[1] 林闯, 苏文博, 孟坤, 等. 云计算安全:架构、机制与模型评价[J]. 计算机学报,2013,36(9):1765-1784.(LIN C,SU W B,MENG K,et al. Cloud Computing security:architecture,mechanism and modeling[J]. Chinese Journal of Computers,2013,36(9):1765-1784.) [2] 林子雨, 赖永炫, 林琛, 等. 云数据库研究[J]. 软件学报,2012, 23(5):1148-1166.(LIN Z Y,LAI Y X,LIN C,et al. Research on cloud databases[J]. Journal of Software,2012,23(5):1148-1166.) [3] BEHERA A,RATHA B K,SETHI S. Green cloud computing:a survey[J]. International Journal of Science Engineering and Advance Technology,2016,4(12):763-767. [4] 季一木, 朱瞳晖, 柴博周, 等. 云环境下用户隐私混合加密方案及其性能分析[J]. 重庆邮电大学学报(自然科学版),2015,27(5):631-638.(JI Y M,ZHU T H,CHAI B Z,et al. Hybrid encryption scheme and performance analysis for user's privacy in cloud[J]. Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition),2015,27(5):631-638.) [5] AGRAWAL R,KIERNAN J,SRIKANT R,et al. Order preserving encryption for numeric data[C]//Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data. New York:ACM,2004:563-574. [6] 郁鹏, 潘森杉, 张建明. 云环境下基于非线性映射的保序加密方案[J]. 江苏大学学报(自然科学版),2018,39(2):185-193. (YU P,PAN S S,ZHANG J M. Order preserving encryption scheme based on nonlinear mapping in cloud environment[J]. Journal of Jiangsu University(Natural Science Edition),2018,39(2):185-193.) [7] 黄保华, 王添晶, 贾丰玮. 数据库中数值型数据的加密存储与查询方法[J]. 计算机工程,2016,42(7):123-128.(HUANG B H, WANG T J,JIA F W. Encrypting storage and query method for numeric data in database[J]. Computer Engineering,2016,42(7):123-128.) [8] 周艺华, 吉文, 杨宇光. 基于f-mOPE的数据库密文检索方案[J]. 电子与信息学报,2019,41(8):1793-1799.(ZHOU Y H,JI W, YANG Y G. Database ciphertext retrieval scheme based on f-mOPE[J]. Journal of Electronics and Information Technology,2019,41(8):1793-1799.) [9] BOLDYREVA A,CHENETTE N,O'NEILL A. Order-preserving encryption revisited:improved security analysis and alternative solutions[C]//Proceedings of the 31st Annual Cryptology Conference,LNCS 6841. Berlin:Springer,2011:578-595. [10] KRENDELEV S F,YAKOVLEV M,USOLTSEVA M. Orderpreserving encryption schemes based on arithmetic coding and matrices[C]//Proceedings the 2014 Federated Conference on Computer Science and Information Systems. Piscataway:IEEE, 2014:891-899. [11] MARTÍNEZ S,MIRET J M,TOMÀS R,et al. Securing databases by using diagonal-based order preserving symmetric en-cryption[J]. Applied Mathematics and Information Sciences,2014,8(5):2085-2094. [12] 沈楠, 贾春福, 梁爽, 等. 基于保序加密的网格化位置隐私保护方案[J]. 通信学报,2017,38(7):78-88.(SHEN N,JIA C F, LIANG S,et al. Approach of location privacy protection based on order preserving encryption of the grid[J]. Journal on Communications,2017,38(7):78-88.) [13] 李陶深, 周雄, 黄汝维. 云环境下支持多用户的保序加密方案[J]. 广西大学学报(自然科学版),2018,43(3):1044-1052. (LI T S,ZHOU X,HUANG R W. Proxy encryption fuzzy retrieval algorithm based on local sensitive hashing in cloud computing[J]. Journal of Guangxi University(Natural Science Edition),2018, 43(3):1044-1052.) [14] BOLDYREVA A,CHENETTE N,LEE Y,et al. Order preserving symmetric encryption[C]//Proceedings of the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques,LNCS 5479. Berlin:Springer,2009:224-241. [15] LIU D,WANG S. Nonlinear order preserving index for encrypted database query in service cloud environments[J]. Concurrency and Computation:Practice and Experience,2013,25(13):1967-1984. |