期刊文献+

数据库中密文检索优化模型仿真与研究 被引量:4

Simulation and Research on Optimization Model for Ciphertext Retrieval in Database
在线阅读 下载PDF
导出
摘要 研究数据库中密文准确检索问题,以提高检索的准确性。由于加密后的关系数据库,密文数据不再保持原有明文的顺序性,给查询操作带来了极大的困难。传统的密文检索模型,无法全面分析加密后的密文数据的排名大小以及概率值大小,获取的密文检索在语义上具有歧义性。为解决上述问题,提出一种采用云计算的数据库中密文检索方法。根据主成分分析方法相关理论,针对数据库中所有的数据进行多特征降维处理,建立特征空间矩阵,并计算对应的协方差矩阵和特征映射空间,降低数据库中数据的冗余度。根据云计算相关理论,对数据库中的数据进行更新处理,遍历数据库中所有节点,建立数据库中密文检索模型。实验结果表明,利用改进算法进行数据库中密文检索,可以极大地提高检索的精确度,满足数据查询的实际需求。 Research on accurate ciphertext retrieval in database is to improve the accuracy of retrieval. In encrypted relational database, ciphertext data are no longer maintain the original succession of plaintext, bring great difficulties to query operation. In the paper, a ciphertext retrieval method in database based cloud computing was proposed. According to the correlation theory of principal component analysis, all of the data in the database were made multifeature dimension reduction, to establish feature space matrix, calculate the corresponding covariance matrix, feature mapping space, and reduce the redundancy of data in the database. According to the correlation theory of cloud computing, the data in the database were updated, all the nodes in the database were traversed to establish ciphertext retrieval model in database. The experimental results show that using the improved algorithm for ciphertext retrieval in database, can greatly improve the accuracy of retrieval to meet the actual demand for data queries.
作者 祝钢
机构地区 东北大学理学院
出处 《计算机仿真》 CSCD 北大核心 2014年第11期336-339,共4页 Computer Simulation
基金 教育部研究项目(教高司函[2009]1 教高司函[2010]76)
关键词 数据库 密文 检索 云计算 Database Cipbertext Retrieval Cloud computing
作者简介 祝钢(1972-),男(汉族),辽宁省沈阳市人,实验师,主要研究方向:计算机软件与数据库。
  • 相关文献

参考文献10

二级参考文献75

  • 1孙君顶,崔江涛,毋小省,周利华.基于颜色和形状特征的彩色图像检索方法[J].中国图象图形学报(A辑),2004,9(7):820-827. 被引量:30
  • 2董卫军,周明全,耿国华,黎晓.基于内容的图像检索技术研究[J].计算机工程,2005,31(10):162-163. 被引量:23
  • 3Huang P W,Dai S K.Image retrieval by texture similarity[J].Pattern Recognition, 2003,36( 3 ) : 665-679.
  • 4Jarari-Khouzanim K,Soltanian-Zadeh H.Rotation invariant mutiresolution texture analysis using radon and wavelet transform[J]. IEEE Trans Image Processing,2005,14(6).
  • 5Comaneci D,Ramesh V,Meer P.Kernel-based object tracking[J]. IEEE Trans on Pattern Analysis and Machine Intelligence,2003,25 (5): 564-577.
  • 6Gunns.SVM for Classification and Regression[R].University of SoUthampton,Faculty of Engineering Science and Mathematics School of Electronics and Computer Science, 1998.
  • 7Sims K. IBM introduces ready-to-use cloud computing collaboration services get clients started with cloud computing. 2007. http://www-03.ibm.com/press/us/en/pressrelease/22613.wss
  • 8Boss G, Malladi P, Quan D, Legregni L, Hall H. Cloud computing. IBM White Paper, 2007. http://download.boulder.ibm.com/ ibmdl/pub/software/dw/wes/hipods/Cloud_computing_wp_final_8Oct.pdf
  • 9Zhang YX, Zhou YZ. 4VP+: A novel meta OS approach for streaming programs in ubiquitous computing. In: Proc. of IEEE the 21st Int'l Conf. on Advanced Information Networking and Applications (AINA 2007). Los Alamitos: IEEE Computer Society, 2007. 394-403.
  • 10Zhang YX, Zhou YZ. Transparent Computing: A new paradigm for pervasive computing. In: Ma JH, Jin H, Yang LT, Tsai JJP, eds. Proc. of the 3rd Int'l Conf. on Ubiquitous Intelligence and Computing (UIC 2006). Berlin, Heidelberg: Springer-Verlag, 2006. 1-11.

共引文献1468

同被引文献40

  • 1马勺布,胡磊,徐德启.一种动态安全的密文数据库检索方法[J].计算机工程,2005,31(6):132-133. 被引量:19
  • 2Subaashini S,Kavitha V.A Survey on Security Issues in Service Delivery Models of Cloud Computing[J].Journal of Network and Computer Applications,2011,34(1):1-11.
  • 3Hacifumus H,Lyer B,Li C.Executing SQL over Encrypted Data in the Database-server-provider Model[C]//Proceedings of ACM SIGMOD International Conference on Management of Data.New York,USA:ACM Press,2002:216-227.
  • 4Hacigumus H,Lyer B,Sharad M.Efficient Execution of Aggregation Queries over Encrypted Relational Data-base[C]//Proceedings of DASFAA’04.Berlin,Germany:Springer-Verlag,2004:125-136.
  • 5Hacigumus H,Lyer B,Sharad M.Query Optimization in Encrypted Database Systems[C]//Proceedings of Conference on Database Systems for Advanced Applications.Berlin,Germany:Springer-Verlag,2005:43-55.
  • 6Hore B,Mehrotra S,Tsudik G.A Privacy-preserving Index for Range Queries[C]//Proceedings of the 30th VLDB Conference.New York,USA:ACM Press,2004:720-731.
  • 7Agrawal R,Kiernan J,Srikant R.Order Preserving Encryption for Numeric Data[C]//Proceedings of ACM SIGMOD International Conference on Management of Data.New York,USA:ACM Press,2004:563-574.
  • 8Gentry C,Halevi S,Vaikuntanathan V.A Simple BGNtype Cryptosystem from LWE[C]//Proceedings of the29th International Conference on Theory and Application of Cryptographic Techniques.Berlin,Germany:SpringerVerlag,2010:506-522.
  • 9Gentry C,Halevi S,Smart N.Better Bootstrapping in Fully Homomorphic Encryption[C]//Proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography.Berlin,Germany:Springer-Verlag,2012:1-16.
  • 10Brakerski Z,Vaikuntanathan V.Efficient Fully Homomorphic Encryption from(Standard)LWE[C]//Proceedings of the 52nd Annual Symposium on Foundations of Computer Science.Washington D.C.,USA:IEEE Computer Society,2011:97-106.

引证文献4

二级引证文献49

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部