Journal on Communications ›› 2020, Vol. 41 ›› Issue (7): 95-102.doi: 10.11959/j.issn.1000-436x.2020142
Special Issue: 边缘计算
• Papers • Previous Articles Next Articles
Na WANG1,Kun ZHENG1,Junsong FU2(),Jian LI1
Revised:
2020-06-11
Online:
2020-07-25
Published:
2020-08-01
Supported by:
CLC Number:
Na WANG,Kun ZHENG,Junsong FU,Jian LI. Method of ciphertext retrieval in mobile edge computing based on block segmentation[J]. Journal on Communications, 2020, 41(7): 95-102.
[1] | WANG N , FU J , BHARGAVA B ,et al. Efficient retrieval over documents encrypted by attributes in cloud computing[J]. IEEE Transactions on Information Forensics and Security, 2018,13(10): 2653-2667. |
[2] | HASHEM I A T , YAQOOB I , ANUAR N B ,et al. The rise of “big data” on cloud computing:review and open research issues[J]. Information Systems, 2015,47: 98-115. |
[3] | 张佳乐, 赵彦超, 陈兵 ,等. 边缘计算数据安全与隐私保护研究综述[J]. 通信学报, 2018,39(3): 1-21. |
ZHANG J L , ZHAO Y C , CHEN B ,et al. Survey on data security and privacy-preserving for the research of edge computing[J]. Journal on Communications, 2018,39(3): 1-21. | |
[4] | 贾维嘉, 周小杰 . 雾计算的概念、相关研究与应用[J]. 通信学报, 2018,39(5): 153-165. |
JIA W J , ZHOU X J . Concepts,issues,and applications of fog computing[J]. Journal on Communications, 2018,39(5): 153-165. | |
[5] | SATYANARAYANAN M . The emergence of edge computing[J]. Computer, 2017,50(1): 30-39. |
[6] | ROMAN R , LOPEZ J , MAMBO M . Mobile edge computing,fog et al.:a survey and analysis of security threats and challenges[J]. Future Generation Computer Systems, 2018,78: 680-698. |
[7] | FAN K , YIN J , ZHANG K ,et al. EARS-DM:efficient auto correction retrieval scheme for data management in edge computing[J]. Sensors, 2018,18(11):3616. |
[8] | MIAO Y , MA J , LIU X ,et al. Lightweight fine-grained search over encrypted data in fog computing[J]. IEEE Transactions on Services Computing, 2018,12(5): 772-785. |
[9] | WANG N , FU J , LI J ,et al. Source-location privacy protection based on anonymity cloud in wireless sensor networks[J]. IEEE Transactions on Information Forensics and Security, 2019,15(1): 100-114. |
[10] | WANG C , WANG Q , REN K ,et al. Privacy-preserving public auditing for data storage security in cloud computing[C]// Proceedings of International Conference on Computer Communications. Piscataway:IEEE Press, 2010: 1-9. |
[11] | ESPOSITO C , CASTIGLIONE A , POP F ,et al. Challenges of connecting edge and cloud computing:a security and forensic perspective[J]. IEEE Cloud Computing, 2017,4(2): 13-17. |
[12] | KHALIL I M , KHREISHAH A , AZEEM M . Cloud computing security:a survey[J]. Computers, 2014,3(1): 1-35. |
[13] | SINGH S , JEONG Y S , PARK J H . A survey on cloud computing security:issues,threats,and solutions[J]. Journal of Network and Computer Applications, 2016,75: 200-222. |
[14] | CHANG Y C , MITZENMACHER M . Privacy preserving keyword searches on remote encrypted data[C]// International Conference on Applied Cryptography and Network Security. Berlin:Springer, 2005: 442-455. |
[15] | CURTMOLA R , GARAY J , KAMARA S ,et al. Searchable symmetric encryption:improved definitions and efficient constructions[J]. Journal of Computer Security, 2011,19(5): 895-934. |
[16] | WANG C , CAO N , REN K ,et al. Enabling secure and efficient ranked keyword search over outsourced cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,23(8): 1467-1479. |
[17] | CAO N , WANG C , LI M ,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(1): 222-233. |
[18] | WONG W K , CHEUNG D W , KAO B ,et al. Secure kNN computation on encrypted databases[C]// Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data. New York:ACM Press, 2009: 139-152. |
[19] | SUN W , WANG B , CAO N ,et al. Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking[C]// Proceedings of the 8th ACM SIGSAC Symposium on Information,Computer and Communications Security. New York:ACM Press, 2013: 71-82. |
[20] | FU Z , SUN X , LIU Q ,et al. Achieving efficient cloud search services:multi-keyword ranked search over encrypted cloud data supporting parallel computing[J]. IEICE Transactions on Communications, 2015,98(1): 190-200. |
[21] | XIA Z , WANG X , SUN X ,et al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2015,27(2): 340-352. |
[22] | CHEN C , ZHU X , SHEN P ,et al. An efficient privacy-preserving ranked keyword search method[J]. IEEE Transactions on Parallel and Distributed Systems, 2016,27(4): 951-963. |
[23] | WODI B H , LEUNG C K , CUZZOCREA A ,et al. Fast privacy-preserving keyword search on encrypted outsourced data[C]// IEEE International Conference on Big Data. Piscataway:IEEE Press, 2019: 1-10. |
[24] | 徐光伟, 史春红, 王文涛 ,等. 基于语义扩展的多关键词可搜索加密算法[J]. 计算机研究与发展, 2019,56(10): 2193-2206. |
XU G W , SHI C H , WANG W T ,et al. Multi-keyword searchable encryption algorithm based on semantic extension[J]. Journal of Computer Research and Development, 2019,56(10): 2193-2206. | |
[25] | CHEN J , HE K , DENG L ,et al. EliMFS:achieving efficient,leakage-resilient,and multi-keyword fuzzy search on encrypted cloud data[J]. IEEE Transactions on Services Computing, 2017,99(99):1. |
[26] | ZHONG H , LI Z , XU Y ,et al. Two-stage index-based central keyword-ranked searches over encrypted cloud data[J]. Science China Information Sciences, 2020,63(3): 1-3. |
[27] | FU S , ZHANG Q , JIA N ,et al. A privacy-preserving fuzzy search scheme supporting logic query over encrypted cloud data[J]. Mobile Networks and Applications, 2020(4): 1-12. |
[28] | GUAN Z , LIU X , WU L ,et al. Cross-lingual multi-keyword rank search with semantic extension over encrypted data[J]. Information Sciences, 2020,514: 523-540. |
[29] | MU Y , YAO H . Encrypted data retrieval scheme based on bloom filter[C]// Proceedings of the 18th International Symposium on Distributed Computing and Applications for Business Engineering and Science. Piscataway:IEEE Press, 2019: 249-252. |
[30] | SALTON G , WONG A , YANG C S . A vector space model for automatic indexing[J]. Communications of the ACM, 1975,18(11): 613-620. |
[31] | ZERR S , DEMIDOVA E , OLMEDILLA D ,et al. Zerber:r-confidential indexing for distributed documents[C]// Proceedings of the 11th International Conference on Extending Database Technology:Advances in database technology. New York:ACM Press, 2008: 287-298. |
[1] | Ling MA, Qiliang FAN, Ting XU, Guanchen GUO, Shenglin ZHANG, Yongqian SUN, Yuzhi ZHANG. Scheduling framework based on reinforcement learning in online-offline colocated cloud environment [J]. Journal on Communications, 2023, 44(6): 90-102. |
[2] | Xindi MA, Qinghua LI, Qi JIANG, Zhuo MA, Sheng GAO, Youliang TIAN, Jianfeng MA. Byzantine-robust federated learning over Non-IID data [J]. Journal on Communications, 2023, 44(6): 138-153. |
[3] | Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption [J]. Journal on Communications, 2023, 44(5): 224-233. |
[4] | Xin SUN, Guifu ZHANG, Hongyan XING, Wang Zenghui. Research on intrusion detection for maritime meteorological sensor network based on balancing generative adversarial network [J]. Journal on Communications, 2023, 44(4): 124-136. |
[5] | Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI. Multi-function supported privacy protection data aggregation scheme for V2G network [J]. Journal on Communications, 2023, 44(4): 187-200. |
[6] | Xueyong YU, Lixiang QIU, Jianing SONG, Hongbo ZHU. Security communication and energy efficiency optimization strategy in UAV-aided edge computing [J]. Journal on Communications, 2023, 44(3): 45-54. |
[7] | Ming XU, Baojun ZHANG, Yiming WU, Chenduo YING, Ning ZHENG. Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems [J]. Journal on Communications, 2023, 44(3): 117-127. |
[8] | Wei FAN, Cheng PENG, Dali ZHU, Yuqing WANG. Research on intrusion response strategy based on static Bayesian game in mobile edge computing network [J]. Journal on Communications, 2023, 44(2): 70-81. |
[9] | Shuxu ZHAO, Ping WEI, Xiaolong WANG. Optimal coalition structure generation strategy in multi-task concurrent edge computing environment [J]. Journal on Communications, 2023, 44(2): 172-184. |
[10] | Long LONG, Zichen LIU, Zaiwang LU, Yucheng ZHANG, Lei LI. Joint optimization strategy of service cache and resource allocation in mobile edge network [J]. Journal on Communications, 2023, 44(1): 64-74. |
[11] | Xuewang ZHANG, Zhihong LI, Jinzhao LIN. Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain [J]. Journal on Communications, 2022, 43(8): 131-141. |
[12] | Jifeng WANG, Guofeng WANG. Research on ciphertext search and sharing technology in edge computing mode [J]. Journal on Communications, 2022, 43(4): 227-238. |
[13] | Huamin FENG, Rui SHI, Feng YUAN, Yanjun LI, Yang YANG. Efficient strong privacy protection and transferable attribute-based ticket scheme [J]. Journal on Communications, 2022, 43(3): 63-75. |
[14] | Bin LI, Wenshuai LIU, Wancheng XIE, Zesong FEI. Computation offloading scheme for RIS-empowered UAV edge network [J]. Journal on Communications, 2022, 43(10): 223-233. |
[15] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|