Data encryption method, data query method, device, equipment and storage medium

A data encryption and encrypted index technology, applied in the field of data processing, can solve the problems of low data query efficiency and occupy too much system storage space, and achieve the effect of reducing complexity, improving security and improving efficiency

Active Publication Date: 2018-10-09
PING AN TECH (SHENZHEN) CO LTD
View PDF6 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Embodiments of the present invention provide a data encryption method, device, device, and storage medium to solve the problem of occupying too much system storage space in data encryption
[0004] Embodiments of the present invention provide a data query method, device, equipment, and storage medium to solve the problem of low data query efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method, data query method, device, equipment and storage medium
  • Data encryption method, data query method, device, equipment and storage medium
  • Data encryption method, data query method, device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] figure 2 A flow chart of the data encryption method in this embodiment is shown. The data encryption method is applied in various terminals to solve the problem of occupying too much system storage space during the data encryption process. like figure 2 As shown, the data encryption method includes the following steps performed by the data owner:

[0051] S11: Obtain the plaintext keywords of the plaintext files, and establish a file index of the plaintext files based on the plaintext keywords using a local sensitive hash function.

[0052] Wherein, the plaintext file refers to an unencrypted original file. Locality Sensitive Hashing (LSH, LocalitySensitive Hashing) function is a kind of Approximate Nearest Neighbor (ANN, Approximate Nearest Neighbor) search, which is used to measure text similarity. The locality-sensitive hash function can mine similar data from massive data, and it can be applied to text similarity detection, web search and other fields.

[005...

Embodiment 2

[0098] Figure 5 A functional block diagram of a data encryption device corresponding to the data encryption method in Embodiment 1 is shown. like figure 2 As shown, the data encryption device includes a file index establishment module 11 , a first random user key acquisition module 12 , an encrypted file and encrypted index acquisition module 13 and an encrypted file and encrypted index sending module 14 . Among them, the implementation functions of the file index establishment module 11, the first random user secret key acquisition module 12, the encrypted file and encrypted index acquisition module 13, and the encrypted file and encrypted index sending module 14 are the same as step 1 of the data encryption method in embodiment 1. One-to-one correspondence, to avoid redundant description, this embodiment does not describe in detail one by one.

[0099] The file index building module 11 is configured to acquire plaintext keywords of plaintext files, and establish fi...

Embodiment 3

[0113] Image 6 A flow chart of the data query method in this embodiment is shown. The data query method is applied to various terminals to solve the problem of low data query efficiency. like Image 6 As shown, the data query method includes the following steps executed by the server:

[0114] S21: Obtain query keywords, and process the query keywords by using a local sensitive hash function to form a query trapdoor.

[0115] Wherein, the query keyword refers to a keyword used to query the plaintext file. The query keywords are sent from the authorized client to the server. The server side obtains the query key words from the authorized user side, and processes the query key words with a local sensitive hash function to form a query trapdoor. Among them, a trapdoor is an "organ" set in a certain system or a certain file, so that when specific input data is provided, the security policy is allowed to be violated. For example, a login processing subsystem allows p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data encryption method, data query method, a device, equipment and a storage medium. The data encryption method comprises the following steps of acquiring the plaintext keyword of a plaintext file, and establishing the file index of the plaintext file by using a local sensitive hash function based on the plaintext keyword; acquiring a first random user secret key sent bya secret key management center; encrypting the plaintext file and the file index by using the first random user secret key and obtaining an encrypted file and an encrypted index; and sending the encrypted file and the encrypted index to a server end so as to indicate the server end to encrypt the encrypted file by using the first random server end secret key sent by the secret key management center and forming a ciphertext file, wherein the first random user secret key is associated with the first random server end secret key. By using the data encryption method, system storage pressure is reduced and data safety is increased.

Description

technical field [0001] The invention relates to the field of data processing, in particular to a data encryption method, a data query method, a device, a device and a storage medium. Background technique [0002] With the development of cloud computing technology, more and more enterprises and individuals choose to store and manage data with the help of cloud servers. Based on security considerations, users will choose to encrypt the data before uploading to the cloud server. However, the encrypted data will bring difficulties to data retrieval, making the data query process inefficient. At present, the cloud server mainly uses a fuzzy search algorithm to query the data stored on the cloud server. This fuzzy search algorithm mainly relies on establishing an expandable keyword set as an index, which includes all possible spelling errors of the user. keywords, which inevitably makes the size of the file index very large and increases the storage overhead of the system. Con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/06G06F21/62
CPCG06F21/6227G06F2221/2107H04L9/0625H04L9/0631H04L9/0643H04L9/0819H04L9/0869H04L63/0442H04L63/062G06F21/602H04L9/0656H04L63/0478H04W12/009
Inventor 王翼
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products