JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2017, Vol. 52 ›› Issue (11): 11-22.doi: 10.6040/j.issn.1671-9352.0.2017.191
Previous Articles Next Articles
YAO Ke1, ZHU Bin-rui1, QIN Jing1,2*
CLC Number:
[1] 冯朝胜, 秦志光, 袁丁. 云数据安全存储技术[J]. 计算机学报, 2015, 38(1):150-163. FENG Chaosheng, QIN Zhiguang, YUAN Ding. Techniques of secure storage for cloud data[J]. Chinese Journal of Computers, 2015, 38(1):150-163. [2] SONG D X, WAGNER D, PERRIG A. Practical techniques for searches on encrypted data[C] // IEEE Symposium on Security and Privacy. Washington: IEEE Computer Society, 2000: 44. [3] BONEH D, CRESCENZO G D, OSTROVSKY R, et al. Public key encryption with keyword search[M] // CACHIN C, CAMENISCH J. Lecture Notes in Computer Science. Berlin: Springer-verlag Berlin, 2004: 506-522. [4] BAEK J, SAFAVINAINI R, SUSILO W. Public key encryption with keyword search revisited[M] // GERVASI O, MURGANTE B. Lecture Notes in Computer Science. Berlin: Springer-verlag Berlin, 2008, 5072: 1249-1259. [5] ABDALLA M, BELLARE M, CATALANO D, et al. Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions[J]. Journal of Cryptology, 2008, 21(3):350-391. [6] BYUN J, RHEE H, PARK H A, et al. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data[J]. Secure Data Management, 2006: 75-83. [7] JEONG I R, KWON J O, HONG D, et al. Constructing PEKS schemes secure against keyword guessing attacks is possible?[J]. Computer Communications, 2009, 32(2):394-396. [8] FANG Liming, SUSILO W, GE Chunpeng, et al. A secure channel free public key encryption with keyword search scheme without random oracle[C] // GARAY J A, MIYAJI A, OTSUKA A. Lecture Notes in Computer Science. Berlin: Springer-verlag Berlin, 2009, 5888:248-258. [9] XU Peng, JIN Hai, WU Qianhong, et al. Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack[J]. IEEE Transactions on Computers, 2013, 62(11):2266-2277. [10] SAHAI A, WATERS B. Fuzzy identity-based encryption[M] // CRAMER R. Lecture Notes in Computer Science. Heidelberg: Springer-verlag Berlin, 2005, 3494:457-473. [11] DAN B, FRANKLIN M. Identity-based encryption from the Weil pairing[J]. Siam Journal on Computing, 2003, 32(3):213-229. [12] SAHAI A, WATERS B. Fuzzy identity-based encryption[M] // CRAMER R. Lecture Notes in Computer Science. Heidelberg: Springer-verlag Berlin, 2004, 3494:457-473. [13] GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[J]. Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM, 2010, 89-98. [14] BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption[C] // Proceedings of the IEEE Symposium on Security and Privacy(To Appear). New York: IEEE, 2007: 321-334. [15] GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C] // ACM Conference on Computer and Communications Security. New York: ACM, 2006: 89-98. [16] KHADER D. Attribute based search in encrypted data: ABSE[C] // Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security. New York: ACM, 2014: 31-40. [17] HAN Fei, QIN Jing, ZHAO Huawei, et al. A general transformation from KP-ABE to searchable encryption[J]. Future Generation Computer Systems, 2014, 30(1):107-115. [18] 韩斐. 基于属性的可搜索加密协议研究[D]. 济南:山东大学, 2015. HAN Fei. Research on attribute based searchable encryption[D]. Jinan:Shandong University, 2015. [19] WANG Xingyuan, ZHAO Fengjian. An improved key agreement protocol based on chaos[J]. Communications in Nonlinear Science & Numerical Simulation, 2010, 15(12):4052-4057. [20] WANG Xingyuan, PENG Daluan. A secure key agreement protocol based on chaotic maps[J]. Chinese Physics B, 2013, 22(11):239-243. [21] NIU Yunjun, WANG Xingyuan. An anonymous key agreement protocol based on chaotic maps[J]. Communications in Nonlinear Science & Numerical Simulation, 2011, 16(4):1986-1992. [22] JAIN A K, ROSS A, PRABHAKAR S. An introduction to biometric recognition[J]. IEEE Transactions on Circuits & Systems for Video Technology, 2004, 14(1):4-20. [23] ULUDAG U, PANKANTI S, PRABHAKAR S, et al. Biometric cryptosystems: issues and challenges[J]. Proceedings of the IEEE, 2004, 92(6):948-960. [24] 朱斌瑞, 秦静, 韩斐. 基于生物特征的可搜索加密[J]. 山东大学学报(理学版), 2016, 51(5):78-86. ZHU Binrui, QIN Jing, HAN Fei. Searchable encryption scheme based on biometric[J]. Journal of Shandong University(Natural Science), 2016, 51(5):78-86. [25] CHAI Qi, GONG Guang. Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers[C] // IEEE International Conference on Communications. New York: IEEE, 2012: 917-922. [26] ZHENG Q, XU S, ATENISES G. VABKS: verifiable attribute-based keyword search over outsourced encrypted data[C] // IEEE INFOCOM 2014-IEEE Conference on Computer Communications. New York: IEEE, 2014: 522-530. [27] LIU Pengliang, WANG Jianfeng, MA Hua, et al. Efficient verifiable public key encryption with keyword search based on KP-ABE[C] // International Conference on Broadband & Wireless Computing. New York: IEEE, 2014: 584-589. [28] SUN Wenhai, WANG Bing, CAO Ning, et al. Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking[J]. IEEE Transactions on Parallel & Distributed Systems, 2013, 25(11):71-82. [29] WANG Jianfeng, MA Hua, TANG Qiang, et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing[J]. Computer Science & Information Systems, 2013, 10(2):667-684. [30] ZHANG Rui, XUE Rui, YU Ting, et al. PVSAE: a public verifiable searchable encryption service framework for outsourced encrypted data[C] // Proceedings of the International Conference on Web Services(ICWS). New York: IEEE, 2016: 428-435. [31] MIAO Yinbin, MA Jianfeng, WEI Fushan, et al. VCSE: verifiable conjunctive keywords search over encrypted data without secure-channel[J]. Peer-to-Peer Networking and Applications, 2016: 1-13. [32] HAN Fei, QIN Jing, HU Jiankun. Secure searches in the cloud[J]. Future Generation Computer Systems, 2016, 62(C):66-75. [33] GOLLE P, STADDON J, WATERS B. Secure conjunctive keyword search over encrypted data[J]. Lecture Notes in Computer Science, 2004, 3089:31-45. [34] CAO Ning, WANG Cong, LI Ming, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel & Distributed Systems, 2014, 25(1):222-233. [35] LI Jin, WANG Qian, WANG Cong, et al. Fuzzy keyword search over encrypted data in cloud computing[C] // IEEE Conference on Information Communications. Piscataway: IEEE, 2010: 1-5. [36] BURTON H B. Space/time trade-offs in Hash coding with allowable errors[J]. Communications of the ACM, 1970, 13(7):422-426. [37] ISOBE Y, OHKI T, KOMATSU N. Security performance evaluation for biometric template protection techniques[J]. International Journal of Biometrics, 2013, 5(1):53-72. [38] DODIS Y, REYZIN L. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data[M] //Advances in Cryptology-EUROCRYPT 2004. Berlin: Springer-verlage Berlin, 2004, 3027:523-540. [39] HSU S T, YANG C C, HWANG M S. A study of public key encryption with keyword search[J]. International Journal of Network Security, 2013, 15(2):71-79. [40] RHEE H S, SUSILO W, KIM H J. Secure searchable public key encryption scheme against keyword guessing attacks[J]. IEICE Electronics Express, 2009, 6(5):237-243. [41] BURNETT A, BYRNE F, DOWLING T, et al. A biometric identity based signature scheme[J]. International Journal of Network Security, 2007, 5(3). [42] 申飞, 黄承杰, 吴仲城. 生物特征加密技术现状与发展趋势[C] //全国计算机安全学术交流会.合肥:中国科学技术大学出版社,2008:292-297. SHEN Fei, HUANG Chengjie, WU Zhongcheng. The state of the art and developmental tendency of biometric encryption[C] // National Academic Conference on Computer Security. Hefei: University of Science and Technology of China Press, 2008: 292-297. [43] SARIER N D. A new biometric identity based encryption scheme[C] // Proceedings of the 19th International Conference on Young Computer Scientists. New York: IEEE, 2008: 2061-2066. [44] SARIER N D. Generic constructions of biometric identity based encryption systems[C] // SAMARATI P, TUNSTALL M, POSEGGA J, et al. Lecture Notes in Computer Science. Berlin: Springer-verlag Berlin, 2010, 6033:90-105. |
[1] | WANG Xiao-yan, CHEN Xing-shu, WANG Yi-tong, GE Long. Performance measurement and analysis of cloud computing network based on OpenStack [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 30-37. |
[2] | HAN Pan-pan, QIN Jing. Verifiable and searchable encryption scheme for outsourced database in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(9): 41-53. |
[3] | HUANG Yu-qing, ZHAO Bo, XIAO Yu, TAO Wei. A vTPM-VM live migration scheme based on KVM [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 69-75. |
[4] | CHEN Guang-rui, CHEN Xing-shu, WANG Yi-tong, GE Long. A software update mechanism for virtual machines in IaaS multi-tenant environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 60-67. |
[5] | . An approach of detecting LDoS attacks based on the euclidean distance of available bandwidth in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 92-100. |
[6] | ZHU Bin-rui, QIN Jing, HAN Fei. Searchable encryption scheme based on biometrics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(5): 78-86. |
[7] | DU Rui-ying, LIU Ya-bin, LIU Jian-dong, LUO Hui-xia. A certificateless key-insulated signature Scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(09): 24-28. |
[8] | CAI Hong-yun, TIAN Jun-feng. Research of data privacy protection for cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(09): 83-89. |
[9] | LUO hai-yan, LÜ Ping, LIU Lin-zhong, YANG Xun. Enterprises trust comprehensive evaluation based on fussy rough AHP in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(08): 111-117. |
[10] | LIU Yang, QIN Feng-lin, GE Lian-sheng. Measurement study of cloud computing: a survey [J]. J4, 2013, 48(11): 27-35. |
[11] | GU Chun-sheng1,2, WU Fang-sheng2, JING Zheng-jun2,3, YU Zhi-min2. Security analysis of fast public key cryptosystem on matrix ring [J]. J4, 2013, 48(09): 22-28. |
[12] | LI Juan-ying, CHEN Xiao-feng. Abuse-free three-party contract singing protocol [J]. J4, 2012, 47(9): 65-70. |
[13] | JU Chun-fei1, QIU Xiao-tao2, WANG Bao-cang2,3. Fast public key cryptosystem based on matrix ring [J]. J4, 2012, 47(9): 56-59. |
|