[1]Zhang Y,Sun Y.Cloud storage management technology [C]// Proceedings of the 2nd International Conference on Information and Computing Science.Washington,DC,2009:309-311. [2]Hacigümüs H,Iyer B,Mehrotra S.Providing database as a service[C]// Proceedings of the 18th International Conference on Data Engineering.Washington,DC,2002:29-38. [3]新京报.50亿条公民信息泄露,京东前员工牵涉其中[EB/OL].[2017-03-11].http://www.chinanews.com/sh/2017/03-11/8171115.shtml.(The Beijing News.5 billion citizens’ information disclosure,former staff of Jingdong involved in [EB/OL].[2017-03-11].http://www.chinanews.com/sh/2017/03-11/8171115.shtml.) [4]Wood C,Fernandez E B,Summers R C.Database security:requirements,policies,and models[J].IBM Systems Journal,1980,19(2):229-252. [5]Song D X,Wagner D,Perrig A.Practical techniques for searches on encrypted data[C]// Proceedings of the 2000 IEEE Symposium on Security and Privacy.Washington,DC,2000:44-55. [6]Agrawal R,Kiernan J,Srikant R,et al.Order preserving encryption for numeric data[C]// Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data.New York,2004:563-574. [7]Amanatidis G,Boldyreva A,O’Neill A.Provably-secure schemes for basic query support in outsourced databases[C]// Proceedings of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security.Redondo Beach,2007:14-30. [8]刘念.DAS模型中的数据库加密与密文检索研究[D].北京:北京邮电大学,2010.(Liu Nian.The study of database encryption and cipher text query in DAS[D].Beijing:Beijing University of Posts and Telecommunications,2010.) [9]Popa R A,Redfield C,Zeldovich N,et al.CryptDB:protecting confidentiality with encrypted query processing[C]// Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles.New York,2011:85-100. [10]Hang I,Kerschbaum F,Damiani E.ENKI:access control for encrypted query processing [C]// Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data.Melbourne,2015:183-196. [11]Poddar R,Boeltert T,Popa R A.Arx:a strongly encrypted database system[EB/OL].[2016-06-07].https://eprint.iacr.org/2016/591.pdf. [12]Paillier P.Public-key cryptosystems based on composite degree residuosity classes[C]// Advances in Cryptology—EUROCRYPT’99.Prague,1999:223-238. [13]Popa R A,Li F H,Zeldovich N.An ideal-security protocol for order-preserving encoding[C]// Proceedings of the 2013 IEEE Symposium on Security and Privacy.Washington,DC,2013:463-477. [14]Kushilevitz E,Ostrovsky R.Replication is not needed:single database,computationally-private information retrieval[C]// Proceedings of the 38th Annual Symposium on Foundations of Computer Science.Washington,DC,1997:364-373. [15]Popa R A.Building practical systems that compute on encrypted data[D].Cambridge,MA:MIT,2014.