Chinese multi-keyword fuzzy sort encryption text search method based on local sensitive hash

A technology of local-sensitive hashing and search methods, applied in special data processing applications, instruments, electrical digital data processing, etc., can solve the problems of wasting storage space and time overhead, unable to realize Chinese fuzzy search, etc., to reduce computing and storage. Overhead, the effect of efficient fuzzy keyword storage

Active Publication Date: 2017-09-29
FUZHOU UNIV
View PDF3 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the above scheme does not need to build a keyword fuzzy set, it is also for English fuzzy search and cannot realize Chinese fuzzy search
[0006] In view of the current Chinese ciphertext keyword search scheme, fuzzy sets must be constructed in advance, wh

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chinese multi-keyword fuzzy sort encryption text search method based on local sensitive hash
  • Chinese multi-keyword fuzzy sort encryption text search method based on local sensitive hash
  • Chinese multi-keyword fuzzy sort encryption text search method based on local sensitive hash

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The technical solutions of the present invention will be described in detail below with reference to the accompanying drawings.

[0028] The invention provides a Chinese multi-keyword fuzzy sorting ciphertext search method based on local sensitive hash, figure 1 The system framework of the present invention includes three entities: data owner, authorized user and cloud server. The index and trapdoor encryption of the present invention are encrypted by using the secure KNN algorithm, and can refer to: WongW K, Cheung W L, Kao B, et al.SecurekNN computation on encrypted databases / / Proceedings of the ACM Sigmod International Conference on Management of Data. New York, USA, 2009: 139-152.

[0029] further, as figure 2 It is the basic flow of the present invention, and the concrete steps are as follows:

[0030] (1) Setup: The data owner selects the plaintext document collection F=(f 1 ,f 2 ,…,f m ) to extract keywords to obtain the keyword set W=(w 1 ,w 2 ,…,w n )...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a Chinese multi-keyword fuzzy sort encryption text search method based on local sensitive hash. After Chinese keywords are converted into the corresponding Chinese phonetic alphabet strings, the Chinese phonetic alphabet strings are segmented based on consonants, vowels, tones, and unigram; a vector generation algorithm of three types of Chinese keywords is designed, the Chinese phonetic alphabet strings are mapped to keyword vector; fuzzy matching of keywords is achieved by utilizing the attributes of locally sensitive hash and bloom filters. The encryption index of the document adopts the method of one document corresponding only to one bloom filter, at the addition of a new document (or the deletion of an old document), the encryption index of an original data set does not need to be changed, only the encryption index of the new document needs to be built (or the encryption index of the old document is deleted), and dynamic updating of the document can be achieved. A domain weighted scoring method is introduced into the method in order to improve the accuracy of the sort results, the Euclidean distance between the keyword vectors, the weight of keyword frequency and domain weighted scoring are combined, more accurate three-factor sorting is achieved, and documents which meet user needs more are returned.

Description

technical field [0001] The invention relates to a Chinese multi-keyword fuzzy sorting ciphertext search method based on local sensitive hashing Background technique [0002] With the rapid development of cloud computing technology, more and more sensitive data are stored in the cloud, such as emails, personal health records, private videos and photos, company financial data and government documents. Cloud servers provide high-quality data storage services, and storing data in the cloud can reduce users' data storage and maintenance costs. However, if the data owner and the cloud server are not in the same trust domain, the outsourced data will be at risk. In order to protect the privacy of users, it is a common solution to encrypt the data and then store it in the cloud server. However, after the data is encrypted, it no longer has the original characteristics. When users need some data, they cannot directly distinguish the required data in the ciphertext. When the amount o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30G06F21/62
CPCG06F16/325G06F16/3334G06F21/6209
Inventor 杨旸刘佳郭文忠叶少珍董晨
Owner FUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products