共查询到20条相似文献,搜索用时 15 毫秒
1.
Cloud computing has become a potential resource for businesses and individuals to outsource their data to remote but highly accessible servers. However, the potential of cloud services has not been fully realized due to users concerns about data privacy and security. User‐side encryption techniques can be employed to mitigate the security concerns, but once the data is encrypted, no processing (eg, searching) can be performed on the outsourced data. Searchable Encryption (SE) techniques have been widely studied to enable searching on the data while they are encrypted. These techniques enable various types of search on the encrypted data and offer different levels of security. While these techniques enable different search types and vary in details, they share similarities in their components and architectures. In this paper, we provide a comprehensive survey on different secure search techniques, a high‐level architecture for these systems, and an analysis of their performance and security level. 相似文献
2.
现有关键词搜索算法只能处理单个关键词,且检索复杂度高。针对该问题提出同时搜索多个连接关键词的加密数据安全搜索算法,该算法把生成"能力"的过程分为线下和线上2个部分,它对多个连接关键词的安全搜索时间比原有算法降低了80%左右,实例分析结果验证了其正确性和有效性。 相似文献
3.
The Web as a global information space is developing from a Web of documents to a Web of data. This development opens new ways for addressing complex information needs. Search is no longer limited to matching keywords against documents, but instead complex information needs can be expressed in a structured way, with precise answers as results. In this paper, we present Hermes, an infrastructure for data Web search that addresses a number of challenges involved in realizing search on the data Web. To provide an end-user oriented interface, we support expressive user information needs by translating keywords into structured queries. We integrate heterogeneous Web data sources with automatically computed mappings. Schema-level mappings are exploited in constructing structured queries against the integrated schema. These structured queries are decomposed into queries against the local Web data sources, which are then processed in a distributed way. Finally, heterogeneous result sets are combined using an algorithm called map join, making use of data-level mappings. In evaluation experiments with real life data sets from the data Web, we show the practicability and scalability of the Hermes infrastructure. 相似文献
4.
密文检索是云提供数据加密存储服务的重要辅助功能。目前云环境中密文检索的排序搜索算法只根据关键词的单一局部属性进行文档相关性分数计算,因此存在查准率不高的问题。针对这个问题设计了一种基于多属性排序的密文检索方案,其思想是首先通过文档关键词的局部属性和全局属性构建多属性特征向量安全索引,其次根据用户选择的排序方式确定各局部属性和全局属性的权值,然后调用多属性评分公式进行文档相关性分数计算,最后根据分数排序返回用户最感兴趣的检索结果。实验表明,该方法能够有效提高检索速度和检索结果的准确性。 相似文献
5.
Cloud computing provides elastic data storage and processing services. Although existing research has proposed preferred search on the plaintext files and encrypted search, no method has been proposed that integrates the two techniques to efficiently conduct preferred and privacy-preserving search over large datasets in the cloud.In this paper, we propose a scheme for preferred search over encrypted data (PSED) that can take users’ search preferences into the search over encrypted data. In the search process, we ensure the confidentiality of not only keywords but also quantified preferences associated with them. PSED constructs its encrypted search index using Lagrange coefficients and employs secure inner-product calculation for both search and relevance measurement. The dynamic and scalable property of cloud computing is also considered in PSED. A series of experiments have been conducted to demonstrate the efficiency of the proposed scheme when deploying it in real-world scenarios. 相似文献
6.
加密技术是保护外包数据库中数据安全的一种有效方法;但如何对加密数据进行高效查询是一个热点;引起了研究界的重视。针对这个问题;提出了一种基于DBMS内核的加密模式;通过安全字典和SQL语句的扩展;实现数据的加密存储和高效查询。实验证明了该方法的有效性和可行性。 相似文献
7.
Georgios John FakasAuthor Vitae 《Data & Knowledge Engineering》2011,70(2):208-229
This paper introduces a novel keyword search paradigm in relational databases, where the result of a search is an Object Summary (OS). An OS summarizes all data held about a particular Data Subject (DS) in a database. More precisely, it is a tree with a tuple containing the keyword(s) as a root and neighboring tuples as children. In contrast to traditional relational keyword search, an OS comprises a more complete and therefore semantically meaningful set of information about the enquired DS.The proposed paradigm introduces the concept of Affinity in order to automatically generate OSs. More precisely, it investigates and quantifies the Affinity of relations (i.e. Affinity) and their attributes (i.e. Attribute Affinity) in order to decide which tuples and attributes to include in the OS. Experimental evaluation on the TPC-H and Northwind databases verifies the searching quality of the proposed paradigm on both large and small databases; precision, recall, f-score, CPU and space measures are presented. 相似文献
8.
一种字符型数据加密算法研究 总被引:2,自引:0,他引:2
针对字符型数据的加密提出一种利用对偶编码函数实现对数据库中的字符型数据进行加密的方法,通过对数据库中字符型的关键信息进行对偶编码,在改进的关系中存储加密后数据和增加存储特征值字段,在查询中利用两阶段查询算法实现对加密数据的查询。实验结果表明,这种算法对字符型数据的加密存储具有良好的安全性,对加密数据的查询具有高效的性能,并且算法实现简单。 相似文献
9.
加密技术是保护数据库中数据安全的一种有效方法,但如何对加密数据进行高效查询是一个难点,引起了研究界的重视。针对这个问题,除了采用常规加密方法对字符数据进行加密外,还对字符数据进行扁平化和扰乱化处理,并把处理后的特征值作为附加字段与加密数据一起存储。该方法不仅安全性很好,而且通过实验证明其性能较传统方法有很大提高。 相似文献
10.
Various approaches for keyword search in different settings (e.g., relational databases and XML) actually deal with the problem of enumerating K-fragments. For a given set of keywords K, a K-fragment is a subtree T of the given data graph, such that T contains all the keywords of K and no proper subtree of T has this property. There are three types of K-fragments: directed, undirected and strong. This paper describes efficient algorithms for enumerating K-fragments. Specifically, for all three types of K-fragments, algorithms are given for enumerating all K-fragments with polynomial delay and polynomial space. It is shown how these algorithms can be enhanced to enumerate K-fragments in a heuristic order. For directed K-fragments and acyclic data graphs, an algorithm is given for enumerating with polynomial delay in the order of increasing weight (i.e., the ranked order), assuming that K is of a fixed size. 相似文献
11.
随着云计算技术的日益普及,公共云存储服务已经得到普遍的应用,DropBox、Google Drive、金山快盘等公共云存储应用的用户飞速增长.然而,用户对他们保存在云端数据的隐私性、完整性以及可控分享的关切也日益增长.针对这一问题,近年来学术界对公共云存储服务中数据的细粒度访问控制、密文搜索、数据完整性审计以及云存储数据的安全销毁等问题展开了大量研究.对云存储数据安全和隐私保护技术方向的研究进展进行综述,并指出待解决的关键问题. 相似文献
12.
可逆信息隐藏是信息隐藏技术的重要分支,它不仅能从含密载体中提取秘密信息,还能无损地还原原始载体。以图像空域为载体的可逆信息隐藏研究根据图像是否被加密可分为明文域和密文域。早期,该领域研究基本在明文域开展,在保证可逆嵌入的前提下,着重提高嵌入容量与减少嵌入失真。随着人们日益重视隐私保护和数据安全,密文域的信号处理引起广泛关注。密文域可逆信息隐藏结合加密技术和可逆信息隐藏技术,从而达到载体内容保护和秘密信息传递的双重目的。本文梳理现有的相关文献,分别对明文域和密文域的研究进行归纳与分析,按照时间先后顺序帮助理清各类方法的发展脉络及其关联。首先,概括明文域的经典方法,包括差值扩展、直方图平移、预测误差扩展和多直方图修改4种方法及其改进版本。其次,阐述密文域中基于加密后腾出空间、加密前预留空间和通过加密腾出空间3类方法的研究进展。再次,总结指出明文域的研究趋向于减少嵌入失真,而密文域的研究趋向于提高嵌入容量,其在鲁棒性及安全性方面的进展则相对缓慢。最后,结合当前研究面临的实际问题,如载体多元化、有损信道传输和安全性等,进一步展望未来的研究趋势。总之,可逆信息隐藏研究的有效性与实用性仍有待提高,面向不同应用需求时,亟需学者提出新的理论支撑与评价体系。 相似文献
13.
Keyword search is the most popular technique for querying large tree-structured datasets, often of unknown structure, in the web. Recent keyword search approaches return lowest common ancestors (LCAs) of the keyword matches ranked with respect to their relevance to the keyword query. A major challenge of a ranking approach is the efficiency of its algorithms as the number of keywords and the size and complexity of the data increase. To face this challenge most of the known approaches restrict their ranking to a subset of the LCAs (e.g., SLCAs, ELCAs), missing relevant results.In this work, we design novel top-k-size stack-based algorithms on tree-structured data. Our algorithms implement ranking semantics for keyword queries which is based on the concept of LCA size. Similar to metric selection in information retrieval, LCA size reflects the proximity of keyword matches in the data tree. This semantics does not rank a predefined subset of LCAs and through a layered presentation of results, it demonstrates improved effectiveness compared to previous relevant approaches. To address performance challenges our algorithms exploit a lattice of the partitions of the keyword set, which empowers a linear time performance. This result is obtained without the support of auxiliary precomputed data structures. An extensive experimental study on various and large datasets confirms the theoretical analysis. The results show that, in contrast to other approaches, our algorithms scale smoothly when the size of the dataset and the number of keywords increase. 相似文献
14.
大数据蕴藏着有价值的信息,但数据安全面临严峻挑战。在分析大数据基本特征的基础上,提出了当前大数据面临的安全挑战,并从监测机制、防范检测、响应水平和处理能力4个方面阐述了大数据安全的应对策略。 相似文献
15.
数据作为一种资产越来越受重视,数据安全问题也日益突出.文章结合等级保护基本要求从安全角度分析了数据的几个属性,包括价值属性、健康性、物理环境依赖性等,并从数据属性角度对如何做好信息安全进行了探索. 相似文献
16.
可逆信息隐藏是信息隐藏技术的新兴研究方向,密文域可逆信息隐藏作为加密域信号处理技术与信息隐藏技术的重要结合点,对于数据处理过程中的信息安全可以起到双重保险的作用,尤其随着云服务的推广,密文域可逆信息隐藏是实现云环境下隐私保护的研究重点之一。针对当前密文域可逆信息隐藏技术的技术要求,介绍了该技术的产生发展背景,指出并分析了当前的技术难点,通过对各种类型代表性算法的研究,对密文域可逆信息隐藏技术进行了系统的分类,分析了不同嵌入方式的技术特点、实现框架与应用上的局限性。最后,结合密文域可逆信息隐藏的技术需求与难点,提出几点该领域未来的热点方向。 相似文献
17.
实现加密数据的高效安全查询是保证可信数据库安全性和实用性的关键.与目前加密数据查询采用的静态密文分段方法不同,论文基于加密数据的分布和用户查询类型、分布规律,提出了一种自适应加密索引AEI(Adaptive Encrypted Index),实现面向服务的加密数据查询.AEI通过分析查询服务对查询性能的影响,根据承载服务特性、密文数据分布、用户查询分布采用自适应的加密索引划分策略,获得更好的加密数据查询性能.基于AEI方法可在可信数据库环境下实现密文数据查询,并通过了相关性能测试.实验数据表明,与其它加密数据查询方法相比,AEI方法具有更好的适应性和更高的加密数据查询效率. 相似文献
18.
数据库服务模式下的数据安全管理研究 总被引:3,自引:1,他引:2
数据库服务模式下,服务提供商的不可信带来了新的数据安全管理问题:数据的保密管理和可信性管理。根据托管方式的不同,将现有研究分为两类:集中式托管方式下的安全研究和分布式托管方式下的安全研究。在集中式托管方式下,系统地阐述了关系数据库、XML数据库和文本数据库下的密文检索和数据验证问题。在分布式托管方式下,重点阐述了数据分解方法和分离的数据验证方法。通过对现有研究进行综述,指出数据库服务模式下数据安全管理面临的挑战和未来的发展方向。 相似文献
19.
对于加密云数据的搜索,传统的关键词模糊搜索方案虽然能搜索到相关文档,但是搜索的结果并不令人满意。在用户输入正确的情况下,无法完成近似搜索,当用户出现拼写错误时,返回的结果中包含大量无关关键词文档,严重浪费了带宽资源。针对目前在加密云数据下关键词模糊搜索的缺陷,提出了一种新型的关键词模糊搜索方案,通过对关键词计算相关度分数并对文档根据相关度分数进行排序,将top-k(即相关度最高的k个文档)个文档返回给搜索用户,减少了不必要的带宽浪费和用户寻找有效文档的时间消耗,提供了更加有效的搜索结果,并且通过引入虚假陷门集,增大了云服务器对文档关键词的分析难度,增加了系统的隐私性保护。 相似文献
20.
针对XML文档集的关键词检索结果排序 总被引:1,自引:0,他引:1
探讨了针对XML文档集中只与内容相关的关键词检索结果的排序问题,针对XML文档特征提出了一种新的排序模型,它不同于面向Web的XML网页的搜索结果的排序。设计了满足这种排序模型的倒排列表索引结构和搜索引擎的体系结构。 相似文献