Keyword cipher text retrieval method for cloud storage

A keyword and cloud storage technology, applied in digital data processing, instruments, calculations, etc., can solve the problems of not being absolutely accurate and poor expansion performance, and achieve improved security, low performance requirements, and low retrieval costs Effect

Inactive Publication Date: 2013-05-08
深圳爱来福云健康科技有限公司
View PDF2 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when using the bloom filter for ciphertext retrieval, although the probability of error is

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Keyword cipher text retrieval method for cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] A cloud storage-oriented keyword ciphertext retrieval method of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0023] For the cloud storage environment, this method proposes a new keyword ciphertext retrieval method, which uses the AES symmetric encryption algorithm to encrypt the documents stored in the cloud server, and uses the NTRU public key algorithm to realize the ciphertext retrieval. Keyword search in the text. as attached figure 1 As shown, a cloud storage-oriented keyword ciphertext retrieval method is now provided. The method is based on the cloud storage system. The structure includes the data owner DO (Data Owner), data user DU (Data Users), cloud service provider or CS (Cloud Server) three roles.

[0024] Data owner DO: The services provided include basic parameters such as selecting an encryption algorithm and generating keys; sending encrypted documents and encrypted keywords to CS; authorizing...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a keyword cipher text retrieval method for cloud storage. The method comprises a data owner, a cloud service sever and a data user. The data owner stores encrypted files, headlines, keywords and verify certifications of the data user and the like to the cloud service server. The cloud service server stores and builds up corresponding relationships of the encrypted files, headlines and keywords, and stores the verify certifications of the data user and the like. When the data user visits cipher texts inside the cloud service server, the data user needs the verify certification awarded by the data owner and provides the cloud service server with information like a keyword trap door and the like, the cloud service server sends the cipher texts the user needs to the data user according to the information like the keyword trap door and the like, and the data user utilizes a secret key to decipher the cipher texts. Compared with the prior art, the keyword cipher text retrieval method for the cloud storage is high in safety, and capable of lowering burdens of communication, storage, and calculation, and improving accuracy and efficiency of retrieval of cipher texts.

Description

technical field [0001] The invention relates to the technical field of computer information security, in particular, it utilizes a keyword ciphertext retrieval method oriented to cloud storage. Background technique [0002] Cloud computing can provide users with cheaper computing, storage and application services on the Internet. More and more enterprises and even individuals are willing to store data in cloud servers, and can retrieve the data when needed. However, after users store data in the cloud environment, they lose direct control over the data, which may lead to the leakage and abuse of user privacy data. For example, cloud service providers such as Google? MediaMax have experienced data leakage or loss of user data. Data stored in the cloud environment faces greater security issues. It not only prevents network hackers from illegally obtaining data, but also prevents cloud service providers or outsourced database service providers from spying on sensitive data. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08G06F17/30
Inventor 步山岳杨荣根张粤钮冰清
Owner 深圳爱来福云健康科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products