[1]李乔,郑啸.云计算研究现状综述[J].计算机科学,2011,38(4):32-37.
[2]管俊涵.云存储中可搜索加密研究[D].重庆:重庆大学,2016.
[3]CIRIANI V,VIMERCATI S D C D,FORESTI S,et al.Fragmentation and encryption to enforce privacy in data storage[C]//Proceedings of the 12th European Con-ference on Research in Computer Security.Berlin,Germany:Springer,2007:171-186.
[4]林闯,苏文博,孟坤,等.云计算安全:架构、机制与模型评价[J].计算机学报,2013,36(9):1765-1784.
[5]AGRAWAL R,KIERNAN J,SRIKANT R,et al.Order preserving encryption for numeric data[C]//Pro-ceedings of the 2004 ACM Sigmod International Con-ference on Management of Data.New York,USA:ACM Press,2004:563-574.
[6]BOLDYREVA A,CHENETTE N,LEE Y,et al.Order-preserving symmetric encryption[C]//Proceedings of the 28th Annual International Conference on Advances in Cryptology:the Theory and Applications of Crypto-graphic Techniques.Berlin,Germany:Springer,2009:224-241.
[7]WOZNIAK S,ROSSBERG M,GRAU S,et al.Beyond the ideal object:towards disclosure-resilient order-preserving encryption schemes[C]//Proceedings of 2013 ACM Workshop on Cloud Computing Security.New York,USA:ACM Press,2013:89-100.
[8]KRENDELEV S F,YAKOVLEV M,USOLTSEVA M.Order-preserving encryption schemes based on arithmetic coding and matrices[C]//Proceedings of 2014 Federated Conference on Computer Science and Info-rmation Systems.Washington D.C.,USA:IEEE Press,2014:891-899.
[9]LIU D,WANG S.Nonlinear order preserving index for encrypted database query in service cloud environ-ments[J].Concurrency & Computation Practice & Experience,2013,25(13):1967-1984.
[10]MARTNEZ S,MIRET J M,TOMS R,et al.Securing databases by using diagonal-based order preserving symmetric encryption[J].Applied Mathematics and Information Sciences,2014,8(5):2085-2094.
[11]DYER J,DYER M,XU J.Order-preserving encryption using approximate integer common divisors [C]//Proceedings of International Workshop on Data Privacy Management.[S.l.]:Springer,2017:257-274.
[12]POPA R A,LI F H,ZELDOVICH N.An ideal-security protocol for order-preserving encoding[C]//Proceed-ings of IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2013:463-477.
[13]ROCHE D S,APON D,CHOI S G,et al.POPE:partial order preserving encoding[C]//Proceedings of 2016 ACM SIGSAC Conference on Computer and Com-munications Security.New York,USA:ACM Press,2016:1131-1142.
[14]KERSCHBAUM F,SCHROEPFER A.Optimal average-complexity ideal-security order-preserving encryption[C]//Proceedings of 2014 ACM SIGSAC Conference on Computer and Communications Security.New York,USA:ACM Press,2014:275-286.
[15]KERSCHBAUM F.Frequency-hiding order-preserving encryption[C]//Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.New York,USA:ACM Press,2015:656-667.
[16]LIU Z,CHEN X,YANG J,et al.New order preserving encryption model for outsourced databases in cloud environments[J].Journal of Network and Computer Applications,2016,59(C):198-207.
[17]PENG Y,LI H,CUI J,et al.Hope:improved order preserving encryption with the power to homomorphic operations of ciphertexts[J].Science China,2017,60(6):062101.
[18]MOLLA E,TZOURAMANIS T,GRITZALIS S.SOPE:a spatial order preserving encryption model for multi-dimensional data[EB/OL].[2017-10-20].https://arxiv.org/abs/1710.09420.
[19]陈永府,宋鹏,王启富,等.云环境下的数据防泄密存储技术[J].计算机应用与软件,2016,33(10):288-293.
[20]杜远志,杜学绘,杨智.云计算环境下基于属性加密的信息流控制及实现[J].计算机工程,2018,44(3):27-36.
[21]宋志毅,马兆丰,黄勤龙.基于保序加密的MongoDB数据加密技术研究与实现[C]//第十届中国通信学会学术年会论文集.北京:国防工业出版社,2014.
[22]杨策.广义保序加密研究[D].合肥:中国科学技术大学,2017.
[23]LIU Z,CHEN X,YANG J,et al.New order preserving encryption model for outsourced databases in cloud environments[J].Journal of Network and Computer Applications,2013,59(C):198-207.
[24]曾橙焜,杨庚,汪海伟.密文数据库保序编码方法的研究与改进[J].计算机应用研究,2017,34(8):2453-2458. |