期刊文献+

Mimir:一种基于密文的全文检索服务系统 被引量:7

Mimir:A Full-Text Retrieval System over Cryptograph
下载PDF
导出
摘要 针对海量涉密隐私数据高效安全检索的需求,提出了一种基于密文的全文检索系统——Mimir.Mimir基于B+树构建了一种安全密文全文索引结构,Mimir检索过程完全在密文环境下进行,保证了系统的安全性和存储信息的私密性.与传统的全文检索系统相比,Mimir密文索引中没有存储索引词的位置信息和词频信息,可以有效地抵御已知明文攻击、选择明文攻击和词频统计攻击.对Mimir密文全文检索系统进行了性能测试,实验结果数据表明,Mimir密文全文检索系统在确保高安全性的同时,也具有很好的检索时间和存储空间性能. For the need of efficient and secure retrieval on the vast privacy data,we propose afull-text retrieval system based on cryptograph,named Mimir.Mimir constructs a secure crypto-graph full-text index based on the B+tree structure.All the retrieval processes of Mimir areabsolutely processed under cryptograph,and it ensures the data security and privacy in Mimir.Comparing with the traditional full-text retrieval systems,Mimir cryptograph index does notstore the word position offset and the frequency of token.Through the security analysis,wedemonstrate that Mimir index structure can effectively resist the known plaintext attack,thechosen plaintext attack,and the statistical attack.We carry out some experiments to evaluate theMimir’s performances.The experimental results showed that Mimir cryptograph full-textretrieval system achieves a good performance on the retrieval time and stored space without leakingprivacy.
出处 《计算机学报》 EI CSCD 北大核心 2014年第5期1170-1183,共14页 Chinese Journal of Computers
基金 国家自然科学基金(61202034 61232002) 武汉市晨光计划(201271031370)资助~~
关键词 密文全文检索 密文索引 Mimir 中文分词 B+树 信息安全 网络安全 cryptograph full-text retrieval cryptograph index Mimir segmentation B+ tree information security network security
  • 相关文献

参考文献25

  • 1Lyer B, Mehrotra S, Mykletun E, et al. A framework for efficient storage security in RDBMS//Proceedings of the 9th International Conference on Extending Database Technology (EDBT). Heraklion, Greece, 2004:147-164. 被引量:1
  • 2Damiani E, Vimercati S D C, Jajodia S, et al. Balancing confidentiality and efficiency in untrusted relational DBMSs// Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS). Washington, USA, 2003: 93-102. 被引量:1
  • 3Haclgumus H, Iyer B, Mehrotra S. Providing database as a service//Proceedings of the 18th International Conference on Data Engineering (ICDE). San Jose, USA, 2002:29-38. 被引量:1
  • 4Rivest R L, Adleman L M, Dertouzos M L. On data banks and privacy homomorphisms. Foundations of Secure Compu- tation, 1978:169-178. 被引量:1
  • 5Gentry C. Fully homomorphic encryption using ideal lattices// Proceedings of the ACM Symposium on Theory of Computing (STOC). Bethesda, USA, 2009:169-178. 被引量:1
  • 6Agrawal R, Kirenan J, Srikant R, Xu Yirong. Order-preser- ving encryption for numeric data//Proceedings of the ACM SIGMOD Conference. Paris, France, 2004:563-574. 被引量:1
  • 7Ge Tingjian, Zdonik S. Fast, secure encryption for indexing in a column-oriented DBMS//Proceedings of the IEEE 23rd International Conference on Data Engineering (ICDE). Istanbul, Turkey, 2007: 676-685. 被引量:1
  • 8Bouganim L, Pueheral P. Chip-secured data access: Confi- dential data on untrusted servers//Proceedings of the 28th International Conference on Very Large Databases (VLDB). Hong Kong, China, 2002:131-142. 被引量:1
  • 9Hacxgumus H, lyer B, Li C, Mehrotra S. Executing sql over encrypted data in the database-service-provider model// Proceedings of the ACM SIGMOD. Madison, USA, 2002: 216-227. 被引量:1
  • 10Haclgumus H, lyer B, Li C, Mehrotra S. Efficient executing of aggregation queries over encrypted relational database// Proceedings of the Database Systems for Advanced Applica- tions (DASFAA). Jeju Island, Korea, 2004:125-136. 被引量:1

二级参考文献44

  • 1戴一奇,尚杰,苏中民.密文数据库的快速检索[J].清华大学学报(自然科学版),1997,37(4):24-27. 被引量:21
  • 2Hacigumus H, Iyer B, Mehrotra S. Providing database as a service [C] //Proc of International Conference on Data Engineering (ICDE), San Jose, California, USA, 2002: 29-40. 被引量:1
  • 3Li F F, Hadjieleftheriou M, Kollios G. Dynamic authenticated index structures for outsourced databases [C]//Proc of ACM Management of Data (SIGMOD), Chicago, IL, USA, 2006: 121-132. 被引量:1
  • 4Papadopoulos S, Papadias D, Cheng W, Tan K. Separating authentication from query execution in outsourced databases [C]//Proc of International Conference on Data Engineering(ICDE),Shanghai, China, 2009: 1148-1151. 被引量:1
  • 5Aameek S, Ling L. Sharoes: a data sharing platform for outsourced enterprise storage environments [C] //Proc of International Conference on Data Engineering (ICDE), Cancun, Mexico, 2008: 993-1002. 被引量:1
  • 6Hacigumus H, Iyer B, Li C, et al.Executing SQL over encrypted data in the database-service-provider model [C] //Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, Madison, Wisconsin, USA, 2002: 216-227. 被引量:1
  • 7Bijit Hore, Sharad Mehrotra, Gene Tsudik. A privacy-index for range queries [C] //Proceedings of the 30th VLDB conference, Toronto, Canada, 2004: 223-235. 被引量:1
  • 8Damiani E, Sabrina De Capitani di Vimercati, Finetti M, et al.. Implementation of a storage mechanism for untrusted DBMSs[C]// Proc of the second International IEEE Security in Storage Workshop, Washington DC, USA, 2003: 38. 被引量:1
  • 9Damiani E, Sabrina De Capitani di Vimercati, Jajodia S, et al.. Balancing confidentiality and efficiency in untrusted relational DBMSs [C] //Proc of the 10th ACM Conference on Computer and Communications Security, Washington DC,USA, 2003: 27-31. 被引量:1
  • 10Haci gümüs Hakan,Iye Balar,Mehrotra Shared.Providing database as a service//Proceedings of the 18th International Conference on Data Engineering(ICDE 2002).San Jose,USA,2002:29-38. 被引量:1

共引文献68

同被引文献102

引证文献7

二级引证文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部