Multi-user cloud encryption keyboard searching method capable of verifying integrity and completeness

A search method and keyword technology, applied in the field of multi-user cloud encryption keyword search, can solve problems such as insufficient query efficiency to meet cloud applications

Active Publication Date: 2015-03-04
广州市瑞玛信息技术有限公司 +1
View PDF7 Cites 80 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, most of the existing searchable encryption schemes use a linear matching method in the search process to match encrypted query requests with encrypted index items one by one. However, in cloud platforms that store huge amounts of data, the query efficiency is insufficient. To meet the needs of cloud applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-user cloud encryption keyboard searching method capable of verifying integrity and completeness
  • Multi-user cloud encryption keyboard searching method capable of verifying integrity and completeness
  • Multi-user cloud encryption keyboard searching method capable of verifying integrity and completeness

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] The present invention mainly studies the searchable encryption technology under the public key cryptography system, and proposes a multi-user cloud encryption keyword search method that can verify integrity and completeness. This method realizes the query and retrieval function of encrypted data, and protects The user's query privacy is guaranteed. On the basis of realizing the basic encrypted search, the present invention aims at the characteristics of multi-user access and large data volume storage in the cloud environment, proposes multi-user query settings, optimizes the index structure and query mechanism of encrypted files, and realizes dynamic user authority control and The ability to quickly retrieve encrypted data. The invention also designs a verification mechanism for completeness of query results and integrity of outsourced data, and uses homomorphic hash functions, signature binding keyword indexes and associated encrypted files to provide verification func...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is mainly used for searching a searchable encryption technology under a public key password system, and discloses a multi-user cloud encryption keyboard searching method capable of verifying integrity and completeness. The method can be used for verifying the search result completeness and the outsourced data integrity under the cloud environment and setting the multi-user authority. The method can be used for realizing the verification of the search result completeness and the outsourced data integrity by using signatures to bind keyword indexes and associated encryption files thereof, realizing multi-user privacy query by using a re-encryption technology and dynamically updating the query authority of the user. Moreover, the index structure and the query mechanism of the encrypted file are further optimized, so that the query efficiency is improved by using hash query in the query process, and the rapid access to the cloud data is realized.

Description

technical field [0001] The present invention relates to the research field of searchable encryption technology under the public key cryptography system, in particular to a multi-user cloud encryption keyword search method that can verify the integrity and completeness. The method can verify the completeness and integrity of the query results in the cloud environment Outsource data integrity and set permissions for multiple users. Background technique [0002] With the vigorous development of computer network technology and the expansion of society's demand for information resources, more and more enterprises and individuals hope to reduce local infrastructure costs and obtain higher service quality through cloud storage. However, while cloud storage brings convenience, ease of use and low-cost services, it also brings many new security issues. Now that data is stored on a third-party cloud platform, data owners lose control over their own data, and cloud service providers a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32G06F17/30
CPCG06F16/903H04L9/3247H04L63/0428H04L63/062H04L63/123H04L67/1097
Inventor 王晓明李诗旸吴岱霓甘庆晴王耄周锐
Owner 广州市瑞玛信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products