 620 .
ZERR S , DEMIDOVA E , OLMEDILLA D , et al . Zerber:r-confidential indexing for distributed documents [C ] // Proceedings of the 11th International Conference on Extending Database Technology:Advances in database technology . New York:ACM Press , 2008 : 287 - 298 .
0
浏览量
956
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构