• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Fuzzy Search for Multiple Chinese Keywords in Cloud Environment

    2019-07-18 02:00:06ZhongjinFangJinweiWangBaoweiWangJianjunZhangandYunqingShi
    Computers Materials&Continua 2019年7期
    關(guān)鍵詞:微機電腦計算機

    Zhongjin Fang , Jinwei Wang , Baowei Wang Jianjun Zhang and Yunqing Shi

    Abstract: With the continuous development of cloud computing and big data technology, the use of cloud storage is more and more extensive, and a large amount of data is outsourced for public cloud servers, and the security problems that follow are gradually emerging.It can not only protect the data privacy of users, but also realize efficient retrieval and use of data, which is an urgent problem for cloud storage.Based on the existing fuzzy search and encrypted data fuzzy search schemes, this paper uses the characteristics of fuzzy sounds and polysemy that are unique to Chinese, and realizes the synonym construction of keywords through Chinese Pinyin and Chinese-English translation, and establishes the fuzzy word and synonym set of keywords.This paper proposes a Chinese multi-keyword fuzzy search scheme in a cloud environment, which realizes the fuzzy search of multiple Chinese keywords and protects the private key by using a pseudo-random function.Finally, the safety analysis and system experiments verify that the scheme has high security, good practicability, and high search success rate.

    Keywords: Cloud storage, fuzzy search, Chinese keyword, synonym, encrypted search.

    1 Introduction

    With the development and popularization of information technology, the number of data files stored by local users and enterprises in the local area is growing, and the pressure on local storage is increasing [Patnaik (2016)].The local hardware failure or severe damage will greatly affect the users and enterprises for the use of data, or even the loss of important data will always be.Therefore, cloud storage services are popular with more and more users with the advantages of convenience and cost saving [Li and Zhang (2013)].However, the use of cloud storage services has some constraints.For example, some data related to the trade secrets of enterprises must be protected from being used illegally.As a result, the data is typically encrypted locally and then outsourced to a cloud storage server, which brings great trouble with the use of data [Fu, Shu and Sun (2014)].Due to the limitation of network bandwidth and local storage capacity, it is impossible for users to download all the data and then decrypt it.In brief, the research design of cloud data services that support privacy protection and encrypted search is a research topic of great significance and practical value [Lucas, Seny and Fabian (2005)].Researchers at home and abroad have made many research results in keyword search based on public key encryption.For example, Song et al.proposed a ciphertext keyword search based on symmetric encryption in 2000 [Song, Wagner and Perrig (2000)]; Boneh et al.proposed a ciphertext keyword search based on public key encryption in 2007 [Boneh and Waters (2007)].In recent years, many achievements have been made.For example, Li et al.put forward the use of edit distance to quantify the similarity between keywords and form a new technology based on keyword fuzzy search [Li, Wu and Yuan (2016)]; Hore et al.proposed a range search method based on range grouping in 2012 [Hore, Mehrotra, Canim et al.(2012)].

    From the earlier analysis, it can be seen that the research on encrypted data search has achieved productive results, but there are still many problems to be solved in semantic search and fault tolerance: the earlier keyword-based search method only focuses on the precise or fuzzy matching of keywords, which is not completely applicable to the Chinese environment [Cao, Wang, Li et al.(2014)].In addition to the glyphs, the Chinese characters contain two parts: pinyin and meaning.Pinyin consists of initials and finals.Therefore, under normal circumstances, a Chinese keyword has many synonyms, synonyms, and similar words.At present, there are few studies on Chinese keyword search with similar semantics and speech at home and abroad [Wang, Cao and Li (2010)].Hence, this paper proposes a fuzzy search strategy based on keyword-based encrypted cloud data, and explores the execution efficiency and method of fuzzy search of Chinese fuzzy sounds and synonymous keywords in the cloud storage environment.

    In this paper, we focus on the implementation of Chinese fuzzy keyword search strategy which is suitable for cloud environment and can protect privacy.We propose a method to construct the synonymy and homonym sets of Chinese keywords by inter-translation between Chinese and English and the fuzzy pinyin strategy.We provide an effective fuzzy keyword search scheme based on Chinese keywords for cloud data retrieval which can protect the privacy of keywords.Fuzzy keyword search greatly improves the availability of the system by returning the matched files.When the keyword entered by the user matches the predefined keyword exactly, the matching files will be returned.When the exact matching fails, keyword-based synonyms and homonyms are used to return the closest possible matching files.Specifically, the similarity of different language expressing is used to achieve the similarity of Chinese keywords, and it develops a new ciphertext retrieval technology.Based on the homophone and synonym keyword sets, we propose an efficient fuzzy keyword search scheme.The strict security analysis shows that the proposed scheme is secure and privacy-preserving, which is the goal of the Chinese fuzzy keyword search scheme.

    The rest of paper is organized as follows: Section 2 introduces the system model, threat model, our design goal and briefly describes some necessary background for the techniques used in this paper.Section 3 shows a straightforward construction of fuzzy keyword search scheme.Section 4 provides the detailed description of our proposed schemes, including the efficient constructions of fuzzy keyword set and fuzzy keyword search scheme.Section 5 presents the security analysis.Section 6 presents the experiments analysis.Finally, Section 7 concludes the paper.

    2 Problem descriptions

    2.1 System and threat model

    The architecture of the data storage service in the cloud environment is shown in Fig.1, which presents that architecture contains three main entities: a data owner, user, and cloud service provider.Where, the data owner can be an individual or enterprise user who stores the data file set C =(F1,F2,…,Fn) on the cloud server.Different keyword sets related to file set C are predefined and expressed asTo ensure that sensitive data is not used by unauthorized persons, data set C needs to be encrypted before outsourcing to the cloud server.Since there are a large number of similar sounds and synonyms in Chinese, in order to improve the utilization efficiency and the retrieval success rate of cloud data, the architecture needs to provide fuzzy search function of fuzzy sounds and synonyms for encrypted data.The data owner needs to generate the private key sk for the search request and distribute it to other authorized users, such as team members or enterprise employees.When the private key allocation is completed, for any input keyword w, in order to safely search out the relevant file set, the authorized user uses the private key sk and one-way generation function to convert the keyword which need be searched into a search request (hereinafter referred to as a trap door) and submit it to the cloud server.The cloud server caries out the search without decrypting the data and sends the searched set of target files (denoted as FIDw) associated with the keyword w or the ambiguous sound or synonym of w to the data searcher.

    This paper considers that the cloud server involved in the cloud data service architecture is honest, but curious, it can correctly execute the specified protocol specification, but it will infer and analyze the relevant information through the input of users.Therefore, we still follow the security definitions involved in traditional symmetric encryption when designing the synonymous keyword search scheme.Except for search results and search models, anything else related to stored files and indexes should be not revealed.

    2.2 Goal of the design

    In order to realize a safe and efficient synonym keyword search for the above model of cloud data, this paper needs to achieve the following goals: 1) fuzzy keyword search function: explore efficient and correct fuzzy keyword search strategy for outsourcing cloud data of different mechanism design; 2) guarantee security: prevent the cloud server from learning knowledge related to data files or keywords in the search process; 3) guaranteed efficiency: achieve the above goals with the smallest possible occupation of storage, communication, and computing resources.

    2.3 Preliminary knowledge

    C: The set of outsourced files, represented as the set of n data files, i.e., C =(F1,F2,…,Fn).E: A collection of different keywords extracted from the file set C, expressed as a set of p words, i.e.,

    I: An index established for a privacy-protected fuzzy keyword search.

    Tw: Trapdoor, which is a search request, generated by a one-way function after the user inputs the search keyword w.

    FIDwi: The collection consists of a file set C containing the keyword wior its near or synonymous file ID.

    f(key,?),g(key,?): Pseudo-random function (PRF), defined as: {0,1}?×key →{0,1}1.Enc(key,?),Dec(key,?): Symmetric key encryption/decryption function based on semantic security.

    Edit distance: Edit distance is a description of the similarity of strings.For the two words w1and w2, edit distance ed(w1,w2)represents the minimum number of operations required for both to implement the transformation, which can be operations to add, modify, and delete characters.For a given word w and integer d, Sw,dis used to represent the similar word w′, satisfying ed(w,w′)≤d.

    SPw,d: Keyword set corresponding to fuzzy pinyin of keyword w.For a given Chinese keyword w and an integer d, the set of fuzzy tones corresponding to the Pinyin PYwisand the set of all similar Pinyin keyword that satisfies the requirement that the edit distance of the Pinyin of the keyword w is less than d is expressed as ed(PYw,PYw′)≤d, i.e.,∈SPw,d,∈SPYw,d.

    SYw: A collection of keywords synonymous with the keyword.When a different keyword setdescribing the same thing in the same language is converted into another language,generally corresponds to the same keyword we, then the setis a synonym set of the keyword w, where syn(w)=synsyn() is a synonymous conversion function.In this paper, synonymous conversion is implemented in Chinese and English.

    Fuzzy keyword search: Given a set of n encrypted data files C =(F1,F2,…,Fn), a predefined set of different Chinese keywordsthe combination of the input multiple search keywords w and d, i.e., {w,d}.After performing the synonym keyword search, a file ID set {FID{wi,di}} will be returned, where w ∈{w,d}, wi∈SYwor wi∈SPw,d.

    3 System framework

    3.1 Representation of system framework

    According to the above target analysis, the overall framework design of the system is shown in Fig.1.

    3.2 Overview of design

    The goal of a fuzzy search is to return as many results as possible (including synonymous and fuzzy tones) based on the set of keywords inputted by different users.However, such fuzzy search based on keyword synonym and fuzzy word is very challenging for matching cloud data.Any two Chinese words can easily obtain the fuzzy words or synonyms in the plaintext state, but it is difficult to find similar rules after one-way encryption function encryption (such as pseudo-random function or another encryption algorithm).The traditional encryption search strategy searches through equal comparisons between usersubmitted search traps and searchable encrypted indexes, but is not available in fuzzy searches here [Chen, Shen, Hu et al.(2016); Cheang, Wang, Cai et al.(2018)].

    In order to solve this problem, this paper proposes a step-by-step scheme to reduce the difficulty of fuzzy matching with cloud-encrypted data.In the first step, the data owner constructs a fuzzy keyword set on the client side, and the set mainly includes three parts: keywords, Pinyin and fuzzy tones of keywords, English words corresponding to keywords, and corresponding index information (Chinese keyword and document ID table, Chinese and English keyword comparison table and Pinyin and fuzzy tones comparison table).In the second step, based on the fuzzy keyword set, a safe and efficient fuzzy search method is designed, which will be elaborated in the following chapters.

    For data outsourced to the cloud, in addition to security issues, the user is most concerned with the efficiency of the operation.Therefore, this paper uses symmetric encryption as a searchable encryption framework.

    Figure 1: Multi-keyword Chinese fuzzy search strategy system framework

    4 Implementation of project

    In the design of Chinese fuzzy keyword search scheme framework, this paper first considers the establishment of fuzzy keyword set, then analyzes how to generate search request, and finally how to implement secure and efficient encrypted data search.

    4.1 A fuzzy keyword set establishment

    Establishing a set of keywords is a prerequisite for efficient fuzzy search.SPw,dand SYware generated by keyword w and similarity constraint d, where w′∈SPw,d, ed(PYw,PYw′)≤d; w′∈SYw, syn(w)=syn(w′).The specific implementation is as follows:

    (1) Fuzzy pinyin keyword set establishment

    The pinyin of Chinese characters is mainly composed of initials and finals, and the combination of initials and finals conforms to specific laws.The following is a list of specific collections:

    Initial set: {b, p, m, f, d, t, n, l, g, k, h, j, q, x, zh, ch, sh, r, z, c, s, y, w}

    Single final set: {a, o, e, i, u, ü}

    Complex final set: {ai, ei, ui, ao, ou, iu, ie, üe, er}

    Front nose vowel: {an, en, in, un, ün}

    Post nasal vowel: {ang, eng, ing, ong}

    Chinese Pinyin does not have any combination like English words.For example, when the initial is b, the set of finals can only contain a fixed number: {a, o, i, u, ai, ei, ao, ie, an, en, in, ang, eng, ing, ian, iao}.Moreover, the most common mistakes in Chinese Pinyin spelling is the fuzzy sound, such as the flat tongue and the squeaky tongue, l and n in the initial, the front and back nasal, ian and iang, and uan and uang in the final.Therefore, the easiest way to create a fuzzy sound keyword set is to enumerate the possible pinyin combinations and find the set of keywords that are the same as these combinations.Examples are as follows:

    Assuming that the user gives d=2 and the pinyin of the input keyword w is lin, the corresponding fuzzy key keyword combination SPw,d=is generated according to the pinyin composition rule, and the pinyin ofshould be included in the set {lin, nin, ling, ning, *in}.

    (2) Synonym set establishment

    There are many words in Chinese that have the same or similar meanings, but these are not reflected in the synonym dictionary, e.g., “計算機”, “電腦” and “微機”.These three Chinese words have the same meaning.When the user executes the cloud data search, the file IDs related to these three words should be returned to the user, but there is no good way to achieve a similar synonym comparison.By comparing the similarity between Chinese and English in describing the same thing, a method for realizing synonym conversion using language differences is proposed.For example, the English words of the above three words are “computer”, so if the English translation of the keyword wiis consistent, then the words are synonymous.The implementation process is as follows:

    Assuming the keyword w input by the user, the function syn(w) is executed, w is translated into the English word we, and then the Chinese keyword translated into weis searched in the Chinese-English comparison table and the keyword set SYwis returned.

    After generating the corresponding fuzzy sound and synonym set, the SPw,dand SYware encrypted by the encryption function Enc(key,?), and sent to cloud together with the encrypted file for saving.

    4.2 Generate search request

    After the user inputs the keywords {w,d}, the scheme carries out a fuzzy search and returns a corresponding set {FIDwi} of file IDs, where w ∈{w,d}, wi∈SYwor wi∈SPw,d.The generation process of the search request is similar to the generation of the keyword index, that is, according to the input w and d, the fuzzy pinyin and synonym generation function is called to obtain the fuzzy pinyin keyword set SPw,dand the synonym set SYw.A search trapdoor is generated by w, SPw,dand SYw, which all is encrypted, and then submitted to the cloud server.Finally, the search request generation work is completed.

    4.3 Fuzzy search scheme

    In the cloud service system, in order to avoid the cloud to obtain sensitive information, part of the work needs to be performed on the client side, e.g., the establishment of search indexes and the generation of trapdoors.Executing the search in a large amount of data is a very resource-consuming work, which should be done by the cloud server.The execution flow of the keyword-based encrypted cloud data fuzzy search scheme is as follows:

    Scheme preprocessing stage:

    (1) The data owner randomly selects two numbers a and b as the private key sk and distributes the private key to the data user.

    (3) Outsource the index tables I1and I2and the encrypted data files to the cloud server storage.

    Search stage:

    (1) The user inputs sk and {w,d}.The client system generates SPw,dand SYw, and generates a trapdoorw′∈SYw.The trapdoor sets T1w′and T2w′are sent to the cloud.

    (2) The cloud server will compare the trapdoor T1w′=f(a,w′), w′∈SPw,d; T2w′=f(a,w′), w′∈SYwwith the indexes I1and I2to achieve file ID setrespectively, where w ∈{w,d}, wi∈SYwor wi∈SPw,d.The cloud sever sends the final result to the client.

    (3) The client uses the corresponding g(b,w′) to decrypt the file ID, and calls Dec(key,?) to decrypt the required file.

    5 Security analysis

    In the encrypted search scheme designed in this paper, when the user inputs the same search request, the cloud will always return the same search result.Although the cloud server does not see what the underlying plaintext is, it can still establish access patterns and search patterns in interaction with the user.So the scheme ensures that content other than access and search requests are not compromised.This section will prove that the fuzzy search scheme designed in this paper is in line with the non-adaptive semantic security requirements [Raghavendra, Girish and Geeta (2018)].The non-adaptive attack model only considers adversaries (e.g., cloud servers), who cannot select trapdoor-based search requests and previous search results, because only users with authorized private keys can generate search traps [Wang, Chen, Li et al.(2017); Shen, Wang, Li et al.(2018)].Below we introduce some of the concepts to analyze the security of fuzzy search schemes.

    History: The interaction between the user and the cloud server, consisting of a set of files C and a set of keywords searched by the user, expressed as

    View: According to the key K, the history Hqis given, and the cloud server can only see the encrypted history.The viewincludes: an index I of the file set C, a trapdoor of the query keyword T1w′w′∈SPw,dand T2w′w′∈SYw, and a set C of the encrypted file, denoted as {e1,…,en}.

    Track: Given a history Hqand an encrypted file setcaptures the precise information learned by the cloud server, including the size of the encrypted file (|F1|,…,|Fn|), search result {FIDwi}, where wi=w, wi∈SYwor wi∈SPw,d.Pattern for each search ∏q[i,j] .∏q[i,j] is a symmetric matrix and stores the intersection of two sets ∏q1and ∏q2.∏q1and ∏q2are the intersection of the fuzzy note and the intersection ofthe synonym record, respectively:

    In general, the security strength of this solution is reflected in the fact that cloud servers cannot distinguish their views for two historical records with the same trajectory.In other words, the cloud server cannot extract more information content based on the information leaked in the query (i.e., the trajectory), so the solution is safe.The security conclusions of the fuzzy search scheme in this paper are explained in the following theorem.Since the fuzzy search scheme has been described in the above, the following conclusions are equally applicable to the instantiated fuzzy search.

    Theorem:This fuzzy keyword search scheme satisfies non-adaptive semantic security.

    Proof:To prove semantic security, we construct an emulator S with a trajectorywhich can simulate a viewwhich can fully simulate the viewof the cloud server for any q ∈N, any Hq, and a randomly chosen K.The security parameters l of the pseudo-random function f(key,?),and the size of FIDwiare known to S.

    T?: For 1 ≤i ≤τ|E|, S selects a random∈{0,1}land makes T?[i]=

    C*: For 1 ≤i ≤τ|E|, S selects a random∈{0,1}|FIDwi|and makes C?[i]=

    Due to the semantic security of symmetric encryption, it is impossible for an adversary to distinguish between eiandorandDue to the pseudorandomness of the trapdoor generation function, there is also no case where f(x,and a random stringcan be distinguished.Therefore, Vk(H0) andare indistinguishable.

    (1) Select α1random strings∈{0,1}land set them to

    (2) Select α1random strings∈{0,1}land set them to1 ≤k ≤α1

    (3) Set other τ-α1trapdoors to random value pairs∈{0,1}l×{0,1}l, where α1 ≤k ≤τ.

    (1) Select βjtrapdoors from the existing trapdoor setcorresponding to βjfile ID listsand then assign them to trapdoor simulation wj.

    (2) If αj>βj, S will create αj-βjrecords in the index I?using the same process as the simulation trapdoor.

    (3) S further checks ∏[i,j]q, where i <j, then finds γjtrapdoors from the already existing trapdoor set(no matches in index I?) and assigns them to the current trapdoor simulation wj.

    (4) Value pairs are randomly selected from {0,1}l×{0,1}lto assign values to the remaining τ-αj-γjtrapdoors.

    The correctness of the constructed view is easily demonstrated by searching for trapdoors built into the index.There is no case in this scenario where an attacker can distinguish betweenandMoreover, the simulated ciphertext uses a symmetric encryption scheme, and its semantic security determines that the ciphertext is indistinguishable.Indexes and trapdoors are also indistinguishable based on the nature of pseudo-random functions.Therefore, the proof theorem is correct.

    6 Experimental analysis

    6.1 Time and space consumption

    The fuzzy search scheme of Chinese keywords proposed in this paper introduces synonym and fuzzy phonetic words of Chinese keywords based on the existing search schemes.Therefore, the proposed scheme needs extra time and space to process keyword synonyms and fuzzy sounds in the scheme preprocessing stage and search stage.However, it is still at the same level of time complexity and space consumption as the original solution.The time complexity of the pre-processing stage index construction is only related to the number of keywords, i.e., O(τ|E|), the size of the index is also only related to the number of keywords, i.e., O(τ|E|).During the search, due to the support of multi-threading by the cloud server system, the retrieval of synonyms and fuzzy words can be realized at the same time, so it does not increase too much time consumption, and the time complexity of the search is O(τ|E|).

    6.2 Experimental comparison

    This paper uses the free cloud platform provided by Amazon as the experimental platform and uses the journal and magazine literature as the search object to conduct experiments and verification objects to verify the effectiveness and practicability of the project.When building an index, as the number of keywords increases, the CPU and memory usage gradually increases, and the time consumed increases accordingly.

    The time consumption of building an index is shown in Fig.2.

    The time consumption of keyword query is shown in Fig.3.

    Figure 2: The time consumption of index building

    The success rate of keyword query is shown in Fig.4.

    Figure 4: The comparison results of the success rate of keyword query

    It can be seen from the above experimental results that the proposed scheme realizes the storage of synonyms and fuzzy words of keywords by appropriately increasing storage.Although the scheme preprocessing and search time are increased, the success rate of the search is greatly improved.

    7 Conclusion

    According to the actual needs of users’ Chinese search in a cloud storage environment, this paper presents a fuzzy search strategy based on multi-keywords for encrypted cloud data.By constructing fuzzy sounds and synonym sets in the scheme, the fuzzy sounds and synonymous problems between the input text and the words that the user is looking for are well solved in the Chinese environment, and the pseudo-random function is used to effectively avoid the problem of information disclosed in the query process.Therefore, the scheme has high security, good practicability, and high search success rate.

    Figure 3: The time consumption of keyword query

    Acknowledgement:This work is supported in part by the Natural Science Foundation of China under Grants (Nos.61772281, U1636219, 61702235, 61502241, 61272421, 61232016, 61402235 and 61572258), in part by the National Key R&D Program of China(Grant Nos.2016YFB0801303 and 2016QY01W0105), in part by the Major Program of the National Social Science Fund of China under Grant (Nos.17ZDA092), in part by the Electronic Information and Control of Fujian University Engineering Research Center Fund under Grant (No.EIC1704), in part by the plan for Scientific Talent of Henan Province Grant (No.2018JR0018), in part by the Natural Science Foundation of Jiangsu Province, China under Grant (No.BK20141006), and in part by the Natural Science Foundation of the Universities in Jiangsu Province under Grant (No.14KJB520024), the PAPD fund and the CICAEET fund.This work is implemented at the 2011 Collaborative Innovation Center for Development and Utilization of Finance and Economics Big Data Property, Universities of Hunan Province, Open project, grant number 20181901CRP04.

    References

    Boneh, D.; Waters, B.(2007): Conjunctive, subset, and range queries on encrypted data.Proceedings of TCC’07, vol.4392, pp.535-554.

    Cao, N.; Wang, C.; Li, M.; Ren, K.; Lou, W.J.(2014): Privacy-preserving multikeyword ranked search over encrypted cloud data.IEEE Transactions on Parallel and Distributed Systems, vol.25, no.1, pp.222-233.

    Cheang, C.F.; Wang, Y.; Cai, Z.; Xu, G.(2018): Multi-VMs intrusion detection for cloud security using dempster-shafer theory.Computers, Materials & Continua, vol.57, no.2, pp.297-306.

    Chen, C.; Shen, P.; Hu, J.; Guo, S.; Tari, Z.et al.(2016): An efficient privacypreserving ranked keyword search method.IEEE Transactions on Parallel and Distributed Systems, vol.27, no.4, pp.951-963.

    Fu, Z.; Shu, J.; Sun, X.(2014): Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data.IEEE Transactions on Consumer Electronics, vol.60, no.4, pp.762-770.

    Hore, B.; Mehrotra, S.; Canim, M.; Kantarcioglu, M.(2012): Secure multidimensional range queries over outsourced data.The VLDB Journal, vol.21, no.3, pp.333-358.

    Li, C.; Zhang, X.(2013): Research on benchmark-based HPC in cloud.Computer Science, vol.40, no.6, pp.23-30.

    Li, F.; Wu, C.; Yuan, X.(2016): Multi-keyword ranked fuzzy search over encrypted data in cloud supporting dynamic update.Journal of Computational and Theoretical Nanoscience, vol.13, no.12, pp.9705-9709.

    Lucas, B.; Seny, K.; Fabian, M.(2005): Achieving efficient conjunctive keyword searches over encrypted data.Proceedings of the International Conference on Information and Communications Security, vol.3783, pp.414-426.

    Patnaik, L.M.(2016): DRSMS: domain and range specific multi-keyword search over encrypted cloud data.International Journal of Computer Science and Information Security, vol.14, no.5, pp.69-78.

    Raghavendra, S.; Girish, S.; Geeta, C.M.(2018): Split keyword fuzzy and synonym search over encrypted cloud data.Multimedia Tools and Applications, vol.77, no.8, pp.10135-10156.

    Shen, J.; Wang, C.; Li, T.; Chen, X.; Huang, X.et al.(2018): Secure data uploading scheme for a smart home system.Information Sciences, vol.453, no.7, pp.186-197.

    Song, D.; Wagner, D.; Perrig, A.(2000): Practical techniques for searching on encrypted data.Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp.44-55.

    Wang, C.; Cao, N.; Li, J.(2010): Secure ranked keyword search over encrypted cloud data.Proceedings of the IEEE International Conference on Distributed Computing Systems, pp.253-262.

    Wang, J.; Chen, X.; Li, J.; Zhao, J.; Shen, J.(2017): Towards achieving flexible and verifiable search for outsourced database in cloud computing.Future Generation Computer Systems, vol.67, no.2, pp.266-275.

    猜你喜歡
    微機電腦計算機
    電腦
    電腦節(jié)來了
    電腦能夠自己思考嗎?
    計算機操作系統(tǒng)
    基于計算機自然語言處理的機器翻譯技術(shù)應(yīng)用與簡介
    科技傳播(2019年22期)2020-01-14 03:06:34
    TDJ微機可控頂調(diào)速系統(tǒng)在平頂山東站的應(yīng)用
    信息系統(tǒng)審計中計算機審計的應(yīng)用
    電力系統(tǒng)微機保護裝置的抗干擾措施
    強化學(xué)習(xí)及其在電腦圍棋中的應(yīng)用
    Fresnel衍射的計算機模擬演示
    久久精品影院6| 不卡av一区二区三区| 中文字幕高清在线视频| 国产激情偷乱视频一区二区| 窝窝影院91人妻| 免费一级毛片在线播放高清视频| 日日夜夜操网爽| 精品国产乱子伦一区二区三区| 免费在线观看日本一区| 成人欧美大片| 在线国产一区二区在线| 久久久久免费精品人妻一区二区| 欧美精品啪啪一区二区三区| 亚洲一区二区三区色噜噜| 一进一出抽搐gif免费好疼| 神马国产精品三级电影在线观看| 一进一出抽搐gif免费好疼| 一级a爱片免费观看的视频| 99久久精品热视频| 国产三级黄色录像| 精品免费久久久久久久清纯| 日本 欧美在线| 日本一二三区视频观看| 久久久色成人| 欧美黑人巨大hd| 国产久久久一区二区三区| 国产亚洲精品一区二区www| 一a级毛片在线观看| 免费看a级黄色片| 欧美日韩中文字幕国产精品一区二区三区| 亚洲美女黄片视频| 人妻久久中文字幕网| 日韩精品中文字幕看吧| 精品不卡国产一区二区三区| 成人精品一区二区免费| 两个人视频免费观看高清| 国产伦在线观看视频一区| 亚洲五月天丁香| 在线观看免费视频日本深夜| 亚洲电影在线观看av| 人妻夜夜爽99麻豆av| 亚洲精品在线观看二区| 色在线成人网| 免费电影在线观看免费观看| 啦啦啦观看免费观看视频高清| 51午夜福利影视在线观看| 中文字幕人妻丝袜一区二区| 国产一区二区激情短视频| 99国产精品一区二区蜜桃av| 日韩高清综合在线| 欧美日韩一级在线毛片| 成人av在线播放网站| 啪啪无遮挡十八禁网站| 日日干狠狠操夜夜爽| avwww免费| 欧美在线黄色| 老熟妇乱子伦视频在线观看| 亚洲第一电影网av| 99热这里只有精品一区 | 熟女电影av网| 亚洲天堂国产精品一区在线| av黄色大香蕉| 成人av在线播放网站| 成人午夜高清在线视频| 免费人成视频x8x8入口观看| 精华霜和精华液先用哪个| 国产乱人视频| 亚洲av片天天在线观看| 日韩有码中文字幕| 一个人观看的视频www高清免费观看 | 日本黄色片子视频| 日韩高清综合在线| 一个人免费在线观看的高清视频| 2021天堂中文幕一二区在线观| 神马国产精品三级电影在线观看| 久久欧美精品欧美久久欧美| 精品电影一区二区在线| 亚洲中文字幕一区二区三区有码在线看 | 一级毛片高清免费大全| 女生性感内裤真人,穿戴方法视频| 日韩国内少妇激情av| 香蕉av资源在线| 97超级碰碰碰精品色视频在线观看| 黄片小视频在线播放| 黑人巨大精品欧美一区二区mp4| 国产av麻豆久久久久久久| 欧美成狂野欧美在线观看| 久久精品影院6| 午夜福利高清视频| 天堂av国产一区二区熟女人妻| 午夜激情福利司机影院| 亚洲av日韩精品久久久久久密| 国产精品99久久99久久久不卡| 国产精品 欧美亚洲| 午夜精品在线福利| 久久久精品欧美日韩精品| 一进一出抽搐gif免费好疼| 成人精品一区二区免费| 99久久成人亚洲精品观看| 国产高清有码在线观看视频| 国产私拍福利视频在线观看| 国产一区二区三区视频了| 日韩欧美在线乱码| 成熟少妇高潮喷水视频| 两性夫妻黄色片| 偷拍熟女少妇极品色| 美女午夜性视频免费| 国产精品98久久久久久宅男小说| 啦啦啦观看免费观看视频高清| 午夜精品久久久久久毛片777| 露出奶头的视频| 人人妻,人人澡人人爽秒播| 麻豆成人av在线观看| 亚洲中文日韩欧美视频| 可以在线观看的亚洲视频| 国产一区二区在线av高清观看| 亚洲欧美日韩无卡精品| 国产精品久久久久久久电影 | 99精品久久久久人妻精品| 91在线精品国自产拍蜜月 | 一级a爱片免费观看的视频| 国产99白浆流出| 亚洲成av人片在线播放无| 国产高清videossex| 国产淫片久久久久久久久 | 国产亚洲精品久久久com| 国产三级黄色录像| 欧美在线黄色| 麻豆久久精品国产亚洲av| 国产亚洲精品av在线| 久久久久精品国产欧美久久久| 一级作爱视频免费观看| 18禁美女被吸乳视频| 久久这里只有精品中国| 欧美日韩精品网址| 成人一区二区视频在线观看| 午夜激情福利司机影院| 精品免费久久久久久久清纯| 久久久国产精品麻豆| 波多野结衣高清作品| 嫩草影视91久久| 激情在线观看视频在线高清| 亚洲成av人片在线播放无| 国产又黄又爽又无遮挡在线| 国产视频内射| tocl精华| 国产精品98久久久久久宅男小说| 国产一区二区在线av高清观看| 99久久综合精品五月天人人| 精品国产美女av久久久久小说| 91九色精品人成在线观看| 国产一区二区在线观看日韩 | 黄片小视频在线播放| 久久精品夜夜夜夜夜久久蜜豆| 亚洲天堂国产精品一区在线| 亚洲七黄色美女视频| 国产一区二区激情短视频| 99久久久亚洲精品蜜臀av| 精品国内亚洲2022精品成人| 国产淫片久久久久久久久 | 热99在线观看视频| 国内精品美女久久久久久| 亚洲自偷自拍图片 自拍| 色av中文字幕| 999久久久精品免费观看国产| 久99久视频精品免费| 亚洲国产欧美人成| 色在线成人网| 国产99白浆流出| 亚洲中文日韩欧美视频| 亚洲无线观看免费| 亚洲成av人片在线播放无| 国产精品野战在线观看| 亚洲欧美日韩高清在线视频| 啦啦啦韩国在线观看视频| 级片在线观看| 婷婷丁香在线五月| 国产亚洲欧美98| 国产美女午夜福利| 久久久久久久精品吃奶| АⅤ资源中文在线天堂| 免费高清视频大片| 午夜免费观看网址| 一a级毛片在线观看| 一二三四在线观看免费中文在| 99久久国产精品久久久| 制服丝袜大香蕉在线| 久久久成人免费电影| 午夜福利在线在线| 亚洲 欧美 日韩 在线 免费| 757午夜福利合集在线观看| 老司机深夜福利视频在线观看| 日本一本二区三区精品| 久久久国产成人精品二区| 欧美成狂野欧美在线观看| 亚洲精华国产精华精| 禁无遮挡网站| 国产麻豆成人av免费视频| 1024手机看黄色片| 性色av乱码一区二区三区2| 黄片小视频在线播放| 免费电影在线观看免费观看| 成人国产一区最新在线观看| 婷婷精品国产亚洲av| 99国产精品99久久久久| 级片在线观看| 日本撒尿小便嘘嘘汇集6| 男人的好看免费观看在线视频| 99国产综合亚洲精品| 国产成人福利小说| 日韩欧美三级三区| 国产成年人精品一区二区| 精品久久久久久,| 国产精品久久久久久亚洲av鲁大| 国产视频一区二区在线看| 欧美精品啪啪一区二区三区| 人人妻人人看人人澡| 夜夜躁狠狠躁天天躁| 欧美极品一区二区三区四区| 久99久视频精品免费| 两性夫妻黄色片| 18美女黄网站色大片免费观看| 免费大片18禁| 免费观看人在逋| 国产精品自产拍在线观看55亚洲| 欧美性猛交黑人性爽| 长腿黑丝高跟| 黄色女人牲交| 国产欧美日韩一区二区三| 热99在线观看视频| 精品人妻1区二区| 老熟妇仑乱视频hdxx| 好男人电影高清在线观看| 国产毛片a区久久久久| 国产精品久久久人人做人人爽| 国产亚洲精品久久久久久毛片| 午夜免费观看网址| 国产精华一区二区三区| 久久草成人影院| 搡老熟女国产l中国老女人| 日本免费一区二区三区高清不卡| 此物有八面人人有两片| 亚洲精品粉嫩美女一区| 别揉我奶头~嗯~啊~动态视频| 伦理电影免费视频| 免费无遮挡裸体视频| 久久精品aⅴ一区二区三区四区| 国产精品女同一区二区软件 | 十八禁人妻一区二区| 欧美3d第一页| 91在线观看av| 色哟哟哟哟哟哟| 国产黄a三级三级三级人| 三级毛片av免费| 日日摸夜夜添夜夜添小说| 精品久久久久久,| 国产精品久久久久久人妻精品电影| 亚洲欧美精品综合久久99| 精品福利观看| 国产一区二区在线观看日韩 | 国产一区二区在线av高清观看| 午夜免费激情av| 亚洲欧洲精品一区二区精品久久久| 少妇熟女aⅴ在线视频| 亚洲成人久久爱视频| 亚洲人与动物交配视频| 在线观看免费午夜福利视频| 啦啦啦韩国在线观看视频| 午夜影院日韩av| 男女视频在线观看网站免费| 天堂影院成人在线观看| 网址你懂的国产日韩在线| 久久这里只有精品中国| 免费搜索国产男女视频| 美女高潮的动态| 国产伦精品一区二区三区四那| 国产乱人视频| 琪琪午夜伦伦电影理论片6080| 一本久久中文字幕| 国产高清三级在线| 国产乱人伦免费视频| 欧美黄色片欧美黄色片| 亚洲人成电影免费在线| 成人精品一区二区免费| 免费看a级黄色片| 亚洲五月天丁香| 一本精品99久久精品77| 麻豆成人av在线观看| 丰满人妻一区二区三区视频av | 午夜福利成人在线免费观看| 两性夫妻黄色片| 一级毛片女人18水好多| 亚洲人成网站在线播放欧美日韩| 香蕉av资源在线| 丝袜人妻中文字幕| 国产久久久一区二区三区| 在线a可以看的网站| 亚洲精品粉嫩美女一区| 免费在线观看成人毛片| 日日摸夜夜添夜夜添小说| 18禁观看日本| 亚洲无线在线观看| 国内精品久久久久久久电影| 欧美绝顶高潮抽搐喷水| 黄色女人牲交| 国产淫片久久久久久久久 | 90打野战视频偷拍视频| 免费观看人在逋| 亚洲天堂国产精品一区在线| 老熟妇仑乱视频hdxx| 69av精品久久久久久| 欧美大码av| www.自偷自拍.com| 最近视频中文字幕2019在线8| 男人和女人高潮做爰伦理| 91在线观看av| 九九久久精品国产亚洲av麻豆 | 国产综合懂色| 大型黄色视频在线免费观看| 国产黄色小视频在线观看| 亚洲成a人片在线一区二区| 不卡av一区二区三区| 丰满的人妻完整版| 在线观看日韩欧美| 国产激情偷乱视频一区二区| 美女大奶头视频| 国产成人精品久久二区二区91| 久久久久久久久免费视频了| 男人舔女人的私密视频| 狠狠狠狠99中文字幕| svipshipincom国产片| 久久久色成人| 久久精品亚洲精品国产色婷小说| 国产成人系列免费观看| 男女视频在线观看网站免费| 丁香六月欧美| av国产免费在线观看| 两性夫妻黄色片| 国产成人aa在线观看| 亚洲avbb在线观看| 又紧又爽又黄一区二区| 国产成人福利小说| 国产v大片淫在线免费观看| 成年版毛片免费区| 九九久久精品国产亚洲av麻豆 | 毛片女人毛片| 日日摸夜夜添夜夜添小说| 国产精品av视频在线免费观看| 狂野欧美白嫩少妇大欣赏| 亚洲成av人片在线播放无| 两个人的视频大全免费| 国产黄a三级三级三级人| 国产精品美女特级片免费视频播放器 | 国产高清视频在线观看网站| av女优亚洲男人天堂 | 神马国产精品三级电影在线观看| 久久亚洲精品不卡| 国产成人影院久久av| 99久久综合精品五月天人人| h日本视频在线播放| 欧美在线黄色| 毛片女人毛片| 亚洲精品456在线播放app | 精品久久久久久久毛片微露脸| 久久久久九九精品影院| 99精品在免费线老司机午夜| 三级国产精品欧美在线观看 | 真实男女啪啪啪动态图| 每晚都被弄得嗷嗷叫到高潮| 91av网站免费观看| 日本一二三区视频观看| 一级毛片高清免费大全| 12—13女人毛片做爰片一| 亚洲精品国产精品久久久不卡| 又大又爽又粗| 在线播放国产精品三级| 日本黄大片高清| 国产精品免费一区二区三区在线| 欧美日韩一级在线毛片| 看黄色毛片网站| 亚洲国产精品999在线| 国产成人福利小说| 色综合欧美亚洲国产小说| 久久久久久久久中文| 亚洲 国产 在线| 日日干狠狠操夜夜爽| 成年女人毛片免费观看观看9| 国产探花在线观看一区二区| 五月伊人婷婷丁香| 日韩av在线大香蕉| 国产高清videossex| 国产乱人视频| 日韩欧美一区二区三区在线观看| 丰满人妻一区二区三区视频av | 怎么达到女性高潮| 精品99又大又爽又粗少妇毛片 | 国产久久久一区二区三区| 亚洲真实伦在线观看| 久久性视频一级片| 亚洲成a人片在线一区二区| 久久久久久九九精品二区国产| 99riav亚洲国产免费| 国产伦精品一区二区三区四那| 久久久久久人人人人人| 18禁美女被吸乳视频| 精品午夜福利视频在线观看一区| 女人被狂操c到高潮| 国产午夜精品论理片| 国产精品99久久久久久久久| 欧美黄色片欧美黄色片| 桃红色精品国产亚洲av| 一级毛片精品| 超碰成人久久| 天天躁狠狠躁夜夜躁狠狠躁| 成人午夜高清在线视频| 九色国产91popny在线| 中文字幕久久专区| 国产免费av片在线观看野外av| 欧美黑人巨大hd| 欧美日韩一级在线毛片| 女人被狂操c到高潮| 一区二区三区高清视频在线| 久久精品国产清高在天天线| 99精品久久久久人妻精品| xxx96com| 欧美激情久久久久久爽电影| 久久99热这里只有精品18| 久久久久久久午夜电影| 俺也久久电影网| 精品一区二区三区av网在线观看| 色在线成人网| 国产欧美日韩一区二区三| 十八禁人妻一区二区| xxx96com| 亚洲va日本ⅴa欧美va伊人久久| 国产精品日韩av在线免费观看| 亚洲精华国产精华精| 在线免费观看不下载黄p国产 | 亚洲色图 男人天堂 中文字幕| 色综合婷婷激情| 午夜影院日韩av| 1024手机看黄色片| 淫妇啪啪啪对白视频| 此物有八面人人有两片| 久久精品夜夜夜夜夜久久蜜豆| 亚洲精品在线美女| 久久香蕉国产精品| tocl精华| 国产黄片美女视频| 国产私拍福利视频在线观看| а√天堂www在线а√下载| 国产人伦9x9x在线观看| 黄色日韩在线| 久久中文字幕人妻熟女| 国产成人欧美在线观看| 国产亚洲精品一区二区www| 国产私拍福利视频在线观看| 亚洲人成电影免费在线| 国产精品国产高清国产av| 草草在线视频免费看| 中出人妻视频一区二区| 99国产精品一区二区三区| 亚洲18禁久久av| 国产人伦9x9x在线观看| 亚洲成人久久性| 黄片大片在线免费观看| 成人永久免费在线观看视频| 国产又色又爽无遮挡免费看| 久久这里只有精品19| 99精品在免费线老司机午夜| 国产精品香港三级国产av潘金莲| 极品教师在线免费播放| 窝窝影院91人妻| 老熟妇仑乱视频hdxx| 免费电影在线观看免费观看| 成人av在线播放网站| 免费看日本二区| 男人舔奶头视频| 国产精品久久久久久人妻精品电影| 搡老熟女国产l中国老女人| 亚洲国产精品sss在线观看| 亚洲欧美一区二区三区黑人| 国产高清三级在线| 中文亚洲av片在线观看爽| 亚洲精品在线观看二区| 性色avwww在线观看| 脱女人内裤的视频| 麻豆国产97在线/欧美| 很黄的视频免费| 国产精品99久久99久久久不卡| 女生性感内裤真人,穿戴方法视频| 一级作爱视频免费观看| 搞女人的毛片| 久久中文字幕人妻熟女| 国产麻豆成人av免费视频| 久久久久免费精品人妻一区二区| 哪里可以看免费的av片| 亚洲第一欧美日韩一区二区三区| 中文亚洲av片在线观看爽| or卡值多少钱| 免费一级毛片在线播放高清视频| 成人国产综合亚洲| 亚洲欧美一区二区三区黑人| 精品日产1卡2卡| 日韩国内少妇激情av| 欧美性猛交╳xxx乱大交人| 99热这里只有精品一区 | 1024香蕉在线观看| 精品国产乱码久久久久久男人| 国产成+人综合+亚洲专区| 黑人巨大精品欧美一区二区mp4| 国产又色又爽无遮挡免费看| 亚洲欧美激情综合另类| 脱女人内裤的视频| 五月玫瑰六月丁香| 国产成人av教育| av福利片在线观看| 久久久久久国产a免费观看| 免费观看精品视频网站| 色在线成人网| a级毛片在线看网站| 免费无遮挡裸体视频| 欧美一区二区国产精品久久精品| 中文字幕久久专区| 色噜噜av男人的天堂激情| 性欧美人与动物交配| 午夜两性在线视频| 美女黄网站色视频| 久久久久国产一级毛片高清牌| 免费看光身美女| 国产私拍福利视频在线观看| 午夜成年电影在线免费观看| 国产精品98久久久久久宅男小说| 日本a在线网址| 丰满人妻熟妇乱又伦精品不卡| 欧美在线黄色| 国产美女午夜福利| www.自偷自拍.com| 亚洲黑人精品在线| 首页视频小说图片口味搜索| 久久伊人香网站| 国产综合懂色| www日本在线高清视频| 国产精品,欧美在线| 精品欧美国产一区二区三| 久久精品91蜜桃| 床上黄色一级片| 欧美色欧美亚洲另类二区| av中文乱码字幕在线| 国模一区二区三区四区视频 | 伊人久久大香线蕉亚洲五| 香蕉丝袜av| 精品一区二区三区av网在线观看| 88av欧美| 法律面前人人平等表现在哪些方面| 中文字幕人成人乱码亚洲影| 三级毛片av免费| 变态另类成人亚洲欧美熟女| 久久久久国内视频| 精品国内亚洲2022精品成人| 日韩成人在线观看一区二区三区| 97超级碰碰碰精品色视频在线观看| 国产精品1区2区在线观看.| 母亲3免费完整高清在线观看| 成人亚洲精品av一区二区| 波多野结衣高清无吗| 99热6这里只有精品| 又紧又爽又黄一区二区| 日韩高清综合在线| 特级一级黄色大片| 亚洲av熟女| 欧洲精品卡2卡3卡4卡5卡区| 999精品在线视频| 俺也久久电影网| 免费看光身美女| 男女视频在线观看网站免费| 亚洲国产日韩欧美精品在线观看 | 日日夜夜操网爽| 亚洲片人在线观看| 可以在线观看的亚洲视频| 亚洲精品一卡2卡三卡4卡5卡| 亚洲五月婷婷丁香| 亚洲午夜理论影院| 欧美黄色片欧美黄色片| 99久久精品一区二区三区| 久久香蕉国产精品| 亚洲人成网站高清观看| 国产高清激情床上av| 女警被强在线播放| 精品不卡国产一区二区三区| 俺也久久电影网| 免费无遮挡裸体视频| 麻豆av在线久日| 99国产精品99久久久久| av在线天堂中文字幕| av黄色大香蕉| 久久久水蜜桃国产精品网| 久久久久久久久免费视频了| 琪琪午夜伦伦电影理论片6080| 国产v大片淫在线免费观看| 国产精品久久久久久精品电影| 99久久精品国产亚洲精品| 欧美在线黄色| 久久久久性生活片| 少妇熟女aⅴ在线视频| 亚洲av美国av| 青草久久国产| 神马国产精品三级电影在线观看| 狠狠狠狠99中文字幕| 一级黄色大片毛片| 天天一区二区日本电影三级| 日本a在线网址| 国产免费男女视频| 久久亚洲真实| 亚洲在线自拍视频|