[1] KHAN N A,PANCHAL V K,TANWEER S.Comprehensive analysis of data storage security in cloud[J].Global Sci-Tech,2019,11(2):82-92. [2] LIU S,GUO L,WEBB H,et al.Internet of things monitoring system of modern eco-agriculture based on cloud computing[J].IEEE Access,2019,7:37050-37058. [3] ZHANG Jiale,ZHAO Yanchao,CHEN Bing,et al.Survey on data security and privacy-preserving for the research of edge computing[J].Journal on Communications,2018,39(3):1-21.(in Chinese)张佳乐,赵彦超,陈兵,等.边缘计算数据安全与隐私保护研究综述[J].通信学报,2018,39(3):1-21. [4] FAN Yongkai,LIN Xiaodong,TAN Gang,et al.One secure data integrity verification scheme for cloud storage[J].Future Generation Computer Systems,2019,96:376-385. [5] DONG Xiaolei,ZHOU Jun,CAO Zhenfu.Research advances on secure searchable encryption[J].Journal of Computer Research and Development,2017,54(10):2107-2120.(in Chinese)董晓蕾,周俊,曹珍富.可搜索加密研究进展[J].计算机研究与发展,2017,54(10):2107-2120. [6] LI Ying,MA Chunguang.Overview of searchable encryption research[J].Chinese Journal of Network and Information Security,2018,4(7):13-21.(in Chinese)李颖,马春光.可搜索加密研究进展综述[J].网络与信息安全学报,2018,4(7):13-21. [7] ZUO Xinxin.Research on multi-user searchable encryption scheme in cloud environment[D].Chengdu:University of Electronic Science and Technology,2018.(in Chinese)左欣欣.云环境下多用户可搜索加密方案研究[D].成都:电子科技大学,2018. [8] SONG D X,WAGNER D,PERRIG A.Practical techniques for searches on encrypted data[C]//Proceedings of 2000 IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2000:44-55. [9] CUI Jie,ZHOU Han,XU Yan,et al.OOABKS:online/offline attribute-based encryption for keyword search in mobile cloud[J].Information Sciences,2019,489:63-77. [10] LI Jingwei,JIA Chunfu,LIU Zheli,et al.Survey on the searchable encryption[J].Journal of Software,2015,26(1):109-128.(in Chinese)李经纬,贾春福,刘哲理,等.可搜索加密技术研究综述[J].软件学报,2015,26(1):109-128. [11] BONEH D,DI CRESCENZO G,OSTROVSKY R,et al.Public key encryption with keyword search[C]//Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2004:506-522. [12] BEAK J,SAFAVI-NAINI R,SUSILO W.Public key encryption with keyword search revisited[C]//Proceedings of 2008 International Conference on Computational Science and Its Applications.Berlin,Germany:Springer,2008:1249-1259. [13] GUO Yuyan,JIANG Mingming,SONG Wangan.Provably secure certificate-based encryption with leakage resilience[J].Journal of Huaibei Normal University(Natural Science),2019,40(1):19-25.(in Chinese)郭宇燕,江明明,宋万干.可证明安全的弹性泄漏基于证书加密方案[J].淮北师范大学学报(自然科学版),2019,40(1):19-25. [14] VERMA S.A new lightweight approach for multiuser searchable encryption in the cloud[C]//Proceedings of International Conference on Communication,Networks and Computing.New York,USA:ACM Press,2019:49-63. [15] NI Lülin,XU Chungen.Dynamic searchable encryption scheme based on identity[J].Computer Engineering,2019,45(1):136-140.(in Chinese)倪绿林,许春根.基于身份的动态可搜索加密方案[J].计算机工程,2019,45(1):136-140. [16] ZHU Minhui,CHEN Yanli,HU Yuanyuan.Identity-based searchable encryption scheme supporting proxy re-encryption[J].Computer Engineering,2019,45(1):129-135.(in Chinese)朱敏惠,陈燕俐,胡媛媛.支持代理重加密的基于身份可搜索加密方案[J].计算机工程,2019,45(1):129-135. [17] PENG Jiangtao,CUI Changgen,PENG Changgen,et al.Certificateless public key encryption with keyword search[J].China Communications,2014,11(11):100-113. [18] WU Qiying,MA Jianfeng,LI Hui,et al.Certificateless conjunctive keyword search over encrypted data[J].Journal of Xidian University(Natural Science),2017,44(3):55-60.(in Chinese)伍祈应,马建峰,李辉,等.无证书连接关键字密文检索[J].西安电子科技大学学报(自然科学版),2017,44(3):55-60. [19] CAO Qiang,LI Yanping,LIU Qingqing,et al.Certificateless conjunctive keyword search on encrypted data in cloud storage[J].Journal of Shaanxi Normal University(Natural Science Edition),2019,47(5):115-124.(in Chinese)曹强,李艳平,刘青青,等.云存储中无证书连接关键词密文检索[J].陕西师范大学学报(自然科学版),2019,47(5):115-124. [20] DENG Xiaoyan,CHENG Hao,SUN Bo,et al.ID-based deletion searchable encryption scheme[J].IOP Conference Series:Earth and Environmental Science,2019,234(1):12-52. |