期刊文献+

云存储中基于拼音相似度的密文模糊搜索方案 被引量:1

Ciphertext Fuzzy Search Scheme Based on Pinyin Similarity in Cloud Storage
下载PDF
导出
摘要 中文关键词模糊密文搜索方案依赖预定义的关键词模糊集,存在搜索复杂度高和存储空间大等不足。为此,提出一种应用于云存储的基于拼音相似度的多关键词密文模糊搜索方案。运用拼音相似度和欧氏距离衡量汉字的相似度,以布隆过滤器为基础,利用p-稳定分布的局部哈希函数构造索引,实现多个中文关键词的密文模糊搜索。实验结果表明,与基于关键词的加密云数据模糊搜索方案相比,该方案搜索效率较高,存储代价较小,且能够保证信息安全。 The Chinese keyword fuzzy ciphertext search scheme relies on a predefined keyword fuzzy set,which has higher search complexity and storage cost.A multi-keyword ciphertext fuzzy search scheme based on pinyin similarity in cloud storage is proposed.The pinyin similarity and Euclidean distance are used to measure the similarity of Chinese characters.Based on the Bloom filter,the local hash function of p-stable distribution is used to construct the index to realize ciphertext fuzzy search of multiple Chinese keywords.Experimental results show that compared with fuzzy search over encrypted cloud data based on keywords,the scheme has high search efficiency,low storage cost and can ensure information security.
作者 黄保华 吕琦 莫家威 HUANG Baohua;LU Qi;MO Jiawei(School of Computer and Electronic Information,Guangxi University,Nanning 530004,China)
出处 《计算机工程》 CAS CSCD 北大核心 2019年第1期103-108,共6页 Computer Engineering
基金 国家自然科学基金(61262072)
关键词 云存储 拼音相似度 布隆过滤器 局部敏感哈希 模糊搜索 加密查询 cloud storage pinyin similarity Bloom filter Local Sensitive Hashing(LSH) fuzzy search encrypted query
  • 相关文献

参考文献6

二级参考文献70

  • 1陈光祚.论全文检索系统[J].武汉大学学报(人文科学版),1989,43(6):107-113. 被引量:2
  • 2马显彬.汉语同音现象分析[J].语文研究,2005(2):15-18. 被引量:11
  • 3王源,秦聿昌,刘滨.全文检索处理技术研究Ⅰ:汉字全文检索技术[J].情报学报,1997,16(1):50-56. 被引量:9
  • 4罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 5Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/. 被引量:1
  • 6Distributed Management Task Force (DMTF) http://www.dmtf.org/home. 被引量:1
  • 7Cloud Security Alliance http://www.cloudsecurityalliance.org. 被引量:1
  • 8Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7. 被引量:1
  • 9Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396. 被引量:1
  • 10Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11]. 被引量:1

共引文献1105

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部