Encryption and search method for revocable keyword search public keys in cloud storage

A public key encryption and keyword technology, applied in the field of network security, can solve the problems of long response time of search requests, many bilinear pairing operations, low search efficiency, etc., to solve the problem of revocation and less bilinear pairing operations , the effect of improving search efficiency

Inactive Publication Date: 2013-04-03
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF2 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] (3) The search speed is slow, and the search request response time is long;
[0011] (4) The search efficiency is low, and there are many bilinear pairing operations
[0012] Among them, the first two problems pose a great threat to the safe storage of user cloud data, while the latter two problems greatly consume the computing resources of the cloud server, making it impossible to respond to a large number of user search requests at the same time, causing users to wait too long, so are all to be avoided

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and search method for revocable keyword search public keys in cloud storage
  • Encryption and search method for revocable keyword search public keys in cloud storage
  • Encryption and search method for revocable keyword search public keys in cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.

[0043] Any feature disclosed in this specification (including any appended claims, abstract and drawings), unless expressly stated otherwise, may be replaced by alternative features which are equivalent or serve a similar purpose. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.

[0044] The present invention is based on the theory of elliptic curve cryptography, and proposes a revocable keyword search public key encryption method in secure cloud storage, which is applied to the cloud storage environment with high security requirements, and the user can revoke the search ability of the cloud server when necessary , reducing computing overhead, shortening the response time of search requests, and realizing secure search ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption and search method for revocable keyword search public keys in cloud storage and belongs to the technical field of network security. The method includes: setting system public parameters and dividing system time into z time segments, and creating a public-private key pair at a client; when data storage requests occurs, selecting a keyword collection of a data file, selecting optional symmetrical encryption algorithm to encrypt the data file, utilizing the public key and the current time segment to encrypt the keyword collection, and transmitting the encrypted keyword collection to the cloud server; when the next time segment arrives, generating keyword collection cipher again, and updating the cloud server on a server; when a keyword search request occurs, by the client, utilizing the private key and the current time segment to calculate trap door information of the keywords, transmitting the trap door information to the cloud server, and by the cloud server, obtaining the search results and sending back file cipher containing the search keywords to users. The encryption and search method is suitable for cloud storage with high safety requirements, safe, and efficient, and has the capability of revoking server search.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a revocable keyword search public key encryption method and a search method in secure cloud storage. Background technique [0002] Cloud storage is a new concept extended and developed from the concept of cloud computing. Cloud computing is the development of distributed processing, parallel processing and grid computing. The huge computing processing program is automatically split into countless smaller subroutines through the network, and then submitted to the huge system composed of multiple servers for calculation and analysis. Afterwards, the processing result is passed back to the user. Through cloud computing technology, network service providers can process tens of millions or even billions of information in a few seconds, and achieve network services as powerful as "supercomputers". [0003] Cloud storage refers to a system that integrates a large ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L29/08G06F17/30
Inventor 禹勇倪剑兵吴淮
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products