Efficient verified fuzzy key word searching method based on cloud data subcontract system

A technology of keyword search and cloud data, which is applied in the field of cloud computing security, can solve the problem of not considering the verifiability of keyword search, etc., and achieve the effect of high efficiency, completeness and correctness

Active Publication Date: 2013-02-20
陕西矩阵风云数据安全有限责任公司
View PDF2 Cites 51 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this solution only supports exact keyword searches
In 2010, Li et al. proposed a fuzzy key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient verified fuzzy key word searching method based on cloud data subcontract system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Below by embodiment the present invention will be further described:

[0018] Based on the efficient and verifiable fuzzy keyword search method of the cloud data outsourcing system, the cloud data outsourcing system is constructed firstly, the cloud data outsourcing system includes the data owner, the authorized user and the cloud server. by A collection of encrypted data files and exact key set , which is scanned by the data owner to encrypt the document Then create a precise keyword set , the data owner outsources the encrypted files to the server and gets the address of each document , for all sets containing exact keywords The corresponding exact keywords in The file of the document records its address set as: , It is an integer greater than or equal to 1, and the cloud server can provide encrypted document sets for authorized users The fuzzy keyword search service on the cloud, and the data owners and authorized users have been assigned their co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided is an efficient verified fuzzy key word searching method based on a cloud data subcontract system. The efficient verified fuzzy key word searching method includes: by constructing the cloud data subcontract system, data owners operate a key generation module to generate index generated keys and encryption keys and operate an index building module to build indexes, authorized users operate a trap door generation module to generate a trap door set of all fuzzy key words, wherein fuzzy key words corresponding to accurate key words in concentrated mode are concentrated in the trap door set, the authorized users transmit the trap door set to a cloud server which starts a searching module to perform search on an index tree and return address sets and proof sets of all files containing all given fuzzy key words, finally the authorized user operate a verification module to check whether the cloud server is honest, wherein the fuzzy key words are successfully searched and the cloud server is honest if the verification passes, otherwise, the fuzzy key words are failed in search and the server is not honest. The efficient verified fuzzy key word searching method supports fuzzy key word searching and can verify the searching results.

Description

technical field [0001] The invention belongs to the field of cloud computing security, and relates to outsourced computing and searchable encryption. Specifically, a new verifiable fuzzy keyword search scheme is proposed, which can be used to securely and effectively key ciphertext in cloud computing. word search. Background technique [0002] With the popularity of cloud computing, storage outsourcing has been widely used to reduce data maintenance or backup costs. By outsourcing data to the cloud, data owners can obtain high-quality data storage services while reducing the burden of data storage and maintenance. In order to securely store outsourced data on untrusted cloud servers, sensitive data must be encrypted before being outsourced. However, this makes it very tricky for data owners to efficiently search encrypted data on the server. Downloading the entire database for decryption is obviously impractical due to the enormous communication and computational costs re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08G06F17/30
Inventor 王剑锋党晓陈晓峰朱辉马华
Owner 陕西矩阵风云数据安全有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products