Journal on Communications ›› 2013, Vol. 34 ›› Issue (7): 143-153.doi: 10.3969/j.issn.1000-436x.2013.07.016
• Overview • Previous Articles Next Articles
Fei XIANG1,2,Chuan-yi LIU2,3,Bin-xing FANG1,2,Chun-lu WANG1,2,HONGRui-ming Z1,2
Online:
2013-07-25
Published:
2017-06-24
Supported by:
Fei XIANG,Chuan-yi LIU,Bin-xing FANG,Chun-lu WANG,HONGRui-ming Z. Research on ciphertext search for the cloud environment[J]. Journal on Communications, 2013, 34(7): 143-153.
[1] | ARMBRUST M , FOX A , GRIFFITH R . Above the clouds: a berkeley view of cloud computing[EB/OL]. http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html, 2009. |
[2] | BUGIEL S , NURNBERGER S , SADEGHI A . Twin clouds: an archi-tecture for secure cloud computing[A]. Workshop on Cryptography and Security in Clouds[C]. Zurich, Switzerland, 2011. 1-11. |
[3] | KAMARA S , LAUTER K . Cryptographic cloud storage[J]. Fi ial Cryptogra phy and Data Security, 2010,6054:136-149. |
[4] | LI J , KROHN M , MAZI D . Secure untrusted data repositor (SUNDR)[A]. Proceedings of the 6th Symposium on Operat ng Sys-tems Design and Implementation[C]. San Francisco, CA, USA, 2004. 91-106. |
[5] | GOH E J . Secure indexes[A]. Proceedings of the 2004 Workshop on Information Security Applications[C]. Jeju Island , Korea, 2004. 73-86. |
[6] | SONG D X , WAGNER D , PERRIG A . Practical techniques or searches on encrypted data[A]. Proceedings of the IEEE Symposium on Security and Privacy[C]. CA,USA, 2000. 36-49. |
[7] | BONEH D , CRESCENZO G D , OSTROVSKY R . Public key encryp-tion with keyword search[A]. Proc of EUROCRYP'04[C]. Interlaken, Switzerland, 2004. 506-522. |
[8] | PAILLIER P . Public-key cryptosystems based on composite degree resi-duosity classes[A]. Public-key cryptosystems based on composite degree resi-duosity classes[A]. Proceedings of the International Conference on the Theory and Applications of Cryptograhic Techniques (EURO-CRYPT'99)[C]. Prague, Czech Republic, 1999. 223-238. |
[9] | BETHENCOURT J , SONG D , WATERS B . New constructions and practical applications for private stream searching (extended ab-stract)[A]. Proceedings of the IEEE Symposium on Security and Pri-vacy (SP'06)[C]. Oakland, California, USA, 2006. 134-139. |
[10] | BETHENCOURT J , SONG D , WATERS B . New techniques for private stream searching[J]. ACM Transactions on Infor ion and System Security, 2009,12(3):1-32. |
[11] | HACIGUMUS H , LYER B , MEHROTRA S . Providing database as a service[A]. Proceedings of the International Conference on Data En-gineering(ICDE 2002)[C]. SAN JOSE, CA, USA, 2002. 29-38. |
[12] | HACIGUMUS H , LYER B , LI C . Executing SQL over encrypted data in the database-server-provider model[A]. Proceedings of ACM SIGMOD[C]. Madison, Wisconsin, USA, 2002. 216-227. |
[13] | HACIGUMUS H , LYER B , LI C . Efficient executing of aggre ion queries over encrypted relational database[A]. Proceed ngs of Data-base Systems for Advanced Applications(DASFAA 2004)[C]. Jeju Island, Korea, 2004. 125-136. |
[14] | HACIGUMUS H , LYER B , LI C . Query optimization in encrypted database system[A]. Proceedings of Database Systems for Advanced Applications(DASFAA 2005)[C]. Beijing, China, 2005. 216-227. |
[15] | HORE B , MEHROTRA S , TSUDIK G . A privacy-index for range queries[A]. Proceedings of the 30th VLDB Conference[C]. Toronto, Canada, 2004. 223-235. |
[16] | 王迪, 刘国华, 于醒兵 . 基于最佳桶划分策略的密文索引技术[J]. 小型微型计算机系统, 2008,29(4):649-652. WANG D , LIU G H , YU X B . Cryptograph index technology based on strategy of optimal bucket partitioning[J]. Journal of Chinese Computer Systems, 2008,29(4):649-652. |
[17] | AGRAWAL R , KIERNAN J , SRIKANT R . Order preserving en-cryption for numericdata[A]. SIGMOD2004[C]. 2004. 13-18. |
[18] | BLOOM B . Space/time trade-offs in hash coding with allowable er-rors[J]. Communications of the ACM, 1970,13(7):422-426. |
[19] | CHANG Y C , MITZENMACHER M . Privacy preserving keyword searches on remote encrypted data[J]. Applied Cryptography and Net-work Security Lecture Notes in Computer Science, 2005,3531:442-455. |
[20] | BONEH D , KUSHILEVITZ E , OSTROVSKY R . Public-key encryp-tion that allows PIR queries[A]. 27th Annual International Cryptology Conference[C]. Santa Barbara, CA, USA, 2007. 50-67. |
[21] | CURTMOLA R , GARAY J , KAMARA S . Searchable symmetric encryption: improved definitions and efficient constructions[A]. Pro-ceedings of ACM Conference on Computer and Communications Se-curity (CCS)[C]. Alexandria, VA, USA, 1997. 79-88. |
[22] | CHASE M , KAMARA S . Structured encryption and controlled dis-closure[A]. Proceedings of Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2010)[C]. Sin-gapore, 2010. 577-594. |
[23] | KUROSAWA K , OHTAKI Y . UC-secure searchable symmetric en-cryption[A]. Proceedings of Financial Cryptography and Data Securi-ty(FC)[C]. Bonaire, Dutch Caribbean, 2012. 285-298. |
[24] | LISEDONK V P , SEDGHI S , DOUMEN J . Computationally effic nt searchable symmetric encryption[A]. Proceedings of Workshop on Secure Data Management(SDM)[C]. Singapore, 2010. 87-100. |
[25] | KAMARA S , PAPAMANTHOU C , ROEDER T . ROEDER T. Dynamic searchable symmetric encryption[A]. Proceedings of the 2012 ACM conference on Computer and Communications Security (CCS '12)[C]. New York, NY, USA, 2012. 965-976. |
[26] | BALLARD L , KAMARA S , MONROSE F . Achieving efficient con-junctive keyword searches over encrypted data[A]. Proc of ICICS[C]. Beijing, China, 2005. 414-426. |
[27] | BONEH D , WATERS B . Conjunctive, subset, and range quer es on encrypted data[A]. Proc of TCC[C]. Amsterdam, The Netherlands, 2007. 535-554. |
[28] | BRINKMAN R , DOUMEN J , JONKER W . Using secret sharing for searching in encrypted data[J]. Secure Data Management, 2014,3718:18-27. |
[29] | BRINKMAN R . Searching in Encrypted Data[D]. University of Twente, the Netherlands, 2007. |
[30] | GOLLE P , STADDON J , WATERS B . Secure conjunctive keyword search over encrypted data[A]. Proc of ACNS[C]. Yellow Mountain, China, 2004. 31-45. |
[31] | HWANG Y H , LEE P J . Public key encryption with conjunctive key-word search and its extension to a multi-user system[A]. First Interna-tional Conference[C]. Tokyo, Japan, 2007. 2-22. |
[32] | KATZ J , SAHAI A , WATER B . Predicate encryption supporting dis-junctions, polynomial equations, and inner products[A]. Proc of EU-ROCRYPT[C]. Istanbul, Turkey, 2008. 146-162. |
[33] | WANG C , CAO N , REN K . Enabling secure and efficient ranked keyword search over outsourced cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2012,23(8):1467-1479. |
[34] | WANG C , CAO N , LI J . Secure ranked keyword search over en-crypted cloud data[A]. Proceedings of ICDCS[C]. Genova, Italy, 2010. 253-262. |
[35] | CAO N , WANG C , LI M . Privacy-preserving multi-keyword ranked search over encrypted cloud data[A]. IEEE INFOCOM[C]. hai, China, 2011. 829-837. |
[36] | DAMIANI E , FORESTI S . Key management for multi-user encrypted databases[A]. Proc of ACM[C]. Virginia, USA, 2005. 22-34. |
[37] | POPA R A , ZELDOVICH N , BALAKRISHNAN H . CryptDB: A Practical Encrypted Relational DBMS[R]. MIT-CSAIL-TR-2011-005, Computer Science and Artificial Intelligence Laborator, Cambridge, MA, 2011. |
[38] | GENTRY C . Fully homomorphic encryption using ideal lattices[A]. STOC'09[C]. Bethesda, Maryland, USA, 2009. 169-178. |
[39] | KAMARA S , PAPAMANTHOU C , ROEDER T . CS2: A Searchable Cryptographic Cloud Storage System[R]. MSR-TR-2011-58, 2011. |
[40] | CURTMOLA R , GARAY J , KAMARA S . Searchable symmetric encryption: improved definitions and efficient constructions[J]. Jour-nal of Computer Security, 2011,19(5):895-934. |
[41] | FERREIRA B , DOMINGOS H . Management and search of private data on storage clouds[A]. Proceedings of the Workshop on Secure and Dependable Middleware for Cloud Monitoring and Management (SDMCMM'12)[C]. Montreal, Quebec, Canada, 2012. |
[1] | Guanxiong HA, Qiaowen JIA, Hang CHEN, Chunfu JIA. Data popularity-based encrypted deduplication scheme without third-party servers [J]. Journal on Communications, 2022, 43(8): 17-29. |
[2] | Jifeng WANG, Guofeng WANG. Research on ciphertext search and sharing technology in edge computing mode [J]. Journal on Communications, 2022, 43(4): 227-238. |
[3] | Dongmei YANG, Yue CHEN, Jianghong WEI, Xuexian HU. Identity-based puncturable signature scheme [J]. Journal on Communications, 2021, 42(12): 17-26. |
[4] | Tao FENG, Fanqi KONG, Chunyan LIU, Rong MA, Albettar Maher. Dual verifiable cloud storage scheme based on blockchain [J]. Journal on Communications, 2021, 42(12): 192-201. |
[5] | Chunfu JIA, Guanxiong HA, Shaoqiang WU, Hang CHEN, Ruiqi LI. AONT-and-NTRU-based rekeying scheme for encrypted deduplication [J]. Journal on Communications, 2021, 42(10): 67-80. |
[6] | Junfeng TIAN,Yanbiao WANG,Xinfeng HE,Juntao ZHANG,Wanhe YANG,Ya’nan PANG. Survey on the causal consistency of data [J]. Journal on Communications, 2020, 41(3): 154-167. |
[7] | Wenlong KE,Yong WANG,Miao YE,Junqi CHEN. Priority differentiated multicast flow scheduling method in Ceph cloud storage network [J]. Journal on Communications, 2020, 41(11): 40-51. |
[8] | Lei SUN,Zhiyuan ZHAO,Jianhua WANG,Zhiqiang ZHU. Attribute-based encryption scheme supporting attribute revocation in cloud storage environment [J]. Journal on Communications, 2019, 40(5): 47-56. |
[9] | Xiangsong ZHANG,Chen LI,Zhenhua LIU. Key-exposure resilient integrity auditing scheme with encrypted data deduplication [J]. Journal on Communications, 2019, 40(4): 95-106. |
[10] | Miaomiao TIAN,Chuang GAO,Jie CHEN. Identity-based cloud storage integrity checking from lattices [J]. Journal on Communications, 2019, 40(4): 128-139. |
[11] | Junfeng TIAN,Mengjia CHAI,Liuling QI. Provable data possession scheme based on public verification and private verification [J]. Journal on Communications, 2019, 40(3): 48-59. |
[12] | Ruizhong DU,Pengliang SHI,Xinfeng HE. Cloud data assured deletion scheme based on overwrite verification [J]. Journal on Communications, 2019, 40(1): 130-140. |
[13] | Xincheng YAN,Yue CHEN,Hongyong JIA,Yanru CHEN,Xinyue ZHANG. Secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key [J]. Journal on Communications, 2018, 39(5): 123-133. |
[14] | Yue CHEN,Longjiang WANG,Xincheng YAN,Xinyue ZHANG. Mimic storage scheme based on regenerated code [J]. Journal on Communications, 2018, 39(4): 21-34. |
[15] | Shaohui WANG,Xiaoxiao PAN,Zhiwei WANG,Fu XIAO,Ruchuan WANG. Analysis and improvement on identity-based cloud data integrity verification scheme [J]. Journal on Communications, 2018, 39(11): 98-105. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|