[1] 孟小峰,慈祥.大数据管理:概念,技术与挑战[J].计算机研究与发展,2013,50(1):146-169.(MENG X F, CI X. Big data management:concepts, techniques and challenges[J]. Journal of Computer Research and Development, 2013, 50(1):146-169.) [2] GABEL M, MECHLER J. Secure database outsourcing to the cloud:side-channels, counter-measures and trusted execution[C]//Proceedings of the 2017 IEEE 30th International Symposium on Computer-Based Medical Systems. Piscataway, NJ:IEEE, 2017:799-804. [3] SCHAAD A, BKAKRIA A, KESCHBAUM F, et al. Optimized and controlled provisioning of encrypted outsourced data[C]//Proceedings of the 19th ACM Symposium on Access Control Models and Technologies. New York:ACM, 2014:141-152. [4] 吴泉源.网络计算中间件[J].软件学报,2013,24(1):67-76.(WU Q Y. Network computing middleware[J]. Journal of Software, 2013, 24(1):67-76.) [5] ZHANG J L, CHEN B, ZHAO Y C,et al. Data security and privacy-preserving in edge computing paradigm:survey and open issues[J]. IEEE Access, 2018, 6:18209-18237. [6] 吕欣,韩晓露.大数据安全和隐私保护技术架构研究[J].信息安全研究,2016,2(3):244-250.(LYU X, HAN X L. Research on the technology architecture of big data security and privacy system[J]. Journal of Information Security Research, 2016, 2(3), 244-250.) [7] 冯朝胜,秦志光,袁丁.数据库加密系统密钥管理模块的设计[J].电子科技大学学报,2007,36(5):830-833.(FENG C S, QIN Z G, YUAN D. Design of key-managing module of database encryption system[J]. Journal of University of Electronic Science and Technology of China:2007, 36(5):830-833.) [8] CHAUHAN K K, KUMAR S, KUMAR S. The design of a secure key management system in vehicular ad hoc networks[C]//Proceedings of the 2017 Conference on Information and Communication Technology. Piscataway, NJ:IEEE, 2017:1-6. [9] YANG S K, JI S L, BEYAH R. DPPG:a dynamic password policy generation system[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(3):545-558. [10] LI M, YU S C, CAO N, et al. Authorized private keyword search over encrypted data in cloud computing[C]//Proceedings of the 31st International Conference on Distributed Computing Systems. Piscataway, NJ:IEEE, 2011:383-392. [11] 陆海宁.可隐藏搜索模式的对称可搜索加密方案[J].信息网络安全,2017(1):38-42.(LU H N. Searchable smmetric encryption with hidden search pattern[J]. Netinfo Security, 2017(1):38-42.) [12] DEMERTZIS I, PAPAMANTHOU C. Fast searchable encryption with tunable locality[C]//Proceedings of the 2017 ACM International Conference on Management of Data. New York:ACM, 2017:1053-1067. [13] PENG T Y, LIN Y P, YAO X,et al. An efficient ranked multi-keyword search for multiple data owners over encrypted cloud data[J]. IEEE Access, 2018, 6:21924-21933. [14] POPA R A, REDFIELD C M S, ZELDOVICH N,et al. CryptDB:protecting confidentiality with encrypted query processing[C]//Proceedings of the 23rd ACM Symposium on Operating Systems Principles. New York:ACM, 2011:85-100. [15] POPA R A, REDFIELD C M S, ZELDOVICH N, et al. CryptDB:processing queries on an encrypted database[J]. Communications of the ACM, 2012, 55(9):103-111. [16] TU S, KAASHOEK M F, MADDEN S, et al. Processing analytical queries over encrypted data[J]. Proceedings of the VLDB Endowment, 2013, 6(5):289-300. [17] 孙国梓,董宇,李云.基于CP-ABE算法的云存储数据访问控制[J].通信学报,2011,32(7):146-152.(SUN G Z, DONG Y, LI Y. CP-ABE based data access control for cloud storage[J]. Journal on Communications, 2011, 32(7):146-152.) [18] YANG K, JIA X H. DAC-MACS:effective data access control for multi-authority cloud storage systems[M]//Security for Cloud Storage Systems. Berlin:Springer, 2014:59-83. [19] 刘畅,何泾沙.一个基于用户网络行为的访问控制模型[J].信息网络安全,2016(10):34-39.(LIU C, HE J S. A network behavior-based access control model[J]. Netinfo Security, 2016(10):34-39.) [20] ZHANG W, LIN Y P, XIAO S, et al. Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing[J]. IEEE Transactions on Computers, 2016, 65(5):1566-1577. [21] LIU Z L, CHEN X F, YANG J, et al. New order preserving encryption model for outsourced databases in cloud environments[J]. Journal of Network and Computer Applications, 2016, 59:198-207. [22] LIU D X. Homomorphic encryption for database querying[EB/OL].[2018-03-06]. https://www.freshpatents.com/-dt20151015ptan20150295716.php. |