Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Searchable encryption method based on wildcard character in cloud storage safety

An encryption method and wildcard technology, applied in computer security devices, special data processing applications, instruments, etc., can solve the problems of non-negligible false positive probability, false positive of Bloom filter, spelling mistakes, etc., and achieve flexible user authorization and revocation , good privacy protection, and the effect of eliminating error probability

Active Publication Date: 2017-10-17
FUZHOU UNIV
View PDF6 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of the Bloom filter is that the false positive probability (false positive probability) cannot be ignored
[0008] Existing fuzzy searchable encryption schemes are limited in that they can only correct small edit distance errors, such as misspellings
The disadvantage of this scheme is: a wildcard can only represent one character
[0011] The disadvantage of searchable encryption schemes based on Bloom filters is that the false positive probability is not negligible
Because the hash function may map one or more elements to the same position of BF, there is a false positive probability in the Bloom filter

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Searchable encryption method based on wildcard character in cloud storage safety
  • Searchable encryption method based on wildcard character in cloud storage safety
  • Searchable encryption method based on wildcard character in cloud storage safety

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0044] like figure 1 Shown is a system structure block diagram of an embodiment of the present invention, wherein:

[0045] The Key Generation Center (KGC) is fully trusted and is responsible for managing and distributing the public / private keys generated in the system. KGC includes registration unit, key generation unit, certificate unit and storage unit. The registration unit provides registration services for system users. The key generation unit generates public keys / keys for the system and users. The certificate unit is responsible for providing certificate generation and revocation services. The storage unit is responsible for storing certificates and revocation lists.

[0046] The Cloud Computing Platform (CP) stores users' encrypted documents and is responsible for performing data retrieval operations. CP includes storage unit, computing u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a searchable encryption method based on wildcard character in cloud storage safety. The method comprises the following steps that: setting a document to be uploaded; extracting a keyword set; encrypting the keyword set; selecting a random number as a document encryption key, and encrypting the document encryption key; encrypting the document to be uploaded to obtain a ciphertext, and sending the ciphertext to a cloud computing platform; input a query keyword set, generating a query trapdoor, carrying out signature, and sending the signature to the cloud computing platform; verifying a query signature by the cloud computing platform, and executing a search algorithm by the cloud computing platform; transmitting a keyword index and the query trapdoor into a keyword matching protocol to obtain an encryption matching result; carrying out decryption to obtain a search result; according to the search result, returning a corresponding ciphertext by the cloud computing platform; and recovering the document encryption key, and recovering the document. By use of the method, the keyword search of at most two wildcard characters can be supported, the wildcard character can appear on any position of the keyword, and a plurality of random characters can be represented.

Description

technical field [0001] The invention relates to a searchable encryption method based on wildcards in cloud storage security Background technique [0002] Cloud storage provides users with ubiquitous, dynamic, scalable and on-demand storage services. While cloud storage brings more convenience to users, it also poses serious security threats to user data. To protect the privacy of outsourced data in public cloud servers, data encryption is an effective way to prevent internal / external attackers from accessing sensitive information. At the same time, in order to facilitate the use of data, it is necessary for us to support users to perform keyword queries on ciphertext (without decryption). This mechanism is called searchable encryption. [0003] Consider electronic health record (EHR) storage systems as an example of an application for searchable encryption. Assuming user Alice wants to store sensitive EHR data in the public health cloud server, she first needs to extract...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F21/62
CPCG06F16/242G06F21/6245
Inventor 杨旸张煜超刘西蒙郭文忠叶少珍董晨邹剑
Owner FUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products