A cloud storage method supporting voice encrypted search

A voice encryption and cloud storage technology, which is applied in the field of cloud storage, can solve the problems of unresolved voice search encryption, users' cloud data privacy is easily threatened, and privacy issues are not considered.

Active Publication Date: 2020-07-24
SUN YAT SEN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although there are voice-related search engines, such search engines do not consider the privacy issues of user query data and input voice
Once the user's voice is obtained by others, the privacy of the user's cloud data is easily threatened without distinguishing whether the source of the voice is legal or not
On the other hand, the current text search form cannot effectively detect whether the input keyword is entered by the user himself or someone else, but voice can do this
In 2017, Chen et al. proposed a system that uses a magnetometer to accurately recognize speech, but this system does not solve the problem of voice search encryption in the cloud

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cloud storage method supporting voice encrypted search
  • A cloud storage method supporting voice encrypted search

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] The symmetric encryption search algorithm that supports voice forms mainly consists of five steps:

[0056] In the first step, the user runs the key generation algorithm: the user first inputs a system security parameter k to generate n+2 k-bit keys Here n represents the total number of documents to be uploaded by the user.

[0057] In the second step, the user runs the encryption algorithm: first, the user will As the key of the symmetric encryption algorithm ε.Enc(·,·), pair D i Encrypt, and the encrypted result is written in C i means, where i=1,...,n.

[0058] Then, the user generates an index for these documents. Specifically, the user starts with document D 1 ,D 2 ,...,D n Extract the keyword w from 1 ,...,w m , and stored in the set W={w 1 ,...,w m}middle. Will K 1 , K 2 respectively as a pseudorandom function f 1 , f 2 The key of the user is each keyword w in the set W j Calculation: tr(w j ) = f 1 (K 1 ,w j ), Here j=1,...,m. Then, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of the cloud storage, and specifically relates to a cloud storage method supporting voice encryption search. A user, a voice recognizer and a cloud server solve a voice search encryption problem by opening a key generation algorithm, an encryption algorithm, a voice search instruction generation algorithm, a search encryption document algorithm and a local decryption algorithm. Compared with the existing text encryption search way, the voice encryption search technology can be executed on any equipment supporting a voice function, the dependence on a keyboardis weakened, and the privacy of the user cannot be leaked. Furthermore, the voice encryption search can detect the sound of search man, the possibilities of other people imitation and electronic equipment sound-recording are eliminated, thereby better maintaining the user search right.

Description

technical field [0001] The invention belongs to the field of cloud storage, and in particular relates to a cloud storage method supporting voice encryption search documents. Background technique [0002] From ancient times to the present, the way information is stored has undergone three changes: paper archives, local electronic archives, and cloud storage. Cloud storage can integrate various types of storage devices in the network to work together through some application software, and jointly provide data storage and business access to the outside world. The establishment of this system not only allows users to truly experience the convenience of querying personal data on different devices anytime and anywhere, but also reduces the cost of maintaining devices for users to a certain extent. Therefore, more and more users tend to save personal data in cloud products such as Amazon S3 and Baidu Cloud. [0003] However, when data is stored in the cloud, users indirectly lose...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G10L15/08G10L15/26G10L15/30G10L17/22
CPCG06F16/134G06F16/1824G10L15/08G10L15/26G10L15/30G10L17/22H04L63/0428
Inventor 李会格张方国
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products