网络与信息安全学报 ›› 2018, Vol. 4 ›› Issue (7): 13-21.doi: 10.11959/j.issn.2096-109x.2018062
李颖,马春光
修回日期:
2018-07-05
出版日期:
2018-07-15
发布日期:
2018-09-10
作者简介:
李颖(1993-),女,黑龙江黑河人,哈尔滨工程大学硕士生,主要研究方向为密码学可搜索加密技术。|马春光(1974-),男,黑龙江双城人,哈尔滨工程大学教授、博士生导师,主要研究方向为分布式密码算法与协议、云计算安全与隐私、格密码。
基金资助:
Ying LI,Chunguang MA
Revised:
2018-07-05
Online:
2018-07-15
Published:
2018-09-10
Supported by:
摘要:
随着云计算的迅速发展,为保护用户外包数据的安全和用户隐私,越来越多的企业和用户选择将数据加密后上传。因此,对云服务器上加密数据的有效搜索成为用户关注的重点。可搜索加密技术是允许用户对密文数据进行检索的密码原语,利用云服务器的强大计算资源进行关键词检索。根据使用密码体制的不同,介绍了可搜索加密的分类,将其分为对称可搜索加密和非对称可搜索加密。基于这种分类,首先介绍了典型方案,之后从可搜索加密的语句表达能力和安全性2方面进行介绍,并指出了该领域当前研究中急需解决的问题及未来研究方向。
中图分类号:
李颖, 马春光. 可搜索加密研究进展综述[J]. 网络与信息安全学报, 2018, 4(7): 13-21.
Ying LI, Chunguang MA. Overview of searchable encryption research[J]. Chinese Journal of Network and Information Security, 2018, 4(7): 13-21.
[1] | 项菲, 刘川意, 方滨兴 ,等. 云计算环境下密文搜索算法的研究[J]. 通信学报, 2013(7): 143-153. |
XIANG F , LIU C Y , FANG B X ,et al. Research on ciphertext search for the cloud environment[J]. Journal on Communications, 2013,34(7): 143-153. | |
[2] | SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data[C]// IEEE Computer Society. 2000:44. |
[3] | 李经纬, 贾春福, 刘哲理 ,等. 可搜索加密技术研究综述[J]. 软件学报, 2015,26(1): 109-128. |
LI J W , JIA C F , LIU Z L ,et al. Survey on the searchable encryption[J]. Journal of Software, 2015,26(1): 109-128. | |
[4] | CURTMOLA R , GARAY J , KAMARA S ,et al. Searchable symmetric encryption:improved definitions and efficient constructions[C]// ACM Conference on Computer and Communications Security. ACM, 2006: 79-88. |
[5] | WANG C , CAO N , LI J ,et al. Secure ranked keyword search over encrypted cloud data[C]// IEEE International Conference on Distributed Computing Systems. 2010: 253-262. |
[6] | PREMASATHIAN N , CHOTO S . Searchable encryption schemes:with multiplication and simultaneous congruences[C]// IEEE International ISC Conference on Information Security and Cryptology. 2013: 147-150. |
[7] | PREMASATHIAN N , CHOTO S . Searchable encryption schemes:with multiplication and simultaneous congruences[C]// International ISC Conference on Information Security and Cryptology. 2013: 147-150. |
[8] | FU Z , SHU J , SUN X ,et al. Smart cloud search services:verifiable keyword-based semantic search over encrypted cloud data[J]. IEEE Transactions on Consumer Electronics, 2014,60(4): 762-770. |
[9] | FU Z , SUN X , LINGE N ,et al. Achieving effective cloud search services:multi-keyword ranked search over encrypted cloud data supporting synonym query[J]. IEEE Transactions on Consumer Electronics, 2014,60(1): 164-172. |
[10] | XIA Z , WANG X , SUN X ,et al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions on Parallel & Distributed Systems, 2016,27(2): 340-352. |
[11] | 杨旸, 杨书略, 蔡圣暐 ,等. 排序可验证的语义模糊可搜索加密方案[J]. 四川大学学报(工程科学版), 2017,49(4): 119-128. |
YANG Y , YANG S L , CAI S . Semantically searchable encryption scheme supporting ranking verification[J]. Journal of Sichuan University(Engineering Science Edition), 2017,49(4): 119-128. | |
[12] | CASH D , JARECKI S , JUTLA C ,et al. Highly-scalable searchable symmetric encryption with support for boolean queries[M]// Advances in Cryptology–CRYPTO 2013.Berlin:Springer. 2013: 353-373. |
[13] | LI H , YANG Y , LUAN T ,et al. Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data[J]. IEEE Transactions on Dependable & Secure Computing, 2016,13(3): 312-325. |
[14] | 宋衍, 韩臻, 陈栋 ,等. 支持关键词任意连接搜索的属性加密方案[J]. 通信学报, 2016,37(8): 77-85. |
SONG Y , HAN Z , CHEN D . Attribute-based encryption supporting arbitrary conjunctive key word search[J]. Journal on Communications, 2016,37(8): 77-85. | |
[15] | CHEN R , MU Y , YANG G ,et al. Dual-server public-key encryption with keyword search for secure cloud storage[J]. IEEE Transactions on Information Forensics & Security, 2017,11(4): 789-798. |
[16] | CHEN R , MU Y , YANG G ,et al. Server-aided public key encryption with keyword search[J]. IEEE Transactions on Information Forensics & Security, 2016,11(12): 2833-2842. |
[17] | FU Z , REN K , SHU J ,et al. Enabling personalized search over encrypted outsourced data with efficiency improvement[J]. IEEE Transactions on Parallel & Distributed Systems, 2016,27(9): 2546-2559. |
[18] | FU Z , SUN X , JI S ,et al. Towards efficient content-aware search over encrypted outsourced data in cloud[C]// IEEE International Conference on Computer Communications, 2016: 1-9. |
[19] | BRINGER J , CHABANNE H , KINDARJI B . Error-tolerant searchable encryption[C]// IEEE International Conference on Communications. 2009: 1-6. |
[20] | LI J , WANG Q , WANG C ,et al. Fuzzy keyword search over encrypted data in cloud computing[C]// INFOCOM. 2010. 1-5. |
[21] | CHUAH M , HU W . Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data[C]// International Conference on Distributed Computing Systems Workshops. IEEE, 2011. 273-281. |
[22] | 杨旸, 杨书略, 柯闽 . 加密云数据下基于Simhash的模糊排序搜索方案[J]. 计算机学报, 2017,40(2): 431-444. |
YANG Y , YANG S L , KE M . Ranked fuzzy keyword search based on simhash over encrypted cloud data[J]. Chinese Journal of Computers, 2017,40(2): 431-444. | |
[23] | 王恺璇, 李宇溪, 周福才 ,等. 面向多关键字的模糊密文搜索方法[J]. 计算机研究与发展, 2017,54(2): 348-360. |
WANG K X , LI Y X , ZHOU F C ,et al. Multi-keyword fuzzy search over encrypted data[J]. Journal of Computer Research and Development, 2017,54(2): 348-360. | |
[24] | GOH E J . Secure Indexes[J]. Submission, 2003. |
[25] | CHANG Y C , MITZENMACHER M . Privacy preserving keyword searches on remote encrypted data[C]// International Conference on Applied Cryptography and Network Security. 2005: 442-455. |
[26] | CHAI Q , GONG G . Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers[C]// IEEE International Conference on Communications. 2012. 917-922. |
[27] | 柳祚鹏 . 支持同义词搜索和抗信息泄漏的对称可搜索加密技术研究[D]. 上海:上海交通大学, 2015. |
LIU Z P . Research on symmetric searchable encryption technology supporting synonym search and anti-information leak-age[D]. Shanghai:Shanghai Jiaotong University, 2015. | |
[28] | 陆海宁 . 可隐藏搜索模式的对称可搜索加密方案[J]. 信息网络安全, 2017(01): 38-42. |
LU H N . Searchable symmetric encryption with hidden search pattern[J]. Netinfo Security, 2017(1): 38-42. | |
[29] | BONECH D , CRESCENZO G D , OSTROVSKY R ,et al. Public key encryption with keyword search[C]// International Conference on the Theory and Applications of Cryptographic Techniques. 2004: 506-522. |
[30] | GOLLE P , STADDON J , WATERS B . Secure conjunctive keyword search over encrypted data[J]. Lecture Notes in Computer Science, 2004,3089: 31-45. |
[31] | BONEH D , WATERS B . Conjunctive,subset,and range queries on encrypted data[J]. TCC 2007, 2007,4392: 535-554. |
[32] | ABDALLA M , BELLARE M , CATALANO D ,et al. Searchable encryption revisited:consistency properties,relation to anonymous ibe,and extensions[M]// Advances in Cryptology–CRYPTO 2005. 2005. 205-222. |
[33] | PARK D , KIM K , LEE P . Public key encryption with conjunctive field keyword search in information security applications[C]// The 5th International Workshop (WISA’04). 2004. 23-25. |
[34] | DONG J P , KIM K , LEE P J . Public key encryption with conjunctive field keyword search[M]. Information Security Applications.Berlin:Springer. 2004. 73-86. |
[35] | YONG H H , LEE P J . Public key encryption with conjunctive keyword search and its extension to a multi-user system[C]// International Conference on Pairing-Based Cryptography. 2007. 2-22. |
[36] | HU C , LIU P . Public key encryption with ranked multi-keyword search[C]// International Conference on Intelligent Networking and Collaborative Systems. 2013. 109-113. |
[37] | MIAO Y , MA J , LIU X ,et al. VMKDO:verifiable multi-keyword search over encrypted cloud data for dynamic data-owner[J]. Peer-to-Peer Networking and Applications, 2016(1): 1-11. |
[38] | 张楠, 陈兰香 . 一种高效的支持排序的关键词可搜索加密系统研究[J]. 信息网络安全, 2017(2): 43-50. |
ZHANG N , CHEN L X . Research on an efficient ranked keywords searchable encryption system[J]. Netinfo Security, 2017(2): 43-50. | |
[39] | BRINGER J , CHABANNE H . Embedding edit distance to enable private keyword search[J]. Human-centric Computing and Information Sciences, 2012,2(1): 1-12. |
[40] | DONG Q , GUAN Z , WU L ,et al. Fuzzy keyword search over encrypted data in the public key setting[C]// International Conference on Web-Age Information Management. Springer Berlin Heidelberg, 2013, 729-740. |
[41] | JIN W B , RHEE H S , PARK H A ,et al. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data[C]// The Workshop on Secure Data Management. Springer Berlin Heidelberg, 2006: 75-83. |
[42] | JEONG I R , KWON J O , HONG D ,et al. Constructing PEKS schemes secure against keyword guessing attacks is possible?[J]. Computer Communications, 2009,32(2): 394-396. |
[43] | TANG Q , CHEN L . Public-key encryption with registered keyword search[C]// European Conference on Public Key Infrastructures,Services and Applications. Springer-Verlag, 2009. 163-178. |
[44] | 方黎明 . 带关键字搜索公钥加密的研究[D]. 南京航空航天大学, 2012. |
FANG L M . Research on keyword encryption with keyword search[D]. Naijing:Nanjing Aerospace University, 2012. | |
[45] | XU P , JIN H , WU Q ,et al. Public-key encryption with fuzzy keyword search:a provably secure scheme under keyword guessing attack[J]. IEEE Transactions on Computers, 2013,62(11): 2266-2277. |
[46] | CHEN R , MU Y , YANG G ,et al. dual-server public-key encryption with keyword search for secure cloud storage[J]. IEEE Transactions on Information Forensics & Security, 2017,11(4): 789-798. |
[1] | 袁承昊, 李勇, 任爽. 多关键词动态可搜索加密方案[J]. 网络与信息安全学报, 2023, 9(2): 143-153. |
[2] | 李凌书, 邬江兴, 曾威, 刘文彦. 容器云中基于信号博弈的容器迁移与蜜罐部署策略[J]. 网络与信息安全学报, 2022, 8(3): 87-96. |
[3] | 刘尚, 郭银章. 云计算多授权中心CP-ABE代理重加密方案[J]. 网络与信息安全学报, 2022, 8(3): 176-188. |
[4] | 周艺华, 扈新宇, 李美奇, 杨宇光. 云环境下基于属性策略隐藏的可搜索加密方案[J]. 网络与信息安全学报, 2022, 8(2): 112-121. |
[5] | 张艺, 田立勤, 毋泽南, 武文星. 基于FANP的云用户行为信任评估优化机制[J]. 网络与信息安全学报, 2022, 8(2): 175-182. |
[6] | 宋甫元, 秦拯, 张吉昕, 刘羽. 基于访问控制安全高效的多用户外包图像检索方案[J]. 网络与信息安全学报, 2021, 7(5): 29-39. |
[7] | 吴颖,李璇,金彪,金榕榕. 隐私保护的图像内容检索技术研究综述[J]. 网络与信息安全学报, 2019, 5(4): 14-28. |
[8] | 于孟洋,林晖,田有亮. 移动云计算中一种新的跨层信誉机制[J]. 网络与信息安全学报, 2018, 4(3): 51-58. |
[9] | 王元昊,李宏博,崔钰钊,郭庆文,黄琼. 具有密文等值测试功能的公钥加密技术综述[J]. 网络与信息安全学报, 2018, 4(11): 13-22. |
[10] | 张建标,朱元曦,胡俊,王晓. 面向云环境的虚拟机可信迁移方案[J]. 网络与信息安全学报, 2018, 4(1): 6-14. |
[11] | 李维奉,羌卫中,李伟明,邹德清. 云环境隐私侵犯取证研究[J]. 网络与信息安全学报, 2018, 4(1): 26-35. |
[12] | 高元照,李学娟,李炳龙,吴熙曦. 云计算取证模型[J]. 网络与信息安全学报, 2017, 3(9): 13-23. |
[13] | 袁得嵛,王小娟,万建超. “互联网+”对网络空间安全影响及未来发展趋势[J]. 网络与信息安全学报, 2017, 3(5): 1-9. |
[14] | 施江勇,杨岳湘,李文华,王森. 基于SDN的云安全应用研究综述[J]. 网络与信息安全学报, 2017, 3(5): 10-25. |
[15] | 朱智强,苏航,孙磊,李作辉. 云存储中基于属性的关键词搜索加密方案研究[J]. 网络与信息安全学报, 2017, 3(11): 1-11. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|