Semantic fuzziness searchable encryption method capable of realizing sorting verifiability

An encryption method and semantic technology, applied in the field of cloud computing, can solve problems such as the inability to achieve verifiable sorting, and the inability to verify whether the order of search results is correct.

Active Publication Date: 2017-08-01
FUZHOU UNIV
View PDF2 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, none of the above verifiable schemes can verify whether the order of the search results after sorting is correct, that is, the function of sorting verifiability cannot be realized

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Semantic fuzziness searchable encryption method capable of realizing sorting verifiability
  • Semantic fuzziness searchable encryption method capable of realizing sorting verifiability
  • Semantic fuzziness searchable encryption method capable of realizing sorting verifiability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0053] like figure 1 as shown, figure 1 It is the system framework of the embodiment of the present invention, including three entities: data owner, authorized user and cloud server. The basic operation process of this embodiment is as follows:

[0054] (1) KeyGen(λ): The data owner inputs a security parameter λ to generate the document encryption key sk, the key hk of the one-way hash function, and the key ek of the order-preserving encryption function. Send keys sk, hk to authorized users.

[0055] (2) Index (F, hk, ek):

[0056] a. Keyword extraction: data owner for document set F=(f 1 ,f 2 ,..., f m ) to extract keywords, and get the keyword set W=(w 1 ,w 2 ,...,w n ).

[0057] b. Calculate correlation score: introduce the tf-idf weight calculation method to calculate keyword correlation score S.

[0058]

[0059] |f| indicates the le...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a semantic fuzziness searchable encryption method capable of realizing sorting verifiability. The method comprises the following steps that: firstly, importing a relevancy score and a domain weighting score to obtain a more accurate index structure; then, on the basis of a WordNet dictionary set, carrying out semantic extension on query keywords, integrating semantic similarity with an encryption score to design a dual-factor sorting algorithm, and carrying out accurate sorting on a search result; and finally, applying a Bloom filter and a message authentication code to carry out comprehensive and effective verification on keywords, indexes and ciphertexts. By use of the method, semantic fuzziness search can be realized, search results can be sorted, and a sorting verifiability function is supplemented on the basis of the accuracy and the integrity of a verification result of an existing verifiable scheme.

Description

technical field [0001] The invention relates to the field of cloud computing, in particular to a sorting verifiable semantic fuzzy searchable encryption method. Background technique [0002] With the development of cloud computing, more and more users outsource data to public cloud servers, which greatly reduces local computing and storage costs. However, if sensitive data, such as: unpublished papers or patents, private electronic health records, corporate financial and tax reports, etc., are stored in the cloud server in clear text, they may face the risk of being peeped and stolen by cloud administrators or attackers. risk. Therefore, in order to ensure data security and user privacy, many sensitive data need to be encrypted before being outsourced. But this makes the traditional plaintext search technology difficult to use and brings challenges to efficient data utilization. In order to solve the problem of searching in ciphertext, Song took the lead in researching on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F21/62H04L9/00H04L9/06H04L29/06
CPCG06F16/319G06F16/3334G06F16/3338G06F16/334G06F16/3344G06F16/338G06F21/6227H04L9/00H04L9/0643H04L63/0435H04L63/0846
Inventor 杨旸杨书略刘西蒙钟尚平蔡圣暐刘佳李光滟柯闽
Owner FUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products