Cloud storage-oriented multi-keyword ciphertext retrieval method and system
A keyword, cloud storage technology, applied in the field of information security, can solve the problems of destroying the order relationship of data, difficult keys, and low efficiency of ciphertext query.
Inactive Publication Date: 2018-10-09
北京科瑞云安信息技术有限公司
3 Cites 12 Cited by
AI-Extracted Technical Summary
Problems solved by technology
View more
Abstract
The invention relates to a cloud storage-oriented multi-keyword ciphertext retrieval method and system, and relates to the field of information safety. The system comprises a client, an encryption andciphertext retrieval cloud server and a cloud storage server, wherein the client is connected with the encryption and ciphertext retrieval cloud server and the cloud storage server, and is used for uploading ciphertext data to the cloud storage server, downloading the ciphertext data from the cloud storage server or updating the ciphertext data; the encryption and ciphertext retrieval cloud server is used for complexly storing data encryption secret keys and ciphertext indexes and executing ciphertext retrieval requests of the client; and the cloud storage server is formed by a plurality of server clusters. According to the method and system, a secret key management scheme with higher safety degree is provided so that multi-keyword ciphertext retrieval is supported.
Application Domain
TransmissionSpecial data processing applications
Technology Topic
Cloud storageComputer security +5
Image
Examples
- Experimental program(1)
Example Embodiment
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.