网络与信息安全学报 ›› 2017, Vol. 3 ›› Issue (1): 13-22.doi: 10.11959/j.issn.2096-109x.2017.00127
修回日期:
2016-12-20
出版日期:
2017-01-15
发布日期:
2020-03-20
作者简介:
王佳慧(1983-),女,山西大同人,北京邮电大学博士生,主要研究方向为云计算与云安全、数据安全与数据保护。|刘川意(1982-),男,四川乐山人,北京邮电大学副教授,主要研究方向为云计算、网络存储、可信计算。|方滨兴(1960-),男,江西万年人,中国工程院院士,主要研究方向为信息与网络安全、内容安全。
基金资助:
Jia-hui WANG1,2(),Chuan-yi LIU2,3,Bin-xing FANG2,3
Revised:
2016-12-20
Online:
2017-01-15
Published:
2020-03-20
Supported by:
摘要:
随着物联网和云计算技术的飞速发展和广泛应用,物联网搜索引擎应运而生。然而,物联网搜索引擎的开放性,使在互联网搜索领域就已经存在的数据隐私问题变得更加突出。首先,阐述了物联网搜索数据隐私保护的研究背景和安全挑战,并针对安全挑战,将密文搜索和基于属性的访问控制算法有机结合。然后,提出了基于细粒度授权的物联网搜索数据隐私保护方案,并对方案进行了安全分析和性能分析。最后,总结并指出了未来研究工作方向。
中图分类号:
王佳慧,刘川意,方滨兴. 基于细粒度授权的物联网搜索数据隐私保护方案[J]. 网络与信息安全学报, 2017, 3(1): 13-22.
Jia-hui WANG,Chuan-yi LIU,Bin-xing FANG. Data privacy preservation for the search of Internet of things based on fine-grained authorization[J]. Chinese Journal of Network and Information Security, 2017, 3(1): 13-22.
[31] | STEFANOV E , PAPAMANTHOU C , SHI E . Practical dynamic searchable encryption with small leakage[C]// NDSS. 2014. |
[32] | CASH D , JAEGER J , JARECKI S . et al. Dynamic searchable encryption in very large databases: data structures and implementa-tion[C]// Network and Distributed System Security Symposium (NDSS). 2014. |
[33] | DI CRESCENZO G , SARASWAT V . Public key encryption with searchable keywords based on Jacobi symbols[C]// Indocrypt 2007. 2007. |
[34] | LAI X , LU R , FOXTON K . An efficient searchable encryption scheme and its application in network forensics[C]// E-Forensics. 2010. |
[35] | NAVEED M , PRABHAKARAN M , GUNTER C . Dynamic search-able encryption via blind storage[C]// IEEE Symposium on Security and Privacy. 2014. |
[36] | SAHAI A , WATERS B . Fuzzy identity based encryption[C]// Eurocrypt. 2005. |
[37] | GOYAL V , PANDEY O , SAHAI A , Attribute-based encryption for fine-grained access control of encrypted data[C]// The 13th ACM Conference on Computer and Communications Security(CCS). 2006. |
[38] | CHASE M . Multi-authority attribute based encryption[C]// TCC. 2007. |
[39] | BO?OVIC V , SOCEK D , STEINWANDT R , Multiauthority attrib-ute-based encryption with honest-but-curious central authority[J]. International Journal of Computer Mathematics. 2012, 89 (3): 268-283. |
[40] | CHASE M , CHOW S . Improving privacy and security in multi-authority attribute-based encryption[C]// The 16th ACM Con-ference on Computer and Communications Security (CCS). 2009. |
[41] | LEWKO A , WATERS B . Decentralizing attribute-based encryp-tion[C]// Eurocrypt 2011. 2011. |
[42] | LIU Z , CAO Z , HUANG Q . Fully secure multi-authority cipher-text-policy attribute-based encryption without random ora-cles[C]// The European Symposium on Research in Computer Secu-rity (ESORICS). 2011. |
[43] | HAN J , SUSILO W , MU Y . Privacy-preserving decentralizedkey-policy attribute-based encryption[J]. IEEE Transactions on Parallel and Distributed Systems. 2012, 23 (11): 2150-2162. |
[44] | YU S , WANG C , REN K . Achieving secure, scalable, and fine-graineddata access control in cloud computing[C]// IEEE Info-com. 2010. |
[1] | ATZORI L , IERA A , MORABITO G , The Internet of things: a survey[J]. Computer Networks, 2010, 54 (15): 2787-2805. |
[2] | KANSAL A , NATH S , LIU J , et al. BSenseWeb: an infrastructure forshared sensing[J]. IEEE Multimedia, 2007, 14 (4): 8-13. |
[45] | YU S C , REN K , LOU W J . Defending against key abuse attacks in KP-ABE enabled broadcast systems[C]// Security and Privacy in Communication Networks. 2009. |
[46] | WANG Y , CHEN K , LONG Y . Accountable authority key policy attribute-based encryption[J]. Science China: Information Sciences, 2012, 55 (7): 1631-1638. |
[3] | OSTERMAIER B , ROMER K , MATTERN , et al. A real-time search engine for the Web of things[C]// Internet of Things, Tokyo. 2010. |
[4] | BODENHEIM R , BUTTS J , DUNLAP S . Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices[J]. International Journal of Critical InfrastructureProtection, 2014, 7 (2): 114-123. |
[47] | LI J , REN K , KIM K . A2BE: Accountable attribute-based encryp-tion for abuse free access control[R]. Cryptology ePrintArchive. 2009. |
[48] | LI J , REN K , ZHU B . Privacy-aware attribute based encryption with user accountability[C]// The 12th International Conference. 2009. |
[5] | SONG X D , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data[C]// The IEEE Symposium on Security and Privacy. 2000. |
[6] | GOH E . Secure indexes[R]. IACR ePrint Cryptography Archive, 2003. |
[49] | LI J , HUANG Q , CHEN X . Multi-authority ciphertext-policy at-tribute-based encryption with accountability[C]// The 6th Interna-tional Symposium on Information, Computer and Communications Security (ASIACCS). 2011. |
[50] | SUN W , YU S , LOU V . Protecting your right: attribute-based key-word with fine-grained owner enforced search authorization in the cloud[C]// IEEE Infocom. 2014. |
[7] | CHANG Y , MITZENMACHER M . Privacy preserving keyword searches on remote encrypted data[C]// The Applied Cryptography and Network Security. 2005. |
[8] | CURTMOLA R , GARAY J , KAMARA S , et al. Searchable sym-metric encryption: improved definitions and efficient construc-tions[C]// The 13th ACM Conference on Computer and Communi-cations Security (CCS 2006). 2006. |
[51] | HAN F , QIN J , ZHAO H . A general transformation from KP-ABE to searchable encryption[J]. Future Generation Computer Systems, 2014, 30: 107-115. |
[52] | BOUABANATEBIBEL T , KACI A . Parallel search over encrypted data under attribute based encryption on the cloud computing[J]. Computers&Security, 2015. |
[9] | LIESDONK P V , SEDGHI S , DOUMEN J , et al. Computationally efficient searchable symmetric encryption[C]// Secure Data Man-agement, VLDB Workshop(SDM 2010). 2010: 87-100. |
[10] | KAMARA S , PAPAMANTHOU C , ROEDER T , et al. Dynamic searchable symmetric encryption[C]// 2012 ACM Conference on Computer and Communications Security. 2012: 965-976. |
[53] | KACI A , BOUABANA-TEBIBEL T . Access control reinforcement over searchable encryption[C]// The 15th IEEE International Con-ference on Information Reuse And Integration. 2014. |
[54] | CASH D , JARECKI S , JUTLA C . Highly-scalable searchable symmetric encryption with support forboolean queries[C]// Crypto, 2013. |
[55] | SADAKANE K . Fast algorithms for k-word proximity search[J]. IEICE Transactions on Fundamentals of Electronics, Communica-tions and Computer Sciences, 2001, 84 (9): 2311-2318. |
[11] | CASH D , JAEGER J , JARECKI S , et al. Dynamic searchable encryption in very-large databases: data structures and implementa-tion[C]// Network and Distributed SystemSecurity Symposium (NDSS'14). 2014. |
[12] | BONEH D , CRESCENZO G D , OSTROVSKY R , Public key encryption with keyword search[C]// Eurocryp'04. 2004. |
[13] | ABDALLA M , BELLARE M , CATALANO D , Searchable encryp-tion revisited: consistency properties, relation to anonymous IBE, and extensions[C]// Crypto'05. 2005. |
[14] | BAEK J , SAFAVI-NAINI R , SUSILO W , Public key encryption with keyword search revisited[C]// The International Conference on Computational Science and Applications (ICCSA 2008). 2008. |
[15] | RHEE H S , PARK J H , SUSILO W , et al. Improved searchable public key encryption with designated tester[C]// The ACM Sympo-sium on Information, Computer and Communications Secu-rity(ASIACCS 2009). 2009. |
[16] | FANG L , SUSILO W , GE C , et al. A secure channel free public key encryption with keyword search scheme without random ora-cle[C]// The International Conference on Cryptology and Network Security. 2009. |
[17] | KERSCHBAUM L , SORNIOTTI W . Searchable encryption for outsourced data analytics[C]// The 7th European Conference on Public Key Infrastructures, Services and Applications(EuroPKI'10). 2010. |
[18] | CAO N , WANG C , REN K . Privacy-preserving multi-keyword ranked search over encrypted cloud data[C]// IEEE Infocom. 2011. |
[19] | SUN W , WANG B , CAO N . Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking[C]// ACM Symposium on Information, Computer and Communications Secu-rity. 2013: 71-82. |
[20] | CHUAH M , HU W . Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data[C]// The International Conference on Distributed Computing Systems Workshops. 2011. |
[21] | WANG B , YU S , LOU W . Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud[C]// IEEE Infocom. 2014. |
[22] | MASHAURI D , LI R , HAN H . Adaptive multi-keyword ranked search over encrypted cloud data.[C]// The International Conference on Collaborate Computing. 2015. |
[23] | SUN X , WANG X , XIA Z . Dynamic multi-keyword top-k ranked search over encrypted cloud data[J]. The International Journal of Security and Its Applications. 2014, 8 (1): 319-332. |
[24] | BONEH D , WATERS B . Conjunctive, subset, and range queries on encrypted data[C]// TCC. 2007. |
[25] | SUN W , WANG B , CAO N . Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25 (11): 3025-3035. |
[26] | LI J , WANG Q , WANG C . Fuzzy keyword search over encrypted data in cloud computing[C]// IEEE Infocom. 2010. |
[27] | WANG C , CAO N , REN K . Enabling secure and efficient ranked keyword search over outsourced cloud data[J]. IEEE Transactions on Parallel and Distributed Systems (TPDS), 2011, 23 (8): 1467-1749. |
[28] | SHI E , BETHENCOURT V , CHAN H . Multi-dimensional range query over encrypted data[C]// IEEE Symposium on Security and Privacy, 2007. |
[29] | KAMARA S , PAPAMANTHOU C . Parallel and dynamic search-able symmetric encryption[M]// Financial Cryptography and Data Security, Berlin: Springer, 2013: 258-274. |
[30] | KAMARA S , PAPAMANTHOU C . Parallel and dynamic search-able symmetric encryption[M]// CCS. 2012. |
[1] | 陈赛特, 李卫海, 姚远志, 俞能海. 轻量级K匿名增量近邻查询位置隐私保护算法[J]. 网络与信息安全学报, 2023, 9(3): 60-72. |
[2] | 肖敏, 毛发英, 黄永洪, 曹云飞. 基于属性签名的车载网匿名信任管理方案[J]. 网络与信息安全学报, 2023, 9(2): 33-45. |
[3] | 许建龙, 林健, 黎宇森, 熊智. 分布式用户隐私保护可调节的云服务个性化QoS预测模型[J]. 网络与信息安全学报, 2023, 9(2): 70-80. |
[4] | 孙哲, 宁洪, 殷丽华, 方滨兴. 基于教学实训靶场的“数据隐私保护”课程建设初探[J]. 网络与信息安全学报, 2023, 9(1): 178-188. |
[5] | 白雪, 秦宝东, 郭瑞, 郑东. 基于SM2的两方协作盲签名协议[J]. 网络与信息安全学报, 2022, 8(6): 39-51. |
[6] | 肖敏, 姚涛, 刘媛妮, 黄永洪. 具有隐私保护的动态高效车载云管理方案[J]. 网络与信息安全学报, 2022, 8(6): 70-83. |
[7] | 卢晨昕, 陈兵, 丁宁, 陈立全, 吴戈. 具有紧凑标签的基于身份匿名云审计方案[J]. 网络与信息安全学报, 2022, 8(6): 156-168. |
[8] | 明盛智, 朱建明, 隋智源, 张娴. 信息增值机制下在线医疗隐私保护策略[J]. 网络与信息安全学报, 2022, 8(6): 169-177. |
[9] | 张娴, 朱建明, 隋智源, 明盛智. 数字货币交易匿名性与监管的博弈分析[J]. 网络与信息安全学报, 2022, 8(5): 150-157. |
[10] | 刘峰, 杨杰, 齐佳音. 区块链密码学隐私保护技术综述[J]. 网络与信息安全学报, 2022, 8(4): 29-44. |
[11] | 金琳, 田有亮. 基于区块链的多权限属性隐藏电子病历共享方案[J]. 网络与信息安全学报, 2022, 8(4): 66-76. |
[12] | 张伟成, 卫红权, 刘树新, 普黎明. 5G移动边缘计算场景下的快速切换认证方案[J]. 网络与信息安全学报, 2022, 8(3): 154-168. |
[13] | 陈前昕, 毕仁万, 林劼, 金彪, 熊金波. 支持多数不规则用户的隐私保护联邦学习框架[J]. 网络与信息安全学报, 2022, 8(1): 139-150. |
[14] | 高振升, 曹利峰, 杜学绘. 基于区块链的访问控制技术研究进展[J]. 网络与信息安全学报, 2021, 7(6): 68-87. |
[15] | 杨冠群, 刘荫, 徐浩, 邢宏伟, 张建辉, 李恩堂. 基于区块链的电网可信分布式身份认证系统[J]. 网络与信息安全学报, 2021, 7(6): 88-98. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|