Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for carrying out k anonymity updating on encrypted inverted index table

An inverted index table, unencrypted technology, applied in special data processing applications, instruments, electrical digital data processing, etc., can solve the problems affecting the purpose of confidentiality, exacerbation, etc.

Inactive Publication Date: 2013-01-23
NEC (CHINA) CO LTD
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] An obvious flaw of this update process is that although both are in encrypted form, the storage server will learn the reference relationship between the updated row within the EIIT and the ETD
[0012] As the number of updates increases, the above problems will be exacerbated, and even seriously affect the purpose of secrecy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for carrying out k anonymity updating on encrypted inverted index table
  • Method and device for carrying out k anonymity updating on encrypted inverted index table
  • Method and device for carrying out k anonymity updating on encrypted inverted index table

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0061]With respect to the first embodiment, for a given security parameter k, when the size of the row set (=n) is set to n≥k, a curious but honest attacker identifies the target row from the updated row set RS The probability is at most 1 / k, where n and k are positive integers.

[0062] Fig. 4 and Fig. 5 are schematic diagrams explaining the k anonymous update method and device according to the first embodiment of the present invention. FIG. 4 shows a block diagram in the case of addition, and FIG. 5 shows a block diagram in the case of deletion.

[0063] AIM in the first embodiment

[0064] Adds a dummy data item to each of the other n-1 dummy rows while adding a new data item to the target row. Therefore, the length of all n lines is increased by 1, although the encrypted data in all n lines has changed.

[0065] For the case of adding a new data item in the first embodiment, various components are described below in conjunction with FIG. 4 .

[0066] (1) The RS obtai...

no. 2 example

[0091] In the case of adding a new data item, in the first embodiment, n-1 dummy data items will be added; in the case of deleting an encrypted data item, in the first embodiment, a dummy data item will be added . To improve space efficiency, fewer dummy data items should be introduced while maintaining the same security strength.

[0092] In the second embodiment, in order to satisfy that for a given security parameter k, the probability of a curious but honest attacker identifying a target row from an updated RS is at most 1 / k, for addition, the size of RS (=n) set to And for deletion, the size of RS is set to n≧k. Here, n and k are positive integers, e is a mathematical constant (also known as "Euler's constant", e≈2.71828), is the rounding up function, Indicates the smallest integer greater than or equal to X.

[0093] Fig. 7 and Fig. 8 are schematic diagrams explaining the k anonymous update method and device according to the second embodiment of the present inven...

no. 3 example

[0121] In the second embodiment, the number of dummy data items remains constant whether a new data item is added or an encrypted data item is deleted. Space efficiency can be further improved if certain conditions are met. The key idea of ​​the third embodiment is the same as that of the second embodiment except for the following additional adjustment process.

[0122] adjustment process

[0123] It is assumed that s is the common number of dummy data items in all current n rows, that is, each row contains at least s dummy data items. If s-1 ≥ 1 and the current length of each row is at least s+1, remove s-1 dummy data items from each row.

[0124] After the adjustment process, the probability that each row still satisfies that the row is the target row is at most 1 / k.

[0125] Fig. 10 and Fig. 11 are schematic diagrams explaining the method and apparatus for k anonymous update according to the third embodiment of the present invention. FIG. 10 shows a block diagram in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a device for carrying out k anonymity updating on an encrypted inverted index table. The method comprises the following steps of: acquiring n rows of encrypted data items from external storage equipment; decrypting the n rows of encrypted data items to n rows of decrypted data items; updating one target row in the n rows of decrypted data items, and executing pseudo-operation on each row in the other n-1 rows of decrypted data items to form n rows of updating data items; encrypting the n rows of updating data items to n rows of updating encrypted data items; suploading the n rows of updating encrypted data items to the external storage equipment, wherein n is determined to be not less than k by a preset safety parameter k, and n and k are positive integers.

Description

technical field [0001] The present invention relates to the technical field of information update, and more specifically, to a method and device for performing k-anonymous update on an encrypted inverted index table. Given n rows of data items, each row has an encrypted key as an index, and one or more encrypted data items. Assume that one of the n rows of data items is selected as the target row to be modified, that is, a new encrypted data item is to be added to the row, or an encrypted data item is to be deleted from the row. The purpose of the present invention is to achieve k-anonymity, i.e., a curious but honest attacker who observes the n rows of data items before and after modification will be able to identify which row is the target row with probability at most 1 / k, where k is the predefined security parameters. Background technique [0002] Two trends are emerging, namely, the general concern for protecting the privacy of individuals and the provision of personal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/30G06F21/60G06F21/62
Inventor 雷浩曾珂福岛俊一田野王利明
Owner NEC (CHINA) CO LTD