[1]俞能海,郝卓,徐甲甲,等.云安全研究进展综述[J].电子学报,2013,41(2):371-381.br/ [2]GHORBEL A,GHORBEL M,JMAIEL M.Privacy in cloud computing environments:a survey and research challenges[J].Journal of Supercomputing,2017,73(6):2763-2800.br/ [3]LNGER T,PHLS H C,GHERNAOUTI S.Selected cloud security patterns to improve end user security and privacy in public clouds[M]//SCHIFFNER S,SERNA J,LKONOMOU D,et al.Privacy Technologies and Policy.Berlin,Germany:Springer,2016.br/ [4]李顺东,窦家维,王道顺.同态加密算法及其在云安全中的应用[J].计算机研究与发展,2015,52(6):1378-1388.br/ [5]HRESTAK D,PICEK S.Homomorphic encryption in the cloud[C]//Proceedings of the 37th International Convention on Information and Communication Technology,Electronics and Microelectronics.Opatija,Croatia:[s.n.],2014:1400-1404.br/ [6]SHAHZAD F,IQBAL W,BOKHARI F S.On the use of CryptDB for securing electronic health data in the cloud:a performance study[C]//Proceedings of the 17th International Conference on E-health Networking,Application and Services.Boston,USA:[s.n.],2015:120-125.br/ [7]TEBAA M,ZKIK K,HAJJI S E.Hybrid homomorphic encryption method for protecting the privacy of banking data in the cloud[J].International Journal of Security and Its Applications,2015,9(6):61-70.br/ [8]陈志伟,杜敏,杨亚涛,等.基于RSA和Paillier的同态云计算方案[J].计算机工程,2013,39(7):35-39.br/ [9]BONEH D,GENTRY C,HALEVI S,et al.Private database queries using somewhat homomorphic encryption[C]//Proceedings of International Conference on Applied Cryptography and Network Security.Banff,Canada:[s.n.],2013:102-118.br/ [10]ZHAO F,LI C,LIU C F.A cloud computing security solution based on fully homomorphic encryption[C]//Proceedings of the 16th International Conference on Advanced Communication Technology.Pyeongchang,South Korea:[s.n.],2014:485-488.br/ [11]徐鹏,刘超,斯雪明.基于整数多项式环的全同态加密算法[J].计算机工程,2012,38(24):1-4.br/ [12]汤全有,马传贵.针对全同态加密体制的反馈攻击[J].计算机工程,2014,40(6):79-84.br/ [13]KANGAVALLI R,VAGDEVI S.A mixed homomorphic encryp-tion scheme for secure data storage in cloud[C]//Proceedings of Advance Computing Conference.Washington D.C.,USA:IEEE Press,2015:1062-1066.br/ [14]POPA R A,REDFIELD C M S,ZELDOVICH N,et al.CryptDB:processing queries on an encrypted database[J].Communications of the ACM,2012,55(9):103-111.br/ [15]CARDELLINI V,IANNUCCI S.Designing a flexible and modular architecture for a private cloud[C]//Proceedings of International Workshop on Virtualization Technologies in Distributed Computing.[S.l.]:USENIX,2012:37-44.br/ [16]SONG D X,WAGNER D,PERRIG A.Practical techniques for searches on encrypted data[C]//Proceedings of IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2002:44-55.br/ [17]DIJK M V,GENTRY C,HALEVI S,et al.Fully homo-morphic encryption over the integers[M]//GILBERT H.Advances in Cryptology-EUROCRYPT 2010.Berlin,Germany:Springer,2010:24-43.br/ |