期刊文献+

面向云存储的基于全同态密码技术的文档相似度计算方法 被引量:2

A document similarity calculation method based on fully homomorphic encryption technology for cloud storage
下载PDF
导出
摘要 针对云存储服务中存在的用户隐私保护需求,提出了一种在密文状态下的文档相似度计算方法。数据拥有者将文档ID、加密后的文档密文以及文档simhash值的密文上传到云服务器中;云服务提供者进行待计算相似度文档的simhash密文值和数据拥有者文档simhash密文值的全同态加法运算,获得文档间汉明距离的密文;数据拥有者解密汉明距离密文获得文档相似度排序结果。云端在不获悉数据内容及其simhash明文的情况下完成数据对象相似度运算,保护了数据隐私。给出了该方法的详细过程及相关的实验数据,验证了该方法的可行性。 In order to preserve user privacy in cloud storage services, we propose a method forlating the similarity of documents under the ciphertext environment. After the data owner uploads thedocument ID,the ciphertext of document and the ciphertext of document simhash to Cloud servers,the cloud server performs fully homomorphic addition operations on the simhash ciphertext of the document whose similarity is expected and the simhash ciphertext of the data owneU document. Then the cipher-text of the Hamming distance between documents is obtained. The data owner can get the results of doc-ument similarity ranking by decrypting the ciphertext of the Hamming distance. The goal of privacypreservation can be achieved by this method because the cloud server can complete similarity calculationwithout any plaintext information, neither the document text nor its simhash value. We explain the pro-posed method in detail and the related experimental data verify its feasibility and correctness.
出处 《计算机工程与科学》 CSCD 北大核心 2017年第10期1807-1811,共5页 Computer Engineering & Science
基金 中央高校基本科研业务费专项资金(CZW15043 CZQ14001) 湖北省自然科学基金(2014CFB916)
关键词 云存储服务 全同态密码技术 文档相似度计算 simhash 隐私保护 cloud storage service fully homomorphic encryption technology document similarity cal-culation simhash privacy preservation
  • 相关文献

参考文献5

二级参考文献44

  • 1吴光远,何丕廉,曹桂宏,聂颂.基于向量空间模型的词共现研究及其在文本分类中的应用[J].计算机应用,2003,23(z1):138-140. 被引量:23
  • 2卢开澄.计算机密码学[M].北京:清华大学出版社,2003.
  • 3W Diffie,M Hellman.New Directions in Cryptography[J].IEEE Trans on Information Theory,1976,22(6):644-654.
  • 4Bruce Schneier.吴世忠译.应用密码学:协议、算法与C源程序[M].北京:机械工业出版社,2000.
  • 5William Stallings.Cryptography and Network Security:Principles and Practice.Second Edition[M].北京:清华大学出版社,2002.
  • 6陈智罡, 王 箭, 王梅娟. 整数上的全同态加密分析[C]// 2012中国密码年会论文集. 合肥: [出版者不详], 2012.
  • 7Rivest R,Adleman L,Dertouzos M.On data banks and privacy homomorphisms[M]Foundations of Secure Computation.New York:Academic Press,1978:169-180.
  • 8Cohen J,Fischer M.A robust and verifiable cryptographically secure election scheme (Extended Abstract)[C]//Proc of the 26th Annual Symp on Foundations of Computer Science (FOCS1985).Piscataway,NJ:IEEE,1985:372-382.
  • 9Damgard I,Jurik M.A generalization,a simplification and some applications of Pailliers probabilistic public-key system[G]//LNCS 1992:Proc of Public Key Cryptography (PKC 2001).Berlin:Springer,2001:119-136.
  • 10Paillier P.Public-key cryptosystems based on composite degree residuosity classes[G]//LNCS 1592:Proc of Eurocrypt 1999.Berlin:Springer,1999:223-238.

共引文献98

同被引文献18

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部