Ciphertext searching method and system supporting access control

A search method and ciphertext technology, applied in the field of data processing

Active Publication Date: 2018-09-04
SHENZHEN UNIV
View PDF5 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide a ciphertext search method and system that supports access control, aiming to solve the problem in the prior art that the data owner needs to be online in real time when searching, and a large number of calculations are required to ensure access control.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ciphertext searching method and system supporting access control
  • Ciphertext searching method and system supporting access control
  • Ciphertext searching method and system supporting access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0075] figure 1 It shows a ciphertext search supporting access control provided by the embodiment of the present invention, including:

[0076] S101. The client encrypts the files in the database using a preset symmetric encryption algorithm to obtain encrypted ciphertexts, constructs an index for the encrypted ciphertexts according to the file identifiers of the files in the database, encrypts the indexes, and obtains the encrypted ciphertexts containing index the ciphertext database of ciphertext, and send the encrypted ciphertext and the ciphertext data to the cloud server;

[0077] S102. The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applicable to the field of data processing, and provides a searching method supporting access control. The searching method comprises the steps that: a client encrypts files of a database to obtain encrypted ciphertexts, and indexes are established and encrypted according to file identifiers to obtain a ciphertext database; the client receives a key ciphertext, a private key and aretrieval keyword set to generate a trap door; a cloud server retrieves the corresponding index ciphertext according to the trap door; the client carries out decryption on the index ciphertext by utilizing a key, uploads the file identifier obtained by decryption to the cloud server to obtain the encrypted ciphertext, and the encrypted ciphertext is decrypted to obtain a search result; and the client shows the search result according to a preset showing mode. In the implementation process of the embodiment of the invention, the ability of a searching client for data access is controlled by adopting attribute-based encryption, but access control is set to be carried out in the overall database instead of the indexes, so that calculation cost when a data owner encrypts the database can be greatly reduced; and meanwhile, in the process that a user acquires the search trap door, the data owner does not need to participate in.

Description

technical field [0001] The invention belongs to the technical field of data processing, and in particular relates to a ciphertext search method and system supporting access control. Background technique [0002] The emergence of cloud computing enables users to enjoy ubiquitous, convenient and on-demand network access to share configurable computing resource pools with high efficiency and minimal economic overhead. Despite the advantages of cloud services, outsourcing sensitive information (such as emails, personal health records, company financial data, government documents, etc.) to remote servers also raises privacy concerns. Once the user uploads the data to the cloud server, he loses control over the data, and the cloud service provider (Cloud Service Provider) that saves the user data can access the sensitive information of the user without authorization. Therefore, cloud security has become a challenge and a prerequisite for determining whether cloud storage can be m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F17/30
CPCH04L63/0428H04L63/0435H04L67/10
Inventor 张鹏吴楚欣刘宏伟喻建平
Owner SHENZHEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products