Multi-user multi-keyword searchable encryption method in cloud storage

An encryption method and keyword technology, applied in the field of information security, can solve problems such as inability to realize keyword retrieval

Inactive Publication Date: 2014-09-03
XIAN UNIV OF TECH
View PDF2 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a searchable encryption method for multi-users and multiple keywords in cl

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-user multi-keyword searchable encryption method in cloud storage
  • Multi-user multi-keyword searchable encryption method in cloud storage
  • Multi-user multi-keyword searchable encryption method in cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0073] Assuming that the file encryptor Ent wants to convert the document collection D=(D 1 ,...,D n ) is encrypted and stored in the storage server Serv, set the document D i The keyword list is W i =(w i,1 ,...,w i,m ), 1≤i≤n, n is the number of files to be stored, m is the document D i The number of keywords in w i,j , 1≤j≤m, for D i The keyword in the j-th keyword field of , the construction scheme hopes that after the document is encrypted, the keyword can be searched, and the goal of security and confidentiality is achieved. The algorithm includes seven polynomial time algorithms, which are described in detail as follows:

[0074] Step 1, system parameter initialization, namely step Init(1 k )

[0075] The algorithm is executed by the user management organization UM to initialize the system, and the security parameter k is input. Generally, k=160 or larger can be set, and the larger the k, the higher the security. The output order is the cyclic group G of prime nu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-user multi-keyword searchable encryption method in cloud storage, comprising the following steps: Step 1, system parameter initialization; Step 2, addition of users; Step 3, file encryption by a file owner and generation of security index; Step 4, generation of keyword search token by users; Step 5, search of ciphertext keyword by a cloud storage server; Step 6, decryption of ciphertext by users; and Step 7, cancellation of users. According to the method, an authorized user can search an encrypted file by the utilization of a trap door linked with a keyword; a data user encrypts his/her own data and stores the data into the cloud storage server; and the required encrypted data can be searched through a keyword search token when the data is needed, and download and decryption are carried out. Meanwhile, the cloud storage server doesn't know about the user's search keyword, thus guaranteeing data information privacy for the user. The method is suitable for a multi-user environment.

Description

technical field [0001] The invention belongs to the technical field of information security, is applied in the process of data security storage service in cloud computing, and specifically relates to an encryption method in which multiple users and multiple keywords can be searched in cloud storage. Background technique [0002] As a new computing model, cloud computing can provide various advanced computing services with low cost and scalability. In order to save the cost of storing and managing data, enterprises and individuals can outsource data to cloud storage servers. The data provided by the cloud storage service has the advantages of availability and reliability, but it also has an obvious disadvantage, that is, the data is not under the management and control of the user, so how to maintain the confidentiality and integrity of the data becomes an urgent concern of the user. question. [0003] Although enterprises believe in the reliability, availability, fault tole...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08G06F17/30H04L9/00
Inventor 王尚平张亚玲邹又姣
Owner XIAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products