[1] 张玉清, 王晓菲, 刘雪峰, 等.云计算环境安全综述[J]. 软件学报, 2016, 27(6):1328-1348. (ZHANG Y Q, WANG X F, LIU X F, et al. Survey on cloud computing security[J]. Journal of Software, 2016, 27(6):1328-1348.) [2] 魏凯敏, 翁健, 任奎. 大数据安全保护技术综述[J]. 网络与信息安全学报, 2016, 2(4):1-11. (WEI K M, WENG J, REN K. Data security and protection techniques in big data:a survey[J]. Chinese Journal of Network and Information Security, 2016, 2(4):1-11.) [3] 董晓蕾, 周俊, 曹珍富, 等.可搜索加密研究进展[J]. 计算机研究与发展, 2017, 54(10):2107-2120. (DONG X L, ZHOU J, CAO Z F, et al. Research advances on secure searchable encryption[J]. Journal of Computer Research and Development, 2017, 54(10):2107-2120.) [4] SONG X D, WAGNER D, PERRIG A. Practical techniques for searching on encrypted data[C]//Proceedings of the 2000 IEEE Symposium on Security and Privacy. Piscataway, NJ:IEEE, 2000:44-55. [5] GOH E. Secure indexes[EB/OL].[2018-05-10]. http://crypto.stanford.edu/-eujin/papers/secureindex. [6] CHANG Y C, MITZENMACHER M. Privacy preserving keyword searches on remote encrypted data[C]//ACNS 2005:Proceedings of the 2005 Applied Cryptography and Network Security, LNCS 3531. Berlin:Springer, 2005:442-455. [7] CURTMOLA R, GARAY J, KAMARA S, et al. Searchable symmetric encryption:improved definitions and efficient constructions[C]//CCS 2006:Proceedings of the 13th ACM Conference on Computer and Communications Security. New York:ACM, 2006:79-88. [8] WANG C, CAO N, REN K, et al. Enabling secure and efficient ranked keyword search over outsourced cloud data[J]. IEEE Transactions on Parallel & Distributed Systems, 2011, 23(23):1467-1479. [9] CAO N, WANG C, LI M, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[C]//Proceedings of the 30th IEEE International Conference on Computer Communications. Piscataway, NJ:IEEE, 2011:829-837. [10] SUN W, WANG B, CAO N, et al. Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking[J]. IEEE Transactions on Parallel & Distributed Systems, 2014, 25(11):3025-3035. [11] SUN X, ZHOU L, FU Z, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data supporting dynamic update[J]. International Journal of Security & Its Applications, 2014, 8(6):1-16. [12] 那海洋, 杨庚, 束晓伟. 基于B+树的多关键字密文排序检索方法[J]. 计算机科学, 2017, 44(1):149-154. (NA H Y, YANG G, SHU X W. Multi-keyword ranked search method based on B+tree[J]. Computer Science, 2017, 44(1):149-154.) [13] YANG Y, LI H, LIU W, et al. Secure dynamic searchable symmetric encryption with constant document update cost[C]//Proceedings of the 2014 IEEE Global Communications Conference. Piscataway, NJ:IEEE, 2014:775-780. [14] XIA Z, CHEN L, SUN X, et al. A multi-keyword ranked search over encrypted cloud data supporting semantic extension[J]. International Journal of Multimedia & Ubiquitous Engineering, 2016, 11(8):107-120. [15] WITTEN I H, MOFFAT A, BELL T C. Managing Gigabytes:Compressing and Indexing Documents and Images[M]. San Francisco:Morgan Kaufmann Publishers, 1999:180-188. [16] WONG W K, CHEUNG W L, KAO B, et al. Secure kNN computation on encrypted databases[C]//SIGMOD 2009:Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data. New York:ACM, 2009:139-152. [17] CORMEN T H, LEISERSON C E, RIVEST R L, et al. Introduction to Algorithms[M]. 3rd ed. Cambridge, MA:MIT Press, 2009:256-261. [18] IAB, IETF. Request for comments available[DB/OL].[2018-05-10]. https://www.rfc-editor.org/retrieve/bulk/. |