期刊文献+

加密数据中连接关键词的安全搜索算法 被引量:2

Secure Search Algorithm for Conjunctive Keyword in Encrypted Data
下载PDF
导出
摘要 现有关键词搜索算法只能处理单个关键词,且检索复杂度高。针对该问题提出同时搜索多个连接关键词的加密数据安全搜索算法,该算法把生成"能力"的过程分为线下和线上2个部分,它对多个连接关键词的安全搜索时间比原有算法降低了80%左右,实例分析结果验证了其正确性和有效性。 Existing keyword search algorithms can only deal with single keyword and presenting high time complexity. Aiming at this problem, this paper proposes a secure search algorithm for encrypted data which searches several conjunctive keywords at the same time. This algorithm partitions the processes for generating "Capability" into two parts—— online part and offiine part. Its run time of secure search is about eighty percents less than existing algorithms. Example analysis results show that this algorithm is reasonable and effective.
作者 刘星毅
出处 《计算机工程》 CAS CSCD 北大核心 2009年第22期153-154,158,共3页 Computer Engineering
基金 广西自然科学基金资助项目(桂科自0899018) 广西教育厅科研基金资助项目(200808MS062)
关键词 数据库安全 加密数据 连接关键词搜索 database security encrypted data conjunctive keyword search
  • 相关文献

参考文献5

二级参考文献16

  • 1张立秋,常会友,刘翔.一种支持共享的高可用数据库加密机制[J].计算机工程与应用,2005,41(20):189-191. 被引量:10
  • 2韩杰思,汤光明,马晓煜.基于图像的信息隐藏安全性分析[J].微计算机信息,2006(01X):19-20. 被引量:14
  • 3Itani W, Kayssi A, Chehab A. An Enterprise Policy-based Security Protocol for Protecting Relational Database Network Objects[C] //Proceedings of the 2006 International Conference on Communications and Mobile Computing. Vancouver, British Columbia, Canada: [s. n.]. 2006-07. 被引量:1
  • 4Shen Huizhang, Zhao Jidi, Wang Huangchen. Illegal Intrusion Detection Based on Hidden Information Database[C]//Proc. of Workshop on Intelligence and Security Informatics. Singapore: [s. n.]. 2006-04: 79-84. 被引量:1
  • 5Chang Chin-chen, Chan Chao-wen. Database Record Encryption Scheme Using Rabin's Public Key Cryptosystem and Its Master Keys[C]//Proc. of the 5th International Conference on Information and Management Sciences. Chengdu, China: [s. n.]. 2006-07:337-342. 被引量:1
  • 6Damiani E, de Capitani di Vimercati S, Foresti S, et al. Key Management for Multi-user Encrypted Databases[C]//Proceedings of the 2005 ACM Workshop on Storage Security and Survivability. 2005. [S. 1.]: ACM Press, 2005. 被引量:1
  • 7Lee Jae-gil, Whang Kyu-young. Secure Query Processing Against Encrypted XML Data Using Query-aware Decryption[J]. Information Sciences. 2006. 176(3): 1928-1947. 被引量:1
  • 8Siang B K. SMS Gateway Interface Remote Monitoring and Controlling via GSM SMS[C]//Proc. of the 4th National Conference on Telecommunication Technology. [S. l.]: IEEE Press, 2003: 84-87. 被引量:1
  • 9Peersman G, Cvetkovic S. The Global System for Mobile Communications Short Message Service[J]. Personal Communications, 2000, 7(3): 15-23. 被引量:1
  • 10Cachin C. An Information Theoretic Model for Steganography[C]// Proc. of the 2nd International Workshop on Information Hiding. [S. l.]: Springer-Verlag, 1998:306-318 被引量:1

共引文献16

同被引文献29

  • 1崔宾阁,刘大昕,王桐.支持快速查询的数据库加密方法研究[J].计算机科学,2006,33(6):115-118. 被引量:13
  • 2Hacigmuus H, Lyer B, Li Chen, et al. Executing SQL over Encrypted Data in the Database-server-provider Model[C]//Proc. of SIGMOD’02. Madison, USA: ACM Press, 2002: 216-227. 被引量:1
  • 3Hore B, Mehrotra S, Tsudik G. A Privacy-preserving Index for Range Queries[C]//Proc. of the 30th VLDB Conference. Toronto, Canada: [s. n.]. 2004: 223-235. 被引量:1
  • 4Lupse OS, Vida MM, Tivadar LS. Cloud Computing and interoperability in healthcare information systems[ C]. The First International Conference on Intelligent Systems and Applications. France : Paseal Lorenz, 2012 : 81-85. 被引量:1
  • 5Hassan T, James BD, Gail-Joon A. Security and privacy challenges in cloud computing environments[J]. In IEEE Journal& Magazines, 2010,8 ( 6 ) : 32-39. 被引量:1
  • 6Zhang R, Liu L. Security models and requirements for health- care application clouds[J]. In IEEE ard International Confer ence on Cloud Computing. Florida: Cririvas, 2 010 : 5-10. 被引量:1
  • 7Takabi H ,Joshi JB. An approach to manage policy hetero- geneity in cloud computing e.nvironment[C]. In 45th Ha- waii International Conference on System Sciences. Honda- lu: Ralph,2012,27(9) : 10-15. 被引量:1
  • 8Bowers KD,Juels A,Oprea A. HAIL. A high-availability and integrity layer for cloud storage[C]//Proc of the 16th ACM Conference on computer and communications secur- ity. New York : ACM,2009: 187-198. 被引量:1
  • 9Gartner. Teleworking in the cloud:security risks andrem edies[DB/OL]. 2010[2010-11-11]. http://www. gartner corn/resources/167600 / 167661 / teleworking-in- the-cloud- sec_167661. pdf. 被引量:1
  • 10Cloud Security Alliance. Security guidance for critical are- as of focus in cloud computing[DB/OL]. 2010[2010-11-11 ]. http..//www, eloudsecurityalliance. org/guidance/ csaguide. pdf. 被引量:1

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部