面向高效加密云数据排序搜索的类别分组索引方法

刘良桂, 孙辉, 贾会玲, 张宇

电子学报 ›› 2019, Vol. 47 ›› Issue (2) : 331-336.

PDF(1098 KB)
PDF(1098 KB)
电子学报 ›› 2019, Vol. 47 ›› Issue (2) : 331-336. DOI: 10.3969/j.issn.0372-2112.2019.02.011
学术论文

面向高效加密云数据排序搜索的类别分组索引方法

  • 刘良桂, 孙辉, 贾会玲, 张宇
作者信息 +

CGIM: Classificatory Group Index Method for Efficient Ranked Search of Encrypted Cloud Data

  • LIU Liang-gui, SUN Hui, JIA Hui-ling, ZHANG Yu
Author information +
文章历史 +

摘要

针对现有可搜索加密领域所遇到的加密密钥维度高、更新不灵活和搜索速度慢等问题,我们提出了一种新型类别分组索引方法——CGIM.新方法将数据分类后,按类提取关键词建立分组索引,并采用分组加密方式实现以若干低维加密密钥代替高维加密密钥以缩短索引和查询请求的加密时间.此外,分组索引方法的每个组向量对应不同的类别,这样不仅可以实现分类更新以改善更新文档的灵活性,而且能够在检索过程中生成针对性陷门,从而进一步提高搜索的速度和效率.理论和实验分析表明,该方法是可行且有效的.

Abstract

In order to solve the problems such as high dimension of encrypted key,low degree of update flexibility and low search speed in the field of encrypted search,we propose a novel classificatory group index method-CGIM.The method extracts category keywords from classified data to create group index,and uses group encryption method to transform a high-dimensional secret key into several low-dimensional keys to reduce the encryption time of indexes and query requests.In addition,each group in the index is corresponding to different category.Thus,the method can not only achieve classification update to improve the flexibility of document update,but also can generate a targeted trapdoor in the retrieval process to improve the search speed and efficiency further.Through security analysis and performance test,we prove that the method is feasible and effective.

关键词

可搜索加密 / 分组索引 / 高维密钥转换 / 分类更新 / 针对性搜索

Key words

encrypted search / group index / key transformation / category update / targeted search

引用本文

导出引用
刘良桂, 孙辉, 贾会玲, 张宇. 面向高效加密云数据排序搜索的类别分组索引方法[J]. 电子学报, 2019, 47(2): 331-336. https://doi.org/10.3969/j.issn.0372-2112.2019.02.011
LIU Liang-gui, SUN Hui, JIA Hui-ling, ZHANG Yu. CGIM: Classificatory Group Index Method for Efficient Ranked Search of Encrypted Cloud Data[J]. Acta Electronica Sinica, 2019, 47(2): 331-336. https://doi.org/10.3969/j.issn.0372-2112.2019.02.011
中图分类号: TP309.7   

参考文献

[1] Armbrust M,Fox A,Griffith R,et al.A view of cloud computing[J].Communications of the ACM,2010,53(4):50-58.
[2] Heiser J,Nicolett M.Assessing the security risks of cloud computing[J].Gartner Report,2008,27:29-52.
[3] 王小峰,陈培鑫,周寰,等.一种可信安全的层次式基于身份加密系统[J].电子学报,2016,44(7):1521-1529. WANG Xiaofeng,CHEN Peixin,ZHOU Huan,et al.A trustworthy and secure hierarchical identity-based encryption system[J].Acta Electronica Sinica,2016,44(7):1521-1529.(in Chinese)
[4] Wang C,Ren K,Yu S,et al.Achieving usable and privacy-assured similarity search over outsourced cloud data[A].INFOCOM,2012 Proceedings IEEE[C].Orlando,FL,USA:IEEE,2012.451-459.
[5] Sanchez D,Batet M,Isern D,et al.Ontology-based semantic similarity:A new feature-based approach[J].Expert Systems with Applications,2012,39(9):7718-7728.
[6] Desai S S,Laxminarayana J A.WordNet and semantic similarity based approach for document clustering[A].Computation System and Information Technology for Sustainable Solutions(CSITSS),International Conference on[C].Bangalore,India:IEEE,2016.312-317.
[7] Li M,Yu S,Cao N,et al.Authorized private keyword search over encrypted data in cloud computing[A].Distributed Computing Systems(ICDCS),201131st International Conference on[C].Minneapolis,MN,USA:IEEE,2011.383-392.
[8] 袁科,刘哲理,贾春福,等.一对多场景下的公钥时控性可搜索加密[J].电子学报,2015,43(4):760-768. YUAN Ke,Liu Zheli,JIA Chunfu,et al.Public key timed-release searchable encryption in one-to-many scenarios[J].Acta Electronica Sinica,2015,43(4):760-768.(in Chinese)
[9] Fu Z,Sun X,Linge N,et al.Achieving effective cloud search services:multi-keyword ranked search over encrypted cloud data supporting synonym query[J].IEEE Transactions on Consumer Electronics,2014,60(1):164-172.
[10] Wang C,Cao N,Li J,et al.Secure ranked keyword search over encrypted cloud data[A].Distributed Computing Systems(ICDCS),2010 IEEE 30th International Conference on[C].Genova,Italy:IEEE,2010.253-262.
[11] 杨旸,杨书略,柯闽.加密云数据下基于Simhash的模糊排序搜索方案[J].计算机学报,2017,40(2):431-444. YANG Yang,YANG Shulue,KE Min.Ranked fuzzy keyword search based on simhash over encrypted cloud data[J].Chinese Journal of Computers,2017,40(2):431-444.(in Chinese)
[12] Cao N,Wang C,Li M,et al.Privacy-preserving multi-keyword ranked search over encrypted cloud data[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(1):222-233.
[13] Song D X,Wagner D,Perrig A.Practical techniques for searches on encrypted data[A].Security and Privacy,2000,S&P 2000,Proceedings,2000 IEEE Symposium on[C].Berkeley,CA,USA:IEEE,2000.44-55.
[14] Li J,Wang Q,Wang C,et al.Fuzzy keyword search over encrypted data in cloud computing[A].INFOCOM,2010 Proceedings IEEE[C].San Diego,CA,USA:IEEE,2010.1-5.
[15] Curtmola R,Garay J,Kamara S,et al.Searchable symmetric encryption:improved definitions and efficient constructions[J].Journal of Computer Security,2011,19(5):895-934.
[16] Fu Z,Ren K,Shu J,et al.Enabling personalized search over encrypted outsourced data with efficiency improvement[J].IEEE Transactions on Parallel and Distributed Systems,2016,27(9):2546-2559.
[17] Zhang W,Lin Y,Xiao S,et al.Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing[J].IEEE Transactions on Computers,2016,65(5):1566-1577.
[18] Wang J,Chen X,Ma H,et al.A verifiable fuzzy keyword search scheme over encrypted data[J].J Internet Serv Inf Secur,2012,2(1/2):49-58.
[19] Xia Z,Wang X,Sun X,et al.A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J].IEEE Transactions on Parallel and Distributed Systems,2016,27(2):340-352.
[20] Internet Society.Request for Comments[EB/OL].http://www.ietf.org/rfc.html,1969-04-07/2017-12-17.

基金

国家自然科学基金 (No.61002016,No.61711530653); 国家自然科学基金委员会— — 中国民航联合研究基金 (No.U1533133); 教育部人文社科项目 (No.15YJCZH095); 中国国家留学基金 (No.201708330439)
PDF(1098 KB)

Accesses

Citation

Detail

段落导航
相关文章

/