Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network information auditing method and system based on ciphertext retrieval

A network information and ciphertext technology, applied in the field of information security, can solve problems such as attacks, inefficient communication, and user data leakage, and achieve the effects of avoiding inefficiency, convenient review, and strong security.

Active Publication Date: 2017-05-31
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, frequent network storage failures and vulnerabilities in recent years remind users that there are a series of security problems in existing network storage systems. class security issues
The first is the issue of user privacy protection: the data in the network storage is vulnerable to internal and external attacks, leading to user data leakage, such as the Hollywood pornography incident in iCloud, the file leakage incident in Google Doc, etc.
The second is the issue of content review: due to the convenience of storing and sharing data in network storage, many illegal data are often spread through network storage, and relevant departments need to conduct effective information review of data in network storage
Secondly, the communication of this kind of review is often inefficient and needs to go through layers of approval, and the data transmitted in network storage is very time-sensitive, which easily leads to the loss of review opportunities
[0005] To sum up, there is currently a lack of an efficient and secure information review mechanism for information stored on the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network information auditing method and system based on ciphertext retrieval
  • Network information auditing method and system based on ciphertext retrieval
  • Network information auditing method and system based on ciphertext retrieval

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The features of various aspects of the present invention will be described in detail below without limiting the scope of the present invention in any way.

[0037] An information review method based on ciphertext retrieval in this embodiment is implemented through the client, the review terminal and the server, including user information storage processes (such as image 3 ), and the review process (such as Figure 4 shown), specifically include the following steps:

[0038] A. The examiner registers a pair of public and private keys PK and SK: {PK, SK}=KEYGEN(), publicly releases the public key PK, and keeps the private key SK by itself;

[0039] B. Suppose the message body that the user needs to save is M, and the user builds an index I for all keywords contained in M M ;

[0040] C. The user uses PK to encrypt M to obtain ciphertext C M =PENC(M,PK);

[0041] D. The user will C M and I M upload to the server;

[0042] E. Set the keyword to be reviewed as W, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network information auditing method and system based on ciphertext retrieval. An information auditing interface is constructed by use of a power and responsibility separation method, the individual privacy of a user is protected while the efficient network information auditing is realized, and the auditing permission cannot be abused. The principle of the system is to construct an index based on the ciphertext for the information transmitted in a network by the user, and then an auditing condition is constructed by an information auditor so as to audit the information. The specific process is as follows: (1) initializing; (2) index constructing; (3) auditing condition constructing; and (4) information auditing. The system comprises a server-side, a plurality of clients and an auditing side, wherein each client and the auditing side are connected with the server-side through the network. The system has the advantages that the auditing efficiency is high, the unnecessary communication among various departments in the traditional auditing mechanism is avoided, the security is high, the auditor does not intervene in the information except the auditing condition, and the user privacy is protected.

Description

technical field [0001] The invention belongs to the technical field of information security, relates to related technologies of computer software, and in particular relates to a network information review method and system based on ciphertext retrieval. Background technique [0002] With the rapid development of the Internet, more and more users have begun to use network disks or other network storage systems to store personal or corporate data. Network storage can easily realize the functions of user data backup, data sharing among users, and data synchronization. According to the survey, the number of network storage users in my country has exceeded 500 million. [0003] However, frequent network storage failures and vulnerabilities in recent years remind users that there are a series of security problems in existing network storage systems. class security issues. The first is the issue of user privacy protection: data in network storage is vulnerable to internal and ex...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/08H04L9/0825H04L9/0838H04L63/30
Inventor 洪澄迟佳琳惠榛付艳艳李昊张敏冯登国
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products