Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Keyword search algorithm based on attribute encryption in cloud computing

A technology of keyword search and attribute encryption, which is applied in the field of cloud storage, can solve the problems of keyword guessing attacks and insufficient consideration of channel security, etc., and achieve good anti-collusion, flexible multi-user access control, and guarantee channel security Effect

Inactive Publication Date: 2017-05-03
SICHUAN YONGLIAN INFORMATION TECH CO LTD
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing scheme combines keyword search encryption and attribute-based encryption to solve the problem of access control in the cloud environment, but it does not fully consider security issues such as channel security and keyword guessing attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Keyword search algorithm based on attribute encryption in cloud computing
  • Keyword search algorithm based on attribute encryption in cloud computing
  • Keyword search algorithm based on attribute encryption in cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0008] 1. The principle of this algorithm

[0009] The basic theory that the present invention adopts is the principle of bilinear mapping and represents the access structure with its access tree, so first introduce bilinear mapping and access structure control:

[0010] 1. Bilinear mapping:

[0011] Let G and G T is a group of order p (p is a prime number), g is the generator of G, and there is an effectively computable bilinear map e between them: G×G→G T , with the following properties in the map:

[0012] (1) Bilinear, a, b∈Z p and g, h∈G, satisfying e(g a , h b ) = e(g, h) ab

[0013] (2) Non-degenerate, e(g, h)≠1

[0014] (3) Computability, g, h∈G, e(g, h) are all efficiently computable

[0015] (4) DBDH problem, g is the generator z∈Z of G p , g a , g b , g s , e(g,g) cannot be distinguished in polynomial time abs with e(g,g) z

[0016] (5) CDH problem, g is the generator of G, random a, b∈Z p , g a , g b cannot compute g in polynomial time ab .

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention puts forward a keyword search algorithm based on attribute encryption in cloud computing. First, a user chooses a trusted search server in order to minimize keyword guessing attack from the search server. A secure channel is needed only when the user is receiving a search server public key and a user private key. For data transmitted in an insecure channel, even if a malicious user intercepts the information, the user cannot recover any information through online and offline keyword guessing attack. Moreover, the scheme of the method supports flexible multi-user access control and search proof generation by users, and is applicable to a cloud environment.

Description

[0001] Field [0002] The invention relates to the technical fields of cloud storage, data encryption and data search. Background technique [0003] With the rapid development of cloud technology, cloud storage services are becoming more and more mature. Cloud storage has become the first choice for enterprises or individuals, and cloud storage service providers are responsible for storing data. If the cloud storage service provider conspires with other users, or if there are loopholes in the cloud server, user data may be leaked and the data will lose security. In order to ensure data security, you can choose to encrypt the data before uploading to the cloud. However, encrypted data loses its data structure and semantic characteristics, and cloud servers usually cannot provide plaintext search services to users. If the user needs to search for data, the easiest way is to download all encrypted data to the local, and then decrypt them one by one before searching. Although ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/30H04L9/08
CPCH04L63/0442H04L9/0866H04L9/3073
Inventor 范勇胡成华
Owner SICHUAN YONGLIAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products