参考文献
[1]惠榛,冯登国,张敏,等.一种可抵抗统计攻击的安全索引[J].计算机研究与发展,2017,54(2):295-304.
[2]田雪,朱晓杰,申培松,等.基于相似查询树的快速密文检索算法[J].软件学报,2016,27(6):1566-1576.
[3]刘鹏,罗圣美,赵淦森.中国云存储发展报告[M].北京:电子工业出版社,2013.
[4]SONG D X,WAGNER D,PERRIG A.Practical Techniques for Searches on Encrypted Data[C]//Proceedings of 2000 IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2000:44-55.
[5]SHI E,BETHENCOURT J,CHAN T,et al.Multi-dimensional Range Query over Encrypted Data[C]//Proceedings of IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2007:350-364.
[6]DAMIANI E,VIMERCATI S D C,JAJODIA S,et al.Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs[C]//Proceedings of the 10th ACM Conference on Computer and Communications Security.New York,USA:ACM Perss,2003:93-102.
[7]AGRAWAL R,KIERNAN J,SRIKANT R,et al.Order Preserving Encryption for Numeric Data[C]//Proceedings of 2004 ACM SIGMOD International Conference on Management of Data.New York,USA:ACM Perss,2004:563-574.
[8]BOLDYREVA A,CHENETTE N,LEE Y,et al.Order-preserving Symmetric Encryption[C]//Proceedings of the 28th Annual International Conference on Theory and Applications of Cryptographic Techniques.Cologne,Germany:[s.n.],2009:224-241.
[9]HACIGUMUS H,IYER B,LI Chen,et al.Executing SQL over Encrypted Data in The Database-service-provider Model[C]//Proceedings of 2002 ACM SIGMOD International Conference on Management of Data.New York,USA:ACM Perss,2002:216-227.
[10]HORE B,MEHROTRA S,TSUDIK G.A Privacy-Preserving Index for Range Queries[C]//Proceedings of the 30th International Conference on Very Large Data Bases.Toronto,Canada:[s.n.],2004:720-731.
[11]WANG Jieping,DU Xiaoyong.LOB:Bucket Based Index for Range Queries[C]//Proceedings of the 9th International Conference on Web-age Information Management.Zhangjiajie,China:[s.n.],2008:86-92.
[12]ZHANG Yong,LI Weixin,NIU Xiamu.A Method of Bucket Index over Encrypted Character Data in Database[C]//Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing.Kaohsiung,China:[s.n.],2007:186-189.
[13]蔡克,张敏,冯登国.基于单断言的安全的密文区间检索[J].计算机学报,2011,34(11):2093-2103.
[14]王少辉,韩志杰,陈丹伟,等.云环境下安全密文区间检索方案的新设计[J].通信学报,2015,36(2):311-319.
[15]DUMITRESCU C L.Taking Advantage of Usage Service Level Agreements for Better Grid Resource Scheduling[D].Chicago,USA:The University of Chicago,2007.
编辑金胡考 |