Multi-user encrypted search method in cloud storage

A search method and multi-user technology, applied in the field of cloud computing security, can solve problems such as system damage, and achieve the effect of dynamic management, data security protection, efficiency and high efficiency

Active Publication Date: 2015-10-21
SOUTHEAST UNIV
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In a multi-user encrypted search environment, if the method of sharing secret keys is adopted, if a user revokes the search permission, but since the decryption key has been distribute

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-user encrypted search method in cloud storage
  • Multi-user encrypted search method in cloud storage
  • Multi-user encrypted search method in cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] This embodiment is designed to complete the initial generation and distribution of secret keys. The purpose of key distribution is: users have their own key material, and the trusted private cloud stores their own key and the user's auxiliary key. Expressed in a form:

[0037] step content 100 TPC initializes to generate key material 102 TPC makes the public key public and the corresponding secret key remains private

[0038] 104 TPC calculates user secret key and user auxiliary secret key 106 TPC sends the user secret key to the user and stores the user auxiliary secret key at the same time

[0039] The steps in Embodiment 1 are described as follows:

[0040] Step 100: TPC initialization generates key material. TPC creates a q-order cyclic group G according to the generator g; H is a secure hash function, f is a pseudo-random function f s (), s is its f s The secret key of (), h=g R ,in Defined as the set of {0...

Embodiment 2

[0047] This embodiment is designed to complete the data upload stage. The purpose of this stage is to encrypt the data and keywords that users need to upload and store them on the public cloud. Data encryption upload is divided into user encryption and TPC encryption upload. Including but not limited to the following steps (expressed in a table):

[0048] step content 108 User U first needs to encrypt data and data keywords 110 The user sends the encrypted data and the keywords of the data to the TPC for processing 112 After the user passes the TPC authentication, the TPC will encrypt again 114 TPC uploads the encrypted data to the public cloud

[0049] The process of data upload stage is as follows: Down figure 2 shown.

[0050] The steps in Embodiment 2 are described as follows:

[0051] Step 108: the first user u encrypts the data d to be uploaded and the keywords of the data d.

[0052] The user uses the EIGamal encryp...

Embodiment 3

[0059] This embodiment is designed to complete the data search phase. The purpose of this stage is: the user submits a search request to the TPC, the TPC processes the search request, and sends the search trapdoor query value to the public cloud for search, and finally the TPC returns the data that the user is interested in. Including but not limited to the following steps (expressed in a table):

[0060] step content 116 The user submits a search request to the TPC, and the TPC then distributes the search materials after authenticating the user 118 User generates search trapdoor, sent to TPC 120 TPC takes out the user's auxiliary secret key and calculates the trapdoor query value 122 Match the trapdoor query value with the data item on the public cloud, and return the matched data to TPC 124 TPC first processes the retrieved data and sends it to the second user u 2 126 The user decrypts the data through the key material

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-user encrypted search method in cloud storage, comprising an initialization stage, a data uploading stage, and a data search stage. In the initialization stage, secret key material is distributed from a trusted private cloud to a group of authorized users. In the data uploading stage, a data owner encrypts data and keywords through an encryption algorithm and sends the encrypted data to the trusted private cloud, and the trusted private cloud encrypts the data for the second time and stores a data packet to a public cloud. The data search stage includes the following steps: a data user sends a search request to generate trapdoor query; after receiving a trapdoor, the trusted private cloud checks the legitimacy of the search identity of the user, and uses a matching algorithm to search the encrypted data on the public cloud after the legitimacy of the search identity is proved; after the data is searched successfully, matching searched data to be decrypted is returned to the trusted private cloud; and the trusted private cloud pre-decrypts the data and returns the data to the data user for decryption. By using the method of the invention, a user not only can upload his or her data, but also can search data uploaded by other users.

Description

Technical field [0001] The invention involves a multi -user search method in cloud storage, which belongs to the field of cloud computing security technology. Background technique [0002] From online email system Email, to Facebook's online album service, more and more clouds are increasingly stored in the lives of ordinary public.With the continuous development of cloud computing technology, cloud storage is widely used for services, such as backup or outsourcing data to reduce operating costs, such as Amazon Storage Service, Baidu Cloud.However, these remote servers cannot be fully trusted because administrators or hackers may completely access the server with root permissions and can operate bright text data.Therefore, in order to securely store sensitive data on an unwilling server, the data must be encrypted, which reduces security and privacy risks by hiding all information information about explicit data.Although the storage encrypted data can ensure the security and inte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/08H04L29/06
Inventor 万长胜潘浩黄杰
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products