山东大学学报(理学版) ›› 2017, Vol. 52 ›› Issue (9): 41-53.doi: 10.6040/j.issn.1671-9352.0.2017.145
韩盼盼1,秦静1,2*
HAN Pan-pan1, QIN Jing1,2*
摘要: 云上外包数据库的安全问题已成为云计算安全的研究热点。给出两个具有数据保密性的云上外包数据库模型,可以验证查询完整性,并能有效保护数据搜索者的搜索隐私。这两个数据库模型支持单属性等值选择操作及其与投影的复合操作,支持数据的添加与删除。与已有的此类方案相比,在计算量相当的前提下,具有较高的安全性和较多的功能。
中图分类号:
[1] MELL P, GRANCE T. The NIST definition of cloud computing[M]. Gaithersburg: National Institute of Standards & Technology, 2011. [2] HACIGUMUS H, IYER B, MEHROTRA S. Providing database as a service[C] // Proceedings of the International Conference on Data Engineering. Los Alamitos: IEEE Computer Society, 2002: 29-38. [3] SHAIKH F B, HAIDER S. Security threats in cloud computing[C] // Proceedings of 2015 International Conference on Computing, Communication & Automation(ICCCA). New York: IEEE, 2011: 214-219. [4] CURTMOLAR, GARAYJ, KAMARA S, et al. Searchable symmetric encryption: improved definitions and efficient constructions[EB/OL].(2006-6-26)[2017-2-14]. http://eprint. iacr.org/2006/210. [5] LI Feifei, HADJIELEFTHERIOU M, KOLLIOS G, et al. Dynamic authenticated index structures for outsourced databases[C] // ACM SIGMOD International Conference on Management of Data. New York: ACM, 2008: 121-132. [6] HAN Fei, QIN Jing, HU Jiankun. Secure searches in the cloud: a survey[J]. Future Generation Computer Systems, 2016, 62:66-75. [7] WANG Jianfeng, CHEN Xiaofeng. Efficient and secure storage for outsourced data: a survey[J]. Data Science & Engineering, 2016, 1(3):178-188. [8] DEVANBU P, GERTZ M, MARTEL C, et al. Authentic data publication over the internet[J]. Journal of Computer Security, 2003, 11(3):291-314. [9] MA Di, DENG R H, PANG H, et al. Authenticating query results in data publishing[C] // Proceedings of the International Conference on Information and Communications Security. Berlin: Springer-Verlag, 2005: 376-388. [10] SION R. Query execution assurance for outsourced databases[C] // Proceedings of the 31st International Conference on Very Large Data Bases. [S.l.] : DBLP, 2005: 601-612. [11] XIE Min, WANG Haixun, YIN Jian, et al. Integrity auditing of outsourced data[C] // Proceedings of the 33rd International Conference on Very Large Data Bases.[S.l.] : DBLP, 2007: 782-793. [12] MYKLETUN E, NARASIMHA M, TSUDIK G. Authentication and integrity in outsourced databases[J]. ACM Transactions on Storage, 2004, 2(2):107-138. [13] NARASIMHA M, TSUDIK G. DSAC: integrity for outsourced databases with signature aggregation and chaining[C] // ACM CIKM International Conference on Information and Knowledge Management. New York: ACM Press, 2005: 235-236. [14] WANG Jianfeng, CHEN Xiaofeng, HUANG Xinyi, et al. Verifiable auditing for outsourced database in cloud computing[J]. IEEE Transactions on Computers, 2015, 64(11):3293-3303. [15] WANG Jianfeng, CHEN Xiaofeng, LI Jin, et al. Towards achieving flexible and verifiable search for outsourced database in cloud computing[J]. Future Generation Computer Systems, 2017, 67:266-275. [16] ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores[C] // ACM Conference on Computer and Communications Security. New York: ACM, 2007: 598-609. [17] MERKLE R C. A certified digital signature [M] //Advances in Cryptology—CRYPTO’ 89 Proceedings. New York: Springer-Verlag, 1989: 218-238. [18] BUCHMANN J, DAHMEN E, SCHNEIDER M. Merkle tree traversal revisited[M] // Post-Quantum Cryptography. Berlin: Springer-Verlag, 2008: 63-78. [19] BURTON H B. Space/Time trade-offs in hash coding with allowable errors[J]. Communications of the ACM, 1970, 13(7):422-426. [20] EPPSTEIN D, GOODRICH M T. Straggler identification in round-trip data streams via Newton's identities and invertible Bloom filters[J]. IEEE Transactions on Knowledge & Data Engineering, 2010, 23(2):297-306. [21] FAN Li, CAO Pei, ALMEIDA J, et al. Summary cache: a scalable wide-area Web cache sharing protocol[J]. IEEE/ACM Transactions on Networking, 2000, 8(3):281-293. [22] EVDOKIMOV S, GUNTHER O. Encryption techniques for secure database outsourcing[C] // Proceedings of the12th European Symposium on Research in Computer Security. Heidelberger: Springer-Verlag Berlin, 2007: 327-342. [23] CHU Chengkang, TZENG W G. Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries [J]. Journal of Universal Computer Science, 2005, 3(3):172-183. |
[1] | 王小艳,陈兴蜀,王毅桐,葛龙. 基于OpenStack的云计算网络性能测量与分析[J]. 山东大学学报(理学版), 2018, 53(1): 30-37. |
[2] | 黄宇晴,赵波,肖钰,陶威. 一种基于KVM的vTPM虚拟机动态迁移方案[J]. 山东大学学报(理学版), 2017, 52(6): 69-75. |
[3] | 陈广瑞,陈兴蜀,王毅桐,葛龙. 一种IaaS多租户环境下虚拟机软件更新服务机制[J]. 山东大学学报(理学版), 2017, 52(3): 60-67. |
[4] | 姚克,朱斌瑞,秦静. 基于生物信息的可验证公钥可搜索加密协议[J]. 山东大学学报(理学版), 2017, 52(11): 11-22. |
[5] | 岳猛,吴志军,姜军. 云计算中基于可用带宽欧氏距离的LDoS攻击检测方法[J]. 山东大学学报(理学版), 2016, 51(9): 92-100. |
[6] | 蔡红云, 田俊峰. 云计算中的数据隐私保护研究[J]. 山东大学学报(理学版), 2014, 49(09): 83-89. |
[7] | 罗海燕, 吕萍, 刘林忠, 杨洵. 云环境下基于模糊粗糙AHP的企业信任综合评估[J]. 山东大学学报(理学版), 2014, 49(08): 111-117. |
[8] | 刘洋,秦丰林,葛连升. 云计算测量研究综述[J]. J4, 2013, 48(11): 27-35. |
|