Supercharge Your Innovation With Domain-Expert AI Agents!

Central keyword ciphertext search method based on two-level index in cloud environment

A search method and keyword technology, applied in the field of cloud security, can solve the problems of not ensuring the central keywords of search results, high time overhead, etc., and achieve the effect of accurate results and improved efficiency

Active Publication Date: 2021-07-23
ANHUI UNIVERSITY
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) It is not ensured that the central keyword must be included in the search results. Although the weight of the central keyword is emphasized and the ranking of the search results is optimized, there will be cases where other keywords are included in the search results but not the central keyword. ;
[0006] (2) A search needs to traverse all index vectors, and calculate the inner product of each index vector and query vector separately, which takes a lot of time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Central keyword ciphertext search method based on two-level index in cloud environment
  • Central keyword ciphertext search method based on two-level index in cloud environment
  • Central keyword ciphertext search method based on two-level index in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0086] In this embodiment, Request For Comments (RFC document) is used as a test file set. In the experiment, 5000 files were selected, and 5000 keywords were screened from the extracted 5807 keywords for testing. The programming language is java, and the machine configuration is Windows7 system, Intel Core i5 (3.0GHZ, 8GB RAM). For the convenience of testing, the pseudo-random function and symmetric encryption algorithm in the scheme adopt AES algorithm.

[0087] Such as Figure 4 As shown, the search time of schemes MRSE and CKSER are the same, and both are linearly related to the size of the file set, because the cloud server needs to traverse all the file index vectors to perform a search, and the complexity of the search is O(n), and the scheme CKSER has no effect on the search optimize. However, the present invention (the scheme is recorded as TCKSE) adopts the mode of two-level index, and after the screening of the first-level index (inverted index), only a small amo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a central keyword ciphertext search method based on a two-level index in a cloud environment, which includes the following steps in sequence: (1) the data owner generates a key; (2) the data owner constructs an inverted index and encrypts it; ( 3) The data owner constructs a forward index and encrypts it; (4) The data user generates a central keyword label; (5) The data user generates a query trapdoor; (6) The cloud server performs a two-step search. The invention realizes the central keyword search, and has high search efficiency and high search accuracy.

Description

technical field [0001] The invention relates to cloud security technology, in particular to a central keyword ciphertext search method based on a two-level index in a cloud environment. Background technique [0002] In recent years, cloud computing technology has attracted more and more individual users or business users to rent cloud storage services with its high-quality and convenient services, which has led to rapid growth of cloud data. Since cloud service providers are mostly commercial private enterprises, while providing services, they may steal user privacy for some commercial purposes. Therefore, we must be aware of the security threats to user data privacy in the cloud storage environment. Privacy data encryption is an important means to prevent privacy leakage, but it makes the search based on keywords a challenge, so research on searchable encryption technology has become an urgent reality. [0003] Searchable encryption technology is an important research con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/22G06F21/60
CPCG06F21/602G06F16/2228
Inventor 崔杰李占飞汪美丽唐林盛蔡心宝仲红
Owner ANHUI UNIVERSITY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More