Journal on Communications ›› 2014, Vol. 35 ›› Issue (12): 168-177.doi: 10.3969/j.issn.1000-436x.2014.12.020
• Comprehensive Review • Previous Articles Next Articles
Ren-yi XIAO
Online:
2014-12-25
Published:
2017-06-17
Ren-yi XIAO. Survey of privacy preserving data queries in cloud computing[J]. Journal on Communications, 2014, 35(12): 168-177.
[1] | TechCrunch. iPad breach update:more personal data was potentially at risk[EB/OL]., 2010. |
[2] | ITGI. Global status report on the gorvance of enterprise IT (GETIT)-2011[EB/OL]., 2011. |
[3] | GOLDREICH O . Towards a theory of software protection and simula-tion by oblivious RAMs[A]. STOC[C]. 1987. |
[4] | OSTROVSKY R , SHOUP V . Private information storage (extended abstract)[A]. STOC[C]. 1997.294-303. |
[5] | GOLDREICH O , OSTROVSKY R . Software protection and simula-tion on oblivious RAMs[J]. J ACM 1996,43(3):431-473. |
[6] | OSTROVSKY R . Efficient computation on oblivious RAMs[A]. ACM Symposium on Theory of Computing(STOC)[C]. 1990. |
[7] | STEFANOV E , DIJK M , SHI E ,et al. Path oram:an extremely simple oblivious ram protocol[A]. CCS[C]. 2013. |
[8] | GOODRICH M T , MITZENMACHER M , OHRIMENKO O ,et al. Privacy-preserving group data access via stateless oblivious RAM simulation[A]. SODA[C]. 2012. |
[9] | KUSHILEVITZ E , LU S , OSTROVSKY R ,et al. On the (in)security of hash-based oblivious RAM and a new balancing scheme[A]. SODA[C]. 2012. |
[10] | WILLIAMS P , SION R . Round-optimal access privacy on outsourced storage[A]. CCS[C]. 2012. |
[11] | SHI E , CHAN T H H , STEFANOV E ,et al. Oblivious RAM with O ((log N)3) worst-case cost[A]. ASIACRYPT[C]. 2011.197-214. |
[12] | BONEH D , MAZIERES D , POPA R A . Remote oblivious storage:making oblivious RAM practical manuscript[EB/OL]., 2011. |
[13] | DAMGARD I , MELDGAARD S , NIELSEN J B . Perfectly secure oblivious RAM without random oracles[A]. TCC[C]. 2011. |
[14] | GOODRICH M T , MITZENMACHER M . Privacy-preserving access of outsourced data via oblivious RAM simulation[A]. ICALP[C]. 2011. |
[15] | GOODRICH M T , MITZENMACHER M , OHRIMENKO O ,et al. Oblivious RAM simulation with efficient worst-case access over-head[A]. ACM Cloud Computing Security Workshop (CCSW)[C]. 2011. |
[16] | PINKAS B , REINMAN T . Oblivious RAM revisited[A]. CRYPTO[C]. 2010. |
[17] | WILLIAMS P , SION R , CARBUNAR B . Building castles out of mud:practical access pattern privacy and correctness on untrusted stor-age[A]. CCS[C]. 2008. |
[18] | SONG D , WAGNER D , PERRIG A . Practical techniques for searching on encrypted data[A]. Proc Symposium on Research in Security and Privacy (S&P)[C]. 2000.44-55. |
[19] | GOH E J . Technical report 2003/216,IACR ePrint Cryptography Archive[EB/OL].. |
[20] | CURTMOLA R , GARAY J , KAMARA S ,et al. Searchable symmetric encryption:improved definition and effcient constructions[A]. Proc ACM Conference on Computer and Communications Security (CCS)[C]. 2006.79-88. |
[21] | KAMARA S , PAPAMANTHOU C , ROEDER T . Dynamic searchable symmetric encryption[A]. ACM CCSI[C]. 2012.965-976. |
[22] | CHASE M , KAMARA S . Structured encryption and controlled dis-closure[A]. Proc Int Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT)[C]. 2010.577-594. |
[23] | KUROSAWA K , OHTAKI Y . UC-secure searchable symmetric en-cryption[A]. Proc Financial Cryptography and Data Security (FC)[C]. 2012. |
[24] | LIESDONK P , SEDGHI S , DOUMEN J ,et al. Computationally effi-cient searchable symmetric encryption[A]. Proc Workshop on Secure Data Management (SDM)[C]. 2010.87-100. |
[25] | KAMARA S , PAPAMANTHOU C . Parallel and dynamic searchable symmetric encryption[A]. Financial Cryptography and Data Security (FC'13)[C]. 2013. |
[26] | BONEH D , CRESCENZO G , OSTROVSKY R ,et al. Public key encryption with keyword search[A]. Proceedings of Eurocrypt 2004,LNCS 3027[C]. 2004.506-522. |
[27] | ABDALLA M , BELLARE M , CATALANO D ,et al. Searchable encryption revisited:consistency properties,relation to anonymous IBE,and extensions[J]. J Cryptology, 2008,21(3):350-391. |
[28] | BONEH D , WATERS B . Conjunctive,subset,and range queries on encrypted data[A]. The Theory of Cryptography Conference (TCC)[C]. 2006.535-554. |
[29] | DAVIS D , MONROSE Fn , MICHAEL K . Reiter:Time-scoped search-ing of encrypted audit logs[A]. ICICS 2004[C]. 2004.532-545. |
[30] | CHEUNG D W , MAMOULIS N , WONG W K ,et al. Anonymous fuzzy identity-based encryption for similarity search[A]. ISAAC[C]. 2010.61-72. |
[31] | PARK D J , KIM K , LEE P J . Public key encryption with conjunctive field keyword search[A]. WISA 2004[C].Springer,Heidelbeg, 2004.73-86. |
[32] | GOLLE P , STADDON J , WATERS B . Secure conjunctive keyword search over encrypted data[A]. ACNS 04:2nd International Confer-ence on Applied Cryptography and Network Security[C]. 2004.31-45. |
[33] | WANG J , CHEN X , MA H ,et al. A verifiable fuzzy keyword search over encrypted data[J]. Journal of Internet Services and Information Security, 2012:49-58. |
[34] | WANG C , CAO N , REN K ,et al. Enabling secure and efficient ranked keyword search over outsourced cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2012,23(8):1467-1479. |
[35] | ZOBEL J , MOFFAT A . Exploring the similarity space[J]. SIGIR Fo-rum, 1998,32(1):18-34. |
[36] | BOLDYREVA A , CHENETTE N , LEE Y ,et al. Order-preserving symmetric encryption[A]. Proc of Eurocrypt[C]. 2009. |
[37] | CAO N , WANG C , LI M ,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[A]. Proc of Eurocrypt[C]. 2011.829-837. |
[38] | WITTEN I H , MOFFAT A , BELL T C . Managing Gigabytes:Com-pressing and Indexing Documents and Images[M]. Morgan Kaufmann Publishing, San Francisco, 1999. |
[39] | XU Z , KANG W , LI R ,et al. Efficient multi-keyword ranked query on encrypted data in the cloud[A]. Proc of ICPADS[C]. 2012. |
[40] | SAVA? E , ?RENCIK C . Efficient and secure ranked multi-keyword search on encrypted cloud data[A]. Proc of Joint EDBT/ICDT Work-shops[C]. 2012.186-195. |
[41] | LI J , WANG Q , WANG C ,et al. Fuzzy keyword search over encrypted data in cloud computing[A]. Proc of IEEE INFOCOM[C]. 2010.441-445. |
[42] | LI J , WANG Q , WANG C ,et al. Fuzzy keyword search over encrypted data in cloud computing[A]. Proc of IEEE INFOCOM[C]. 2010.441-445. |
[43] | WANG C , REN K , YU S ,et al. Achieving usable and privacy- assur-edsimilarity search over outsourced cloud data[A]. Proc of INFO-COM[C]. 2012. |
[44] | AGRAWAL R , KIERNAN J , SRIKANT R ,et al. Order preserving encryption for numeric data[A]. Proc SIGMOD[C]. 2004.563-574. |
[45] | BONEH D , CRESCENZO G D , OSTROVSKY R ,et al. Public key encryption with keyword search[A]. Proceedings of Eurocrypt 2004[C]. 2004.506-522. |
[46] | MICHEL A , MIHIR B , DARIO C ,et al. Searchable encryption revis-ited:consistency properties,relation to anonymous IBE,and exten-sions[J]. Cryptology, 2008,21(3):350-391. |
[47] | DAN B , BRENT W . Conjunctive,subset,and range queries on en-crypted data[A]. The Theory of Cryptography Conference (TCC)[C]. 2006.535-554. |
[48] | 黄汝维, 桂小林, 余思 等. 云计算环境中支持隐私保护的可计算加密方法[J]. 计算机学报, 2011,34(12):2391-2402. HUANG R W , GUI X L , YU S ,et al. Privacy-preserving computable encryption scheme of cloud computing[J]. Chinese Journal of Com-puters, 2011,34(12):2391-2402. |
[49] | 张逢喆, 陈进, 陈海波 等. 云计算中的数据隐私性保护与自我销毁[J]. 计算机研究与发展, 2011,48(7):1155-1167. ZHANG F Z , CHEN J , CHEN H B ,et al. Life time privacy and self-destruction of data in the cloud[J]. Journal of Computer Research and Development, 2011,48(7):1155-1167. |
[50] | 黄勤龙, 马兆丰, 傅镜艺 等. 云计算环境中支持隐私保护的数字版权保护方案[J]. 通信学报, 2014,35(2):95-103. HUANG Q L , MA Z F , FU J Y ,et al. Privacy-preserving digital rights management scheme in cloud computing[J]. Journal on Communica-tions, 2014,35(2):95-103. |
[51] | 朱旭东, 李晖, 郭祯 . 云计算环境下加密图像检索[J]. 西安电子科技大学学报(自然科学版), 2014,41(2):151-158. ZHU X D , LI H , GOU Z . Privacy-preserving query over the encrypted image in cloud computing[J]. Journal of Xidian University, 2014,41(2):151-158. |
[52] | LI R , LIU A X , WANG L Y ,et al. Fast range query processing with strong privacy protection for cloud computing[A]. The 40th Interna-tional Conference on Very Large Data Bases[C]. 2014.1953-1964. |
[53] | SHACHAM H , WATERS B . Compact proofs of retrievability[A]. Proceedings of Asia Crypt[C]. Melbourne,Australia, 2008.90-107. |
[54] | DODIS Y , SALIL P , VADHAN D . Wichs:proofs of retrievability via hardness amplification[A]. IACR Cryptology ePrint Archive[C]. 2009.41. |
[55] | ATENIESE G , PIETRO R D , LUIGI V ,et al. Scalable and efficient provable data possession[A]. IACR Cryptology ePrint Archive[C]. 2008.114. |
[56] | ERWAY C , KUPCU A , PAPAMANTHOU C ,et al. Dynamic provable data possession[A]. Proceedings of the 16th ACM conference on Com-puter and communications security[C]. 2009.213-222. |
[57] | WANG Q , WANG C , LI J ,et al. Enabling public verifiability and data dynamics for storage security in cloud computing[A]. ESORICS 2009[C]. Saint Malo,France, 2009.21-25. |
[58] | BOWERS K D , JUELS A , OPREA A ,et al. HAIL:a high-availability and integrity layer for cloud storage[A]. Proceedings of the 16th ACM Conference on Computer and Communications Security[C]. 2009.187-198. |
[59] | CURTMOLA R , KHAN O , BURNS R ,et al. MR-PDP:multi-ple-replica provable data possession[A]. Proceeding ICDCS '08 Pro-ceedings of the 2008 The 28th International Conference on Distributed Computing Systems[C]. 2008.411-420. |
[60] | ATENIESE G , KAMARA S , KATZ J ,et al. Proofs of storage from homo-morphic identification protocols[A]. Cryptology-ASIACRYPT'09[C]. 2009.319-333. |
[61] | NARASIMHA M , TSUDIK G . Authentication of outsourced databases using signature aggregation and chaining[A]. Proc Inte Conf on Data-base Systems for Advanced Applications[C]. Springer Berlin, 2006.420-436. |
[62] | CHEN H , MAN X , HSU W ,et al. Access control friendly query veri-fication for outsourced data publishing[A]. Proc 13th European Sym-posium on Research in Computer Security[C]. Springer-Verlag, 2008.177-191. |
[63] | 咸鹤群, 冯登国 . 外包数据库模型中的完整性检测方案[J]. 计算机研究与发展, 2010,47(6):1107-1115. XIAN H Q , FENG D G . An integrity checking scheme in outsourced database model[J]. Journal of Computer Research and Development, 2010,47(6):1107-1115. |
[64] | 刘媛, 涂晓东, 张兵 . 关于外包数据库完整性验证的研究[J]. 计算机技术与发展, 2010,20(5):150-153,157. LIU Y , TU X D , ZHANG B . Research on integrity verification of out-sourcing database[J]. Journal of Computer Technology and Develop-ment, 2010,20(5):150-153,157. |
[65] | 李睿, 林亚平, 易叶青 等. 两层传感器网络中隐私与完整性保护的范围查询协议[J]. 计算机学报, 2013,36(6):1194-1209. LI R , LIN Y P , YI Y Q ,et al. A privacy and integrity preserving range query protocol two-tiered sensor networks[J]. Chinese Journal of Computers, 2013,36(6):1194-1209. |
[66] | 周恩光, 李舟军, 郭华 等. 一个改进的云存储数据完整性验证方案[J]. 电子学报, 2014,42(1):150-154. ZHOU E G , LI Z J , GUO H ,et al. An improved data integrity verfica-tion scheme in cloud storage system[J]. Acta Electronica Sinica, 2014,42(1):150-154. |
[67] | BONEH D , FRANKLIN M . Identity based encryption from the Weil pairing[A]. Crypto[C]. 2001.213-229. |
[68] | COCKS C . An identity based encryption scheme based on quadratic residues[A]. Proceedings of the 8th IMA International Conference on Cryptography and Coding[C]. 2001.360-363. |
[69] | SAHAI A , WATERS B . Fuzzy identity-based encryption[A]. EUROCRYPT 2005[C]. 2005.457-473. |
[70] | GOYAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine-grained access control of encrypted data[A]. ACM Conference on Computer and Communications Security 2006[C]. 2006.89-98. |
[71] | OSTROVSKY R , SAHAI A , WATERS B . Attribute-based encryption with non-monotonic access structures[A]. ACM Conference on Com-puter and Communications Security 2007[C]. 2007.195-203. |
[72] | BETHENCOURT J , WATERS B , SAHAI A . Ciphertext-policy attrib-ute-based encryption[A]. SP '07 Proceedings of the 2007 IEEE Sym-posium on Security and Privacy[C]. 2007.321-334. |
[73] | GOYAL V , JAIN A , PANDEY O ,et al. Bounded ciphertext policy attribute based encryption[A]. ICALP '08 Proceedings of the 35th in-ternational colloquium on Automata,Languages and Programming[C]. 2008.579-591. |
[74] | KHADER D . Attribute Based Group Signatures[R]. Cryptology ePrint Archive,Report 2007/159. |
[75] | ZHU Y , AHN G J , HU H X ,et al. Cryptographic role-based security mechanisms based on role-key hierarchy[A]. Proceedings of 5th ACM Symposium on Information,Computer and Communications Security (ASIACCS 2010)[C]. Beijing,China, 2010. |
[76] | ZHU Y , AHN G J , HU H G ,et al. Cryptographic role-based security mechanisms based on role-key hierarchy[A]. ASIACCS 2010[C]. 2010.314-319. |
[77] | YU S C , WANG C , REN K ,et al. Achieving secure,scalable,and fine-grained data access control in cloud computing[A]. Proc of IN-FOCOM 2010[C]. 2010. |
[78] | 洪澄, 张敏, 冯登国 . AB-ACCS:一种云存储密文访问控制方法[J]. 计算机研究与发展, 2010,47(z1):259-265. HONG C , ZHANG M , PENG D G . AB-ACCS:a cryptographic access control scheme for cloud storage[J]. Journal of Computer Research and Development, 2010,47(z1):259-265. |
[79] | CHEN Z , XU Y , WANG X ,et al. A new fault tolerance system for cloud storage[J]. Journal of Convergence Information Technology, 2011,6(4):34-41. |
[80] | SUN D , CHANG G , GAO S ,et al. Modeling a dynamic data repli-cation strategy to increase system availability in cloud computing environments[J]. Journal of Computer Science and Technology, 2012,27(2):256-272. |
[81] | BONVIN N , PAPAIOANNOU T G , ABERER K . A self-organized,fault-tolerant and scalable replication scheme for cloud storage[A]. Proceedings of the 1st ACM Symposium on Cloud Computing (SoCC)[C]. New York,NY, 2010. |
[82] | CHEN D , PING X . Research on data fault tolerance mechanism based on ECT in cloud storage[J]. Communications in Computer and Infor-mation Science, 2013,334:14-25. |
[83] | BICER T , JIANG W , AGRAWAL G . Supporting fault tolerance in a data-intensive computing middleware[A]. IEEE International Sympo-sium on Parallel & Distributed Processing (IPDPS)[C]. 2010.1-12. |
[1] | Ling MA, Qiliang FAN, Ting XU, Guanchen GUO, Shenglin ZHANG, Yongqian SUN, Yuzhi ZHANG. Scheduling framework based on reinforcement learning in online-offline colocated cloud environment [J]. Journal on Communications, 2023, 44(6): 90-102. |
[2] | Lichuan MA, Jiayi PENG, Qingqi PEI, Haojin ZHU. Efficient privacy-preserving decision tree classification protocol [J]. Journal on Communications, 2021, 42(8): 80-89. |
[3] | Huaqun WANG, Zhe LIU, Debiao HE, Jiguo LI. Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud [J]. Journal on Communications, 2021, 42(7): 52-60. |
[4] | Jianhong ZHANG, Menglong WU, Jing WANG, Pei LIU, Zhengtao JIANG, Changgen PENG. Secure and verifiable multi-keyword searchable encryption scheme in cloud [J]. Journal on Communications, 2021, 42(4): 139-149. |
[5] | Ruiqi LI, Chunfu JIA, Yafei WANG. Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application [J]. Journal on Communications, 2021, 42(3): 11-22. |
[6] | Jiawei ZHANG, Jianfeng MA, Zhuo MA, Teng LI. Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing [J]. Journal on Communications, 2021, 42(10): 81-94. |
[7] | Wenjuan WANG, Xuehui DU, Dibin SHAN. Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph [J]. Journal on Communications, 2021, 42(1): 1-17. |
[8] | Youliang TIAN,Qin LUO. Verifiable multi-keyword search scheme based on improved Merkle-Tree authentication method [J]. Journal on Communications, 2020, 41(9): 118-129. |
[9] | Na WANG,Kun ZHENG,Junsong FU,Jian LI. Method of ciphertext retrieval in mobile edge computing based on block segmentation [J]. Journal on Communications, 2020, 41(7): 95-102. |
[10] | Lindong ZHAO,Wenqin ZHUANG,Jianxin CHEN,Liang ZHOU. Hierarchical task offloading in heterogeneous cellular network:modeling and optimization [J]. Journal on Communications, 2020, 41(4): 34-44. |
[11] | Bing LIANG,Wen JI. Multiuser computation offloading for edge-cloud collaboration using submodular optimization [J]. Journal on Communications, 2020, 41(10): 25-36. |
[12] | SU Mingfeng,WANG Guojun,LI Renfa. Multidimensional QoS cloud computing resource scheduling method based on stakeholder perspective [J]. Journal on Communications, 2019, 40(6): 102-115. |
[13] | CHEN Xingshu,HUA Qiang,WANG Yitong,GE Long,ZHU Yi. Research on low-rate DDoS attack of SDN network in cloud environment [J]. Journal on Communications, 2019, 40(6): 210-222. |
[14] | Wanliang WANG, Zelin ZANG, Guoqi CHEN, Hangyao TU, Yule WANG, Linyan LU. Research on optimal two element exchange algorithm for large scale cloud computing server scheduling problem [J]. Journal on Communications, 2019, 40(5): 180-191. |
[15] | Tian WANG,Xuewei SHEN,Hao LUO,Baisheng CHEN,Guojun WANG,Weijia JIA. Research progress of trusted sensor-cloud based on fog computing [J]. Journal on Communications, 2019, 40(3): 170-181. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|