Check patentability & draft patents in minutes with Patsnap Eureka AI!

Central keyword ciphertext searching method base on two-level index in cloud environment

A search method and keyword technology, applied in the field of cloud security, can solve problems such as high time overhead and failure to ensure central keywords in search results, and achieve the effect of improving efficiency

Active Publication Date: 2018-08-17
ANHUI UNIVERSITY
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) It is not ensured that the central keyword must be included in the search results. Although the weight of the central keyword is emphasized and the ranking of the search results is optimized, there will be cases where other keywords are included in the search results but not the central keyword. ;
[0006] (2) A search needs to traverse all index vectors, and calculate the inner product of each index vector and query vector separately, which takes a lot of time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Central keyword ciphertext searching method base on two-level index in cloud environment
  • Central keyword ciphertext searching method base on two-level index in cloud environment
  • Central keyword ciphertext searching method base on two-level index in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0086] In this embodiment, Request For Comments (RFC document) is used as a test file set. In the experiment, 5000 files were selected, and 5000 keywords were screened from the extracted 5807 keywords for testing. The programming language is java, and the machine configuration is Windows7 system, Intel Core i5 (3.0GHZ, 8GB RAM). For the convenience of testing, the pseudo-random function and symmetric encryption algorithm in the scheme adopt AES algorithm.

[0087] Such as Figure 4 As shown, the search time of schemes MRSE and CKSER are the same, and both are linearly related to the size of the file set, because the cloud server needs to traverse all the file index vectors to perform a search, and the complexity of the search is O(n), and the scheme CKSER has no effect on the search optimize. However, the present invention (the scheme is recorded as TCKSE) adopts the mode of two-level index, and after the screening of the first-level index (inverted index), only a small amo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a central keyword ciphertext searching method base on a two-level index in a cloud environment. The method comprises the following steps that (1) a data owner generates a key;(2) the data owner constructs and encrypts a reverse index; (3) the data owner constructs and encrypts a forward index; (4) a data user generates a central keyword tag; (5) the data user generates a query trap door; (6) a cloud server executes the two-step search. The method achieves the central keyword search, the search efficiency is high, and the search accuracy is high.

Description

technical field [0001] The invention relates to cloud security technology, in particular to a central keyword ciphertext search method based on a two-level index in a cloud environment. Background technique [0002] In recent years, cloud computing technology has attracted more and more individual users or business users to rent cloud storage services with its high-quality and convenient services, which has led to rapid growth of cloud data. Since cloud service providers are mostly commercial private enterprises, while providing services, they may steal user privacy for some commercial purposes. Therefore, we must be aware of the security threats to user data privacy in the cloud storage environment. Privacy data encryption is an important means to prevent privacy leakage, but it makes the search based on keywords a challenge, so research on searchable encryption technology has become an urgent practical need. [0003] Searchable encryption technology is an important resea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F21/60
CPCG06F21/602G06F16/2228
Inventor 崔杰李占飞汪美丽唐林盛蔡心宝仲红
Owner ANHUI UNIVERSITY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More