面向云环境的多关键词密文排序检索研究综述
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Research on Multi-keyword Ranked Search over Encrypted Cloud Data
  • 作者:戴华 ; 李啸 ; 朱向洋 ; 杨庚 ; 易训
  • 英文作者:DAI Hua;LI Xiao;ZHU Xiang-yang;YANG Geng;YI Xun;College of Computer Science & Technology,Nanjing University of Posts and Telecommunications;Jiangsu Key Laboratory of Big Data Security &Intelligent Processing;School of Science,Royal Melbourne Institute of Technology University;
  • 关键词:云外包 ; 数据隐私 ; 多关键词检索 ; 密文检索 ; 排序检索
  • 英文关键词:Outsourced cloud;;Data privacy;;Multi-keyword search;;Encrypted data search;;Ranked search
  • 中文刊名:JSJA
  • 英文刊名:Computer Science
  • 机构:南京邮电大学计算机学院;江苏省大数据安全与智能处理重点实验室;墨尔本皇家理工大学科学学院;
  • 出版日期:2019-01-15
  • 出版单位:计算机科学
  • 年:2019
  • 期:v.46
  • 基金:国家自然科学基金项目(61402014,61572263,61672297,61472193);; 江苏省自然科学项目(BK20151511,BK20161516);; 中国博士后科学基金项目(2015M581794);; 安徽省自然科学基金项目(1608085MF127);; 江苏省博士后科研资助计划(1501023C);; 南京邮电大学自然科学基金项目(NY217119)资助
  • 语种:中文;
  • 页:JSJA201901003
  • 页数:7
  • CN:01
  • ISSN:50-1075/TP
  • 分类号:13-19
摘要
随着云计算的广泛应用,面向数据或计算的外包服务模式越来越被业界所接受。为了保护数据拥有者外包数据的私密性,具备隐私保护能力的高效密文排序检索技术逐渐成为目前备受关注的一个研究热点。文中以面向云环境的多关键词密文排序检索技术为关注重点,介绍了现有研究工作的系统模型和威胁模型,并描述了模型中关于隐私保护、检索效率与准确率、检索结果完整性等的问题;全面分析了现有工作中典型的多关键词密文排序检索方法及相关扩展研究,讨论并梳理了这些方法的核心思想;最后,对现有研究工作进行了总结,并给出了该研究领域中待解决的关键性问题和未来的研究方向。
        With the extensive development of cloud computing,storage and/or computing outsourcing services are becoming more and more acceptable nowadays.To protect the privacy of outsourced data,the privacy-preserving multikeyword ranked search scheme over encrypted cloud data is focused by researches,which turns to be a hot spot recently.This paper introduced the system model and threat model of existing work,and gave the problem description about privacy-preserving,search efficiency and accuracy,search result completeness,etc.Typical works and extended research about multi-keyword ranked search were studied,and the main ideas of those methods were discussed in detail.Finally,the conclusions about current works were given,and the future research directions were proposed simultaneously.
引文
[1]LI H,SUN W H,LI F H,et al.Secure and Privacy-Preserving Data Storage Service in Public Cloud[J].Journal of Computer Research and Development,2014,51(7):1397-1409.(in Chinese)李晖,孙文海,李凤华,等.公共云存储服务数据安全及隐私保护技术综述[J].计算机研究与发展,2014,51(7):1397-1409.
    [2]ZHANG Y Q,WANG X F,LIU X F,et al.Survey on Cloud Computing Security[J].Journal of Software,2016,27(6):1328-1348.(in Chinese)张玉清,王晓菲,刘雪峰,等.云计算环境安全综述[J].软件学报,2016,27(6):1328-1348.
    [3]HASHIZUME K,ROSADO D G,FERNNDEZ-MEDINA E,et al.An analysis of security issues for cloud computing[J].Journal of Internet Services and Applications,2013,4(1):1-13.
    [4]FERNANDES D A B,SOARES L F B,GOMES J V,et al.Security issues in cloud environments:a survey[J].International Journal of Information Security,2014,13(2):113-170.
    [5]ESPOSITO C,CASTIGLIONE A,POP F,et al.Challenges of Connecting Edge and Cloud Computing:A Security and Forensic Perspective[J].IEEE Cloud Computing,2017,4(2):13-17.
    [6]MIAO Y,MA J,LIU X,et al.m2-ABKS:Attribute-Based MultiKeyword Search over Encrypted Personal Health Records in Multi-Owner Setting[J].Journal of Medical Systems,2016,40(11):1-12.
    [7]ZHANG L L,ZHANG Y Q,LIU X F,et al.Efficient Conjunctive Keyword Search over Encrypted Electronic Medical Records[J].Journal of Software,2016,27(6):1577-1591.(in Chinese)张丽丽,张玉清,刘雪峰,等.对加密电子医疗记录有效的连接关键词的搜索[J].软件学报,2016,27(6):1577-1591.
    [8]YANG Y,MA M.Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for ehealth clouds[J].IEEE Transactions on Information Forensics and Security,2016,11(4):746-759.
    [9]WANG G F,LIU C Y,PAN H Z,et al.Survey on Insider Threats to Cloud Computing[J].Chinese Journal of Computers,2017,40(2):296-316.(in Chinese)王国峰,刘川意,潘鹤中,等.云计算模式内部威胁综述[J].计算机学报,2017,40(2):296-316.
    [10]TIAN H L,ZHANG Y,LI C,et al.A Survey of Confidentiality Protection for Cloud Databases[J].Chinese Journal of Computers,2017,40(10):2245-2270.(in Chinese)田洪亮,张勇,李超,等.云环境下数据库机密性保护技术研究综述[J].计算机学报,2017,40(10):2245-2270.
    [11]KHALIL I M,KHREISHAH A,AZEEM M.Cloud computing security:a survey[J].Computers,2014,3(1):1-35.
    [12]SINGH S,JEONG Y S,PARK J H.A survey on cloud computing security:Issues,threats,and solutions[J].Journal of Network and Computer Applications,2016,75(1):200-222.
    [13]LI J W,JIA C F,LIU Z L,et al.Survey on the Searchable Encryption[J].Journal of Software,2015,26(1):109-128.(in Chinese)李经纬,贾春福,刘哲理,等.可搜索加密技术研究综述[J].软件学报,2015,26(1):109-128.
    [14]DONG X L,ZHOU J,CAO Z F,et al.Research Advances on Secure Searchable Encryption[J].Journal of Computer Research and Development,2017,54(10):2107-2120.(in Chinese)董晓蕾,周俊,曹珍富,等.可搜索加密研究进展[J].计算机研究与发展,2017,54(10):2107-2120.
    [15]CAO N,WANG C,LI M,et al.Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data[C]∥30th IEEE Annual Conference on Computer Communications(IN-FOCOM).IEEE,2011:829-837.
    [16]WONG W K,CHEUNG D W,KAO B,et al.Secure knn computation on encrypted databases[C]∥2009ACM SIGMOD International Conference on Management of Data.ACM,2009:139-152.
    [17]CAO N,WANG C,LI M,et al.Privacy-preserving multi-keyword ranked search over encrypted cloud data[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(1):222-233.
    [18]FU Z,SUN X,LIU Q,et al.Achieving efficient cloud search services:multi-keyword ranked search over encrypted cloud data supporting parallel computing[J].IEICE Transactions on Communications,2015,98(1):190-200.
    [19]SUN W,WANG B,CAO N,et al.Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking[C]∥8th ACM SIGSAC Symposium on Information,Computer and Communications Security.ACM,2013:71-82.
    [20]XIA Z,WANG X,SUN X,et al.A secure and dynamic multikeyword ranked search scheme over encrypted cloud data[J].IEEE Transactions on Parallel and Distributed Systems,2016,27(2):340-352.
    [21]SALTON G,HARMAN D.Information retrieval[M].New York:John Wiley and Sons Ltd.,2003.
    [22]CHEN C,ZHU X J,SHEN P S,et al.An Efficient Privacy-Preserving Ranked Keyword Search Method[J].IEEE Transactions on Parallel and Distributed Systems,2016,27(4):951-963.
    [23]ZHU X Y,DAI H,YI X,et al.MUSE:An Efficient and Accurate Verifiable Privacy-preserving Multi-Keyword Text Search over Encrypted Cloud Data[J].Security and Communication Networks,2017,2017(2):1-17.
    [24]LI J,WANG Q,WANG C,et al.Fuzzy Keyword Search over Encrypted Data in Cloud Computing[J].International Journal of Engineering Research and Applications,2014,4(7):441-445.
    [25]WANG C,REN K,YU S,et al.Achieving usable and privacy-assured similarity search over outsourced cloud data[C]∥31st IEEE Conference on Computer Communications(INFOCOM).IEEE,2012:451-459.
    [26]LI J G,TIAN X X,ZHOU A Y,et al.Privacy Preserving Fuzzy Keyword Search in Database as a Service Paradigm[J].Chinese Journal of Computers,2016,39(2):414-428.(in Chinese)李晋国,田秀霞,周傲英,等.面向DaaS保护隐私的模糊关键词查询[J].计算机学报,2016,39(2):414-428.
    [27]YANG Y,YANG S L,KE M,et al.Ranked Fuzzy Keyword Search Based on Simhash over Encrypted Cloud Data[J].Chinese Journal of Computers,2017,40(2):431-444.(in Chinese)杨旸,杨书略,柯闽,等.加密云数据下基于Simhash的模糊排序搜索方案[J].计算机学报,2017,40(2):431-444.
    [28]DEY A,JENAMANI M,THAKKAR J J,et al.Lexical TF-IDF:An n-gram Feature Space for Cross-Domain Classification of Sentiment Reviews[C]∥International Conference on Pattern Recognition and Machine Intelligence.Springer,Cham,2017:380-386.
    [29]WANG B,YU S,LOU W,et al.Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud[C]∥33rd IEEE Conference on Computer Communications(INFOCOM).IEEE,2014:2112-2120.
    [30]GGE C,WAAGE T,HOMANN D,et al.Improving Fuzzy Searchable Encryption with Direct Bigram Embedding[C]∥Trust,Privacy and Security in Digital Business.Cham:Springer,2017:115-129.
    [31]FU Z,WU X,GUAN C,et al.Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement[J].IEEE Transactions on Information Forensics and Security,2016,11(12):2706-2716.
    [32]WANG K X,LI Y X,ZHOU F C,et al.Multi-keyword fuzzy Search over Encrypted Data[J].Journal of Computer Research and Development,2017,54(2):348-360.(in Chinese)王恺璇,李宇溪,周福才,等.面向多关键词的模糊密文搜索方法[J].计算机研究与发展,2017,54(2):348-360.
    [33]SHI X J,HU S P.Fuzzy Multi-Keyword Query on Encrypted Data in the Cloud[C]∥4th International Conference on Applied Computing and Information Technology/3rd International Conference on Computational Science/Intelligence and Applied Informatics/1st International Conference on Big Data,Cloud Computing,Data Science&Engineering(ACIT-CSII-BCD).IEEE,2016:419-425.
    [34]KRISHNA C R,MITTAL S A.Privacy Preserving synonym based fuzzy multi-keyword ranked search over encrypted cloud data[C]∥2016IEEE International Conference on Computing,Communication and Automation(ICCCA).IEEE,2016:1187-1194.
    [35]WANG J,YU X,ZHAO M,et al.Privacy-Preserving Ranked Multi-keyword Fuzzy Search on Cloud Encrypted Data Supporting Range Query[J].Arabian Journal for Science&Engineering,2015,40(8):2375-2388.
    [36]FU Z,SUN X,LINGE N,et al.Achieving effective cloud search services:multi-keyword ranked search over encrypted cloud data supporting synonym query[J].IEEE Transactions on Consumer Electronics,2014,60(1):164-172.
    [37]XIA Z,ZHU Y,SUN X,et al.Secure semantic expansion based search over encrypted cloud data supporting similarity ranking[J].Journal of Cloud Computing Advances Systems&Applications,2014,3(1):1-11.
    [38]FU Z J,SUN X M,JI S,et al.Towards efficient content-aware search over encrypted outsourced data in cloud[C]∥33rd IEEEConference on Computer Communications(INFOCOM).IEEE,2016:1-9.
    [39]FU Z,HUANG F,REN K,et al.Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data[J].IEEE Transactions on Information Forensics and Security,2017,12(8):1874-1884.
    [40]SAINI V,CHALLA R K,KHAN N S,et al.An Efficient Multikeyword Synonym-Based Fuzzy Ranked Search Over Outsourced Encrypted Cloud Data[C]∥9th International Conference on Advanced Computing and Communication Technologies(ICAC-CT).2016:433-441.
    [41]FU Z,SUN X,XIA Z,et al.Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing[C]∥32nd IEEE International Performance,Computing,and Communications Conference(IPCCC).IEEE,2013:1-8.
    [42]ZHAO R,LI H,YANG Y,et al.Privacy-preserving personalized search over encrypted cloud data supporting multi-keyword ranking[C]∥6th International Conference on Wireless Communications and Signal Processing(WCSP).IEEE,2014:1-6.
    [43]FU Z,REN K,SHU J,et al.Enabling personalized search over encrypted outsourced data with efficiency improvement[J].IEEE Transactions on Parallel and Distributed Systems,2016,27(9):2546-2559.
    [44]GENNARO R,GENTRY C,PARNO B,et al.Non-Interactive verifiable computing:outsourcing computation to untrusted workers[C]∥30th International Cryptology Conference(CRYPTO).2010:465-482.
    [45]SUN W,WANG B,CAO N,et al.Verifiable privacy-preserving multi-keyword text search in the cloud supporting similaritybased ranking[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(11):3025-3035.
    [46]WAN Z,DENG R H.VPSearch:Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data[J].IEEE Transactions on Dependable and Secure Computing,2016,PP(99):1-12.