Verifiable memory leakage prevention dynamic searchable encryption method and cloud server

An encryption method and memory leak technology, which is applied in the field of cloud servers and anti-memory leak dynamic searchable encryption methods, can solve the problems that symmetric searchable encryption methods cannot resist memory attacks and malicious servers at the same time, and search results cannot be verified and invalidated.

Active Publication Date: 2018-05-18
XIDIAN UNIV
View PDF3 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] To sum up, the problem existing in the existing technology is that the existing symmetric searchable encryption methods cannot resist memory attacks and malicious servers at the same time, which is manifested in the following two aspects: First, the existing verifiable symmetric encryption methods for malicious servers Searchable encryption methods...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verifiable memory leakage prevention dynamic searchable encryption method and cloud server
  • Verifiable memory leakage prevention dynamic searchable encryption method and cloud server
  • Verifiable memory leakage prevention dynamic searchable encryption method and cloud server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0066] Symmetric searchable encryption (searchable symmetric encryption, SSE) allows data owners to outsource their encrypted data to cloud servers, and to perform keyword retrieval on the outsourced encrypted data. SSE has become an important technology in the field of cloud computing.

[0067] The application principle of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0068] Such as figure 1 As shown, the verifiable anti-memory leak dynamic searchable encryption method provided by the embodiment of the present invention includes the following steps:

[0069] Ste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of cloud computing and discloses a verifiable memory leakage prevention dynamic searchable encryption method and a cloud server. A data owner is used for establishing an index and an encryption file set, outsourcing the index and the encryption file set to the cloud server, submitting a keyword trap door search related file to the cloud server and verifying returned search results. The data owner also can be used for updating the encryption file set. The cloud server is used for storing the encryption file set and the index, carrying out searching on the index according to a trap door, returning corresponding results and evidences and updating the corresponding evidences according to the updating operation of the data owner. The invention provides the first memory information leakage prevention and verifiable dynamic searchable symmetric encryption scheme. The key security and the search result accuracy and integrity are ensured. The problemthat the key generation of physical unclonable functions is instable is solved, and a relatively reliable key generation mechanism is established.

Description

technical field [0001] The invention belongs to the technical field of cloud computing, and in particular relates to a verifiable anti-memory leakage dynamic searchable encryption method and a cloud server. Background technique [0002] In the information age, more and more resources are gathered on the Internet. In order to efficiently manage and utilize Internet resources, cloud computing appears in people's sight as a scalable and high-throughput computing paradigm. Cloud computing can provide powerful data storage capabilities, and more and more individuals and companies are willing to outsource data to cloud servers. Cloud outsourcing storage services can reduce the huge local data management overhead of data owners. However, data outsourcing will inevitably bring some data security and privacy issues. Therefore, the data owner usually outsources the encrypted data, but this brings about the problem of how to perform keyword retrieval on the ciphertext. In order to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06H04L9/08H04L29/06
CPCH04L9/0643H04L9/0838H04L9/085H04L63/06H04L63/083H04L63/123H04L63/1441
Inventor 陈晓峰管文浩王剑锋王贇玲袁浩然
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products