机构地区:[1]School of Cyberspace Security,Information Engineering University,Zhengzhou 450001,China [2]Henan Key Laboratory of Network Cryptography Technology,Zhengzhou 450001,China [3]Institute of Security Technology,Beijing 100191,China [4]Shanghai Key Laboratory of Trustworthy Computing,East China Normal University,Shanghai 200062,China [5]Cyberspace Security Research Center,Peng Cheng Laboratory,Shenzhen 518055,China [6]Shanghai Institute of Intelligent Science and Technology,Tongji University,Shanghai 200062,China
出 处:《Science China(Information Sciences)》2022年第10期69-102,共34页中国科学(信息科学)(英文版)
基 金:supported by National Key Research and Development Project(Grant No.2020YFA0712300);National Natural Science Foundation of China(Grants Nos.61772548,61632012);Foundation of Science and Technology on Information Assurance Laboratory(Grant No.KJ-17-001);Peng Cheng Laboratory Project of Guangdong Province(Grant No.PCL2018KP004)。
摘 要:Big data drive multidimensional convergence and profound innovations among industries and provide novel ways of exploring the world.As they significantly create economic and social value,big data meaningfully impact the implementation and management of information security and privacy protection.Cryptographic technologies are used to protect the security and entire life cycle of big data.The demand for this technology is multiplied when the data are stored in the cloud.They are stored in the cloud in the form of ciphertext,and the driving requirement for data retrieval,sharing,and manipulation places the security of data at risk.The all-or-nothing approach of traditional cryptography systems cannot realize the release and processing of data information with flexible and increasingly fine granularity.Consequently,dealing with the relationship between privacy protection and data utilization,as well as navigating the blurry boundaries between subverting either plaintext or ciphertext,has become a research focus of the current cryptographic trend for protecting big data security.Presently,there are many studies designed to solve these limitations.First,security requirements and source encryption mode for future big data systems and applications are elaborated.Then,focusing on the practical security and functionality of the big data life cycle,including storage,retrieval,sharing,calculation,statistical analysis,and utilization,the research being conducted based on those functions is reviewed.For each cryptographic technology that meets the requirement of each type of big data security or application,security and efficiency comments and sufficient comparison analyses of cryptography schemes or protocols are provided;moreover,the current general problems and development trends are expounded.Because the current innovative research on cryptographic technology was primarily based on the development or improvement of a single solution,the study on the security of the entire big data life cycle from a holistic perspective is
关 键 词:big data security cryptographic techniques ciphertext-based data sharing and computing authenticated encryption functional encryption homomorphic encryption secure multi-party computing
分 类 号:TN918.1[电子电信—通信与信息系统]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...