Hybrid cloud-oriented multi-keyword Top-k ciphertext retrieval method and system of privacy protection

A privacy-protecting, top-k technology, applied in file management systems, transmission systems, and other database retrievals, can solve problems such as complex index tree construction, low retrieval efficiency, and reduced retrieval computing overhead

Active Publication Date: 2018-08-03
NANJING UNIV OF POSTS & TELECOMM
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Most methods in the prior art use public cloud services by default. Based on the assumption that public clouds provide services in a "semi-honest model", a series of multi-keyword ciphertext retrieval and processing methods in encrypted cloud environments are proposed. However, these methods There are one or more problems such as low retrieval efficiency, inaccurate retrieval results, complex index tree construction, etc.
[0005] In response to these problems, the Chinese invention patent application with application number 201710181664.6 discloses a fast multi-keyword semantic sorting search method for protecting data privacy in cloud computing. By adding a private cloud server, while creating a document vect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hybrid cloud-oriented multi-keyword Top-k ciphertext retrieval method and system of privacy protection
  • Hybrid cloud-oriented multi-keyword Top-k ciphertext retrieval method and system of privacy protection
  • Hybrid cloud-oriented multi-keyword Top-k ciphertext retrieval method and system of privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] This embodiment provides a hybrid cloud-oriented privacy protection multi-keyword Top-k ciphertext retrieval method, such as figure 1 and figure 2 shown, including the following steps:

[0069] (1) The data provider extracts the keyword set from the provided document set, and generates a keyword dictionary sequence by clustering and partitioning; then generates a corresponding plaintext document vector for each document in the document set according to the keyword dictionary sequence, and based on Blocking of Keyword Dictionary Sequence Divide the plaintext document vector into blocks to form a document filter vector; then encrypt the plaintext document vector to form an encrypted document vector, encrypt each document in the document set to form an encrypted document set; finally transmit the document filter vector to the private cloud server, and transmit the encrypted document vector and the encrypted document set to the public cloud server.

[0070] This step spe...

Embodiment 2

[0094] This embodiment provides a hybrid cloud-oriented privacy protection multi-keyword Top-k ciphertext retrieval system, including a data provider, a data retrieval terminal, a private cloud server and a public cloud server, wherein:

[0095] The data provider is used to extract the keyword set from the provided document set, and generate a keyword dictionary sequence by clustering and partitioning; and generate a corresponding plaintext document vector for each document in the document set according to the keyword dictionary sequence, and generate a corresponding plaintext document vector according to the key word Blocking of the word dictionary sequence blocks the plaintext document vector to form a document filter vector; and encrypts the plaintext document vector to form an encrypted document vector, encrypts each document in the document set to form an encrypted document set; and transmits the document filter vector to Private cloud server, which transmits the encrypted...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hybrid cloud-oriented multi-keyword Top-k ciphertext retrieval method and system of privacy protection. The method and system mainly solve the problem that retrieval efficiency is low. A scheme thereof includes: utilizing correlation relationships among keywords by a data providing end to generate a keyword dictionary sequence through clustering technology; and generatinga high-dimensional document vector and low-dimensional document filtering vectors by each document, then outsourcing ciphertext documents and encrypted document vectors to an unauthentic public cloudserver, and storing the plaintext document filtering vectors to an authentic private cloud server. In retrieval, a candidate document set is firstly calculated through the private cloud server, and then retrieval result Top-k document calculation is realized through the public cloud server. Aggregation characteristics of the correlation keywords in the keyword dictionary sequence improve a filtering effect of the private cloud server, and compress a size of the candidate document set. According to the method, a process is simple, security is high, realization is easy, and highly-efficient multi-keyword ciphertext retrieval processing can be realized in a hybrid-cloud environment through lower calculation overheads.

Description

technical field [0001] The invention relates to user data privacy protection, in particular to a hybrid cloud-oriented privacy protection multi-keyword Top-k ciphertext retrieval method and system. Background technique [0002] The idea of ​​service-oriented IT resources is becoming more and more popular, showing the trend of "everything is a service" (X as a Service, XaaS), and "service" has become the core concept of cloud computing. However, while cloud computing is booming, cloud security has also become a widely concerned issue. In the cloud environment, because users cannot directly control the data placed in the remote cloud server (Cloud Server, CS), they are worried that their outsourced data will be illegally obtained or abused by the cloud service provider, especially for sensitive data with high privacy requirements. Data, such as electronic medical records, bank transaction data, user emails, etc. Although cloud service providers claim that they will provide s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/27G06F17/30G06K9/62H04L29/06H04L29/08
CPCH04L63/0428H04L67/06G06F16/93G06F40/30G06F18/24147
Inventor 戴华朱向洋杨庚白双杰史经启孙彦珺王敏
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products