{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{“日期-部件”:[[2024,2,1]],“日期-时间”:“2024-02-01T06:53:24Z”,“时间戳”:17067704048},“参考-计数”:103,“发布者”:“IGI Global”,“问题”:“4”,“许可证”:[{“开始”:}“日期-部分”:[2021,10,15]],”“日期-时刻”:“2011-10-10-10-10 5T00:00:00Z“,”时间戳“:1634256000000},“content-version”:“vor”,“delay-in-days”:0,“URL”:“http://\/creativecommons.org\/licenses\/by\/3.0\/dode.en_US”},{“start”:{“date-parts”:[[2021,10,15]],“date-time”:“2021-10-15T00:00:00Z”,“timestamp”:1634256000000},“content-version”:“am”,“delay-in-days”:“0,”URL“http://creativecommons-org\/licenses\/by\/3.0\/dote.en_US“},{“start”:{“date-parts”:[[2021,10,15]],“日期-时间”:“2021-10-15T00:00Z”,“时间戳”:1634256000000},“内容版本”:“tdm”,“延迟天数”:0,“URL”:“http:\/\/ccreativecommons.org/licenses\/by\/3.0\/dict.en_US”}],“内容域”:{“域”:[],“交叉标记限制”:false},“短容器标题”:[],“已发布的打印”:{“日期部分”:[[2021,10,15]]},“摘要”:“

随着大数据和数据挖掘等数据库应用的出现和发展,如何在不泄露敏感信息的情况下确保数据的可用性已成为数据库隐私保护的一个重要问题。同态加密作为解决这一问题的关键技术,近年来已成为国内外信息安全领域的研究热点。本文对同态加密技术在数据库隐私保护中的研究进展进行了梳理、分析和总结。此外,分别介绍了三种不同类型的同态加密技术在数据库隐私保护中的应用,并对每种技术的原理和特点进行了分析和说明。最后,本文总结了同态加密技术在数据库隐私保护应用中面临的挑战和发展趋势,为今后的研究提供了参考<\/p> “,”DOI“:”10.4018\/ijcini.287600“,”type“:”journal-article“,”created“:{”date-parts“:[2021,9,17]],”date-time“:”2021-09-17T13:07:21Z“,”timestamp“:1631884041000},”page“:“1-22”,“source”:“Crossref”,“is-referenced-by-count”:3,“title”:[“同态加密在数据库隐私保护中的应用研究综述”],“前缀”:“10.4018”,“卷“:”15“,”作者“:[{”given“:”Yong“,”family“:”Ma“,“sequence”:“first”,“affiliation”:[{name“:”江西师范大学计算机信息工程学院“}]},{”ORCID“:“http://\/ORCID.org\/00000-0002-5895-9148”,“authenticated-ORCID”:true,“given”:“嘉乐”,“family”:“Zhao”,“segment”:“additional”,“从属关系”:[}“name”:“”江西师范大学计算机信息工程学院“}]},{“given”:“康顺”,“family”:“Li”,“sequence”:“additional”,“affiliation”:[{“name”:“Guangdong University of Science and Technology,China”}]},}“giving”:“Yuanlong”,“家人”:“Cao”,“sequence”:“additionable”,“feliation”江西师范大学软件学院“}]},{“给定”:“湖源”,“家庭”:“陈”,“序列”:“附加”,“隶属关系”:[{“名称”:“江西师范大学数学与统计学院”}]}.,{”给定“:“友诚”,“家族”:“张”,“顺序”:“额外”,“附属关系”:[{“姓名”:“南京优利信息技术有限公司”。中国有限公司“}]}],“成员”:“2432”,“参考”:[{“key”:“IJCINI.287600-0”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/375551.375602”},{“密钥”:“I JCINI.287600-1”,“dio-asserted-by”:”publisher“,”doi“:”10.1145\/342009.335438“},“key“:”IJCINI.287600-2“,”非结构化“:”Akavia,A.、Feldman,D.和Shaul,H.(2018).通过多圈完全同态加密进行安全搜索。IACR加密。电子打印架构。,2018,245.“},{“key”:“IJCINI.287600-3”,“doi-asserted-by”:“publisher”,“doi”:“10.3934\/agrfood.2019.1165”},},“key“:”IJCINI.287600-4“,”doi-assert-by“:”publisher“,”doi“:”10.1007\/978-3319-29919-8_4“}\/j.issn.1001-3695.2018.03.053“},{”key“:”IJCINI.287600-6“,”doi-asserted-by“:”publisher“,”DOI“:”10.1007\/978-3642-38980-1_7“},{“key”:“IJCINI.287600-7”,“DOI-asserted-by”:“publisher”,“DOI”:“10.1007\/978-3-540-74143-5_4”},“key“:”IJCINI.287600-8“,”DOI-assert-by“:”publisher serted-by“:”publisher“,”DOI“:”10.1145\/2633600“},{”key“:”IJCINI.287600-10“,”doi-asserted-by“:”publisher“,”doi“:”10.1007\/978-3642-22792-9_29“},{“key”:“IJCINI.287600-11”,“doi-assert-by”:“publisher”,“doi”:“10.1137\/120868669”},“key“:”IJCINI.287600-12“,”doi-assetd-by“:”prisher““doi-asserted-by”:“publisher”,“doi”:“10.15439\/2015f140”},{“key”:“IJCINI.287600-14”,“doi-asserted-by“:”crossref“,”first page“:”41“,”doi“:”10.1109\/SFCS.1995.492461“,”article-title“:”私人信息检索“,”author“:”B.Chor“,”year“:”1995“,”journal-title”:“IEEE第36届计算机科学年度基础会议录”},{“key”:“IJCINI.287600-15”,“unstructured”:“Clifton,C.,Kantarcioglu,M.,&Vaidya,J.(2002年11月)定义数据挖掘的隐私。在国家科学基金会下一代数据挖掘研讨会上(第1卷,第26期,第1页)。学术出版社。“},{”key“:”IJCINI.287600-16“,”doi-asserted-by“:”crossref“,”first-page“:”2988“,”doi“:”10.1109\/TIFS.2020.2981239“,”article-title“:”来自近似公约数问题的快速加性部分同态加密“,”volume“:“15”,”author“:”E.L.Cominetti“,”year“:”2020“,”journal-title:“”IEEE信息取证与安全事务处理“},{“key”:“IJCINI.287600-17”,“doi-asserted-by”:“publisher”,“doi”:“10.1007\/978-3642-22792-9_28”},“key“:”IJCINI.287600-18“,”doi-assert-by“:”publisher“,”doi“:”10.1007\/978-3-642-29011-4_27,“doi”:“10.7146\/brics.v7i45.20212”},{“问题”:“2“,”key“:”IJCINI.287600-20“,”first-pages“:”129“,”article-title“:”云环境下数据安全同态加密算法的比较研究。“,”volume“:”11“,”author“:”P.Devi“,”year“:”2020“,”journal-title“:”International journal of Electrical Engineering&Technology“},”{“key”:“IJCINI.287600-21”,”doi-asserted-by“:”publisher“,”doi“:”10.1109\/TIT.1985.1057074“}”,{“key”:”IJCINI.287600-22“,”unstructured“:”Gahi,Y.,Guenoun,M.,&El-Khatib,K.(2015)使用同态加密方案的安全数据库系统。arXiv预打印arXiv:1512.03498.“},{“key”:“IJCINI.287600-23”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/1536414.1536440”},“key“:”IJCINI.287600-24“,”doi-assert-by“:”publisher“,”doi“:”10.1007\/978-3642-20465-4_9“}publisher“,”doi“:”10.1109\/focs.2011.94“},{”key“:”IJCINI.287600-26“,”doi-asserted-by“:”publisher“,”doi“:”10.1007\/978-3-642-40041-4_5“},{“key”:“IJCINI.287600-27”,“doi-assert-by”:“publisher”,“doi”:“10.1007\/778-3-540-30576-7_29”},}“key”:”IJCINI.287600-28“,”doi-assetd-by“:”publisher“,”doi“:“10.1145\/33335741.3335749”}.287600-29“,”doi-asserted-by“:”publisher“,”doi“:”10.1109\/icdse.2012.6282318“},{“key“:”IJCINI.287600-30“,”doi-asserted-by“:”publisher“,”doi“:”10.19304\/j.cnki.issn1000-7180.2009.09.017“},{“key”:“IJCINI.287600-31”,“doi-assert-by”:“publisher”,“doi”:“10.1109\/nof.2013.6724526”},“key“:”IJCNI.287600-32“,”doi-assertd-by“:”publisher“,”DI:“10.1007\/978-981-10-0135-2_43“},{“key”:“IJCINI.287600-33”,“doi-asserted-by”:“publisher”,“DOI“:”10.7544\/issn1000-1239.2014.0115“},{“issue”:“1”,“key”:“IJCINI.287600-34”,“DOI-asserted-by”:“crossref”,“first page”:”431“,“DOI”:“10.1515\/comp-2020-0206”,“article-title”:“一种新的同态rasd框架,用于云计算中的安全数据访问和存储。”,“volumel”:“10”,“author”:“R.Jain”,“year”:“2020”,“journal title”:“”开放计算机科学“},{“key”:“IJCINI.287600-35”,“doi断言者”:“publisher”,“doi”:“10.1109\/csss.2012.217”},{“key”:“IJCINI.287600-36”,“doi断言者”:“publisher”,“doi”:“10.3969\/j.issn.1002-137X.2011.03.026”},{“key”:“IJCINI.287600-37”,“doi断言者”:“publisher”,“doi”:“10.3934\/agerfood”。2020.2.272“},{”键“:”IJCINI.287600-38“,”doi-asserted-by“:”crossref“,”unstructured“:”Kalyani,P.,Masooda,M.,&Namrata,P.(2021)。使用同态加密保护分布式系统中数据的隐私。《高级计算和智能工程进展》(第306-313页)。斯普林格。“,”DOI“:”10.1007\/978-981-15-6584-7_30“},{“key”:“IJCINI.287600-39”,“DOI-asserted-by”:“publisher”,“DOI”:“10.1007\/978-3-540-71677-8_21”},“{”key“:”IJCINI.287600-40“,”DOI-assert-by“:”publisher“,”DOI“:“10.1145\/24146.2414506”}“,{”密钥“:”ICINI.287700-41“,”由“:”publisher“,”DOI“:”10.1016\/j.datak.2017.07.005“},{”key“:”IJCINI.287600-42“,”doi-asserted-by“:”publisher“,”doi“:”10.1109\/eiconrus.2017.7910591“},{”issue“:”3“,”key“:”IJCINI.287600-43“,”first page“:“203”,”article-title“:”使用对称同态加密方案在垂直分区数据库中挖掘隐私保护频繁项集。《国际信息隐私杂志》,“volume”:“4”,“author”:“J.Lamba”,“年份”:“2020”,“期刊标题”:“安全与完整性”},{“密钥”:“IJCINI.287600-44”,“doi断言”:“crossref”,“首页”:“242”,“doi”:“10.1145\/33433210.3457535”,“文章标题”:“Pipa:通过同态加密进行隐私保护密码检查。”,“作者”:“J.Li”,“年份”:“2021”,“期刊标题”:“2021年ACM亚洲计算机和通信安全会议记录“},{“key”:“IJCINI.287600-45”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/infcom.2010.5462196”},“key“:”IJCINI.287600-46“,”doi-assert-by“:”publisher“,”doi“:”10.1016\/j.swevo.2017.07.005“}”,{:“publisher”,“doi”:“10.4018\/IJCINI.2019010104“},{“key”:“IJCINI.287600-48”,“doi-asserted-by”:“publisher”,“doi”:“10.1016\/j.ins.2018.12.006”},“key“:”IJCINI.287600-49 serted-by“:”publisher“,”doi“:”10.4018\/IJCINI.2019040102“},{”key“:”IJCINI.287600-51“,”doi-asserted-by“:”publisher“,”doi“:”10.13328\/j.cnki.jos.005358“},{“key”:“IJCINI.287600-52”,“doi-assert-by”:“publisher”,“doi”:“10.11897\/SP.j.1016.2018.01172”},“key“:”IJCINI.287600-53{“key”:“IJCINI.287600-54”,“doi-asserted-by”:“publisher”,“doi”:“10.13328\/j.cnki.jos.005354“},{“key”:“IJCINI.287600-55”,“doi-asserted-by”:“publisher”,“doi”:“10.11897\/SP.j.1016.2019.00837”},}“key”:”IJCINI.287600-56“,“doi-asserted-by”:”publisher“,”doi“:”10.1145\/22113977.2214086“}“:”publisher“,”doi“:”10.1145\/1217299.1217302“},{”key“:”IJCINI.287600-58“,”doi-asserted-by“:”crossref“,”unstructured“:”Mani,M.,Shah,K.,&Gunda,M.(2013)。使用完全同态加密实现安全数据库服务:挑战和机遇。arXiv预印本arXiv:1302.2654.“,”DOI“:”10.1145\/248677.24866775“},{“key”:“IJCINI.287600-59”,“DOI-asserted-by”:“publisher”,“DOI”:“10.1109\/icmcs.2016.7905648”},“key“:”IJCINI.287600-60“,”DOI-assert-by“:”publisher“IJCINI.287600-61”,“DOI-asserted-by”:“publisher”,“DOI”:“10.3934\/agrfood.2019.1.136“},{“密钥”:“IJCINI.287600-62”,“首页”:“79”,“文章标题”:“使用完全同态加密的隐私保护虹膜身份验证”,“作者”:“M.K.Morampudi”,“年份”:“2020”,“新闻标题”:《多媒体工具和应用程序》},}“密钥“:”IJCINI.287600-63“,”doi-asserted-by“:”publisher“,”doi“:”10.1145\/288090.288106“}”,{“key”:“IJCINI.287600-64”,“作者”:“A.Nayyar”,“年份”:“2019”,“期刊标题”:“云计算手册:云计算概念和设计的基础研究”},{“key”:“IJCINI.287600-65”,“doi断言者”:“出版者”,“doi”:“10.1007\/3-540-48910-x_16”},{“key”:“IJCINI.287600-66”,“doi断言者”:“出版者”,“doi”:“10.1109\/cwit.2015.7255155“},{“问题”:“2”,“密钥”:“IJCINI.287600-67”,“doi-asserted-by”:“crossref”,“首页”:“3131”,“doi”:“10.1109\/JSYST.2020.3001316”,”article-title“:“在多密钥环境中使用同态加密进行隐私保护关联规则挖掘。”,“卷”:“15”,“作者”:“H.Pang”,“年份”:“2020”,“日志标题”:“”IEEE Systems Journal“},{”key“:”IJCINI.287600-68“,”first page“:“1”,”article-title“:”物联网中基于Web的数据库安全,使用完全同态加密和离散蜂群优化。“,”author“:”R.J.S.Raj“,”year“:”2020“,”Journal-title”:“Malaysia Journal of Computer Science”},“key”:“IJCINI.287600-69”,“doi-asserted-by”:“”publisher,“DOI”:“10.1145\/106059.1060603”},{“key”:“IJCINI.287600-70”,“unstructured”:“Rivest,R.L.,Adleman,L.,&Dertouzos,M.L.(1978)。关于数据库和隐私同态。安全计算基础,4(11),169-180。”}“密钥”:“IJCINI.287600-72“,“doi-asserted-by”:“publisher”,“doi”:“10.7544\/issn1000-1239.2015.0131494”},{“key”:“IJCINI.287600-73”,“doi-asserted-by”:”publisher“,”doi“:”10.1007\/978-3642-13013-7_25 _25“},{“key”:“IJCINI.287600-75”,“doi-asserted-by”:“publisher”,“doi”:“10.1007\/978-3-642-17373-8_22“},{“key”:“IJCINI.287600-76”,“unstructured”:“Stephen,J.J.,Savvides,S.,Seidel,R.,&Eugster,P.(2014).实用保密性保护大数据分析.第六届USENIX云计算热点专题研讨会(HotCloud 14).”},}“key:”IJCINI.287600-77“,”article-title“:”使用有限域的完全同态加密对加密数据库进行高效的私有比较查询。“,”author“:”B.H.M.Tan“,”year“:”2020“,”journal-title“:”IEEE Transactions on Reliable and Secure Computing“},”{“key”:“IJCINI.287600-78”,”doi-asserted-by“:”publisher“,”doi“:”10.1145\/254173.2509554“}”,{“key”:”IJCINI.287600-79“,”doi-asserted-by“:“publisher”,”doi:“10.11897\/SP.J.1016.2017.02245”},“key“:”“IJCINI.287600-80”,“doi-asserted-by”:“publisher“,”DOI“:”10.14778\/2535573.2488336“},{”key“:”IJCINI.287600-81“,”first page“:“24”,”article-title“:”integers上的完全同态加密“,”author“:”M.Van Dijk“,”year“:”2010“,”journal-title”:“密码技术理论与应用年度国际会议”},}“key”:“IJCINI.287600-82”,”DOI-asserted-by“:”publisher“,”DOI“:”10.1145\/974121.974131“},{“key”:“IJCINI.287600-83”,“DOI-asserted-by”:“publisher”,“DOI”:“10.1016\/j.future.2017.07.011”},“key“:”IJCINI.287600-84“,”DOI-assert-by“:”publisher by“:”publisher“,”DOI“:”10.3969 \/j.issn.1006-4710.2002.03.011“},{”key“:”IJCINI.287600-86“,”doi-asserted-by“:”publisher“,”doi“:”10.3969\/j.issn.1006-7043.201206052“},{“key”:“IJCINI.287600-87”,“doi-assert-by”:“publisher”,“doi”:“10.3969 \/j.issn.1000-3428.2006.12.033”},“key“:”IJCINI/287600-88“,”article-title“:”使用完全同态加密和密文打包技术的安全高效外包k-means聚类。“,”author“:”W.Wu“,”year“:”2020“,”journal-title“:”IEEE Transactions on Knowledge and Data Engineering“},{”key“:”IJCINI.287600-89“,”doi-asserted-by“:”publisher“,”doi“:”10.1145\/1142473.1142500“}”,{“key”:“IJCINI.287600-90”,“doi-assert-by”:“publisher”,“doi”:“10.1145\/1247480.1247556”},”{“key”:”IJPINI.287 600-91“,”doi-asserted-by“:”publisher“,”doi“:”10.3969 \/j.issn.1671-1815.2016.21.052“},{“key”:“IJCINI.287600-92”,“unstructured”:“Yang,Y.B.(2007)。通用高效数据库数据加密设计。计算机应用教程,27(B06),242-244。doi:1001-9081(2007)S1-0242-03“},{“key”:“IJCINI.287600-93”,“doi-asserted-by”:“publisher”,“doi”:“10.3969\/j.issn.1000-3428.2012.24.001”},}“key”:”IJCINI.287600-94“,”doi-assert-by“:”publisher“,”doi“:”10.11999\/JEIT180805“}y“:”publisher“,”doi“:”10.3969 \/j.issn.1007-130X.2014.07.029“},{”key“:”IJCINI.287600-96“,”doi-asserted-by“:”publisher“,”doi“:”10.3969\/j.issn.1001-3695.2013.07.022“},{”key“:”IJCINI.287600-97“,”unstructured“:”Yu,Z.B.,&Zhou,Y.H.(2015)。基于关键字的云加密数据隐私保护检索。计算机科学,(S1),365-369。doi:CNKI:SUN:JSJA.0.2015-S1-091“},{“key”:“IJCINI.287600-98”,“doi-asserted-by”:“publisher”,“doi”:“10.3969”\/j.issn.1000-3428.201.49“}”,{”key“:”IJCINI.287600-99“,“unstructured”:“Zhang,N.,&Zhao,W.(2005年8月)。分布式隐私保护信息共享。第31届超大数据库国际会议论文集(第889-900页)。学术出版社。“},{”key“:”IJCINI.287600-100“,”doi-asserted-by“:”publisher“,”doi“:”10.1109“\/icact.2014.6779008”},“key”:“IJCINI.287600-101”,“doi-assert-by”:“publisher”,“doi”:“10.1109\/ACCESC.2020.3047950”}、{”密钥“:”IJCINI.287600-102“,”doi-asserted-by“,”:“publisher”,“doi”:”10.3724\/SP.J.1016.2009.00847“}],“集装箱标签”:[”国际认知信息学与自然智能杂志“],”original-title“:[],”language“:”ng“,”link“:[{”URL“:”https:\\/www.igi-global.com/viewtitle.aspx?TitleId=287600“,”content-type“:”unspecified“,”content-version“:”vor“,”intended-application“:”similarity-checking“}”,“deposed”:{“date-parts”:[2023,16]],“date-time”:“2023-01-16T21:55:43Z“,”timestamp“:1673906143000},”score“:1,”resource“:{”primary”:{“URL”:“https:\/\/services.igi-global.com/resolvedoi\/resolve.aspx?doi=10.4018\/IJCINI.287600”}},“subtittle”:[“”],“shorttitle”:[],“issued”:{“date-parts”:[2021,10,15]]}、“references-count”:103,“journal-issue:{”问题“:”4“,”published-print“:{”date-parts“:[[2021,10]]}},”URL“:”http://\/dx.doi.org\/10.4018\/ijcini.287600“,”关系“:{},”ISSN“:[”1557-3958“,”1557-3.966“],”ISSN-type“:[{”value“:”1557-39 58“,“type”:“print”},{”value“:“1557-3966”,“type”:“electronic”}],“subject”:[],“published”:{“date-parts”:[2021,10,15]]}}}}