Searchable encryption method supporting multiple users in cloud storage

An encryption method, multi-user technology, applied in the intersection of cloud computing and applied cryptography, to achieve the effect of improving efficiency, improving retrieval efficiency, improving efficiency and security

Active Publication Date: 2015-07-15
NANJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the above problems, the present invention proposes a new searchable encryption method based on multi-users in cloud storage, which enables different users to have different access rights to the same file, and can dynamically add and delete authorized users at the same time without the need to Redistribute the keys of all users when adding or deleting users, finally solving the problem of dynamically managing authorized users and access control to files in traditional multi-user searchable encryption technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Searchable encryption method supporting multiple users in cloud storage
  • Searchable encryption method supporting multiple users in cloud storage
  • Searchable encryption method supporting multiple users in cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0049] Step 1. System initialization phase

[0050] The data owner initializes system parameters, generates keys and pseudo-random functions.

[0051] The specific process is as follows:

[0052] S11. The data owner generates keys K' and K", pseudo-random functions f and F, block cipher E, and generates a pseudo-random stream S according to the number of keywords 1 ,S 2 ,...,S n (n is the number of keywords to be encrypted), which is used to encrypt and decrypt keywords.

[0053] S12. Generate a block cipher K for encrypting the file.

[0054] S13, using the block cipher K in S12 to generate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a searchable encryption method supporting multiple users in cloud storage. The method comprises the following steps: encrypting and decrypting files through a symmetrical encryption algorithm; encrypting key words trough a symmetrical searchable encryption scheme and generating a trap door; solving the problems of dynamic management of authorized users and file access control in the traditional multiuser searchable encryption technology through a method of adding access rights to users. The method realizes direct retrieval of ciphertext, improves the efficiency and the security, improves the file retrieval efficiency, realizes the access right control of files, and realizes dynamic adding and deleting of users.

Description

technical field [0001] The invention relates to the intersecting technical field of cloud computing and applied cryptography, in particular to a searchable encryption method supporting multiple users in cloud storage. Background technique [0002] With the development of cloud computing, more and more companies store data in the cloud, which not only saves storage costs for users, but also provides computing services for users on cloud servers, but it also brings some problems: users store data in the cloud data is not secure, and curious server owners may view user data, so it needs to be encrypted before outsourcing the data, so that others other than the data sender and its authorized retriever can even Obtaining the data does not give access to its contents. [0003] However, although traditional encryption technology can guarantee the security and integrity of data, as a large amount of data is uploaded to the cloud, new problems arise in the efficiency of data retriev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F17/30
Inventor 黄海平杜建澎沙超王汝传徐佳李正韬秦宇翔李峰
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products