Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Searchable encryption method and system for supporting fuzzy retrieval of word morphology and word meaning in cloud environments

An encryption method and cloud environment technology, applied in the field of information security, can solve problems such as fuzzy matching that cannot support word forms, ignoring the fuzzy meaning of keywords, and consuming storage space.

Active Publication Date: 2018-10-26
XIDIAN UNIV
View PDF5 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In summary, the problems in the prior art are: The classic fuzzy searchable encryption only supports word form fuzzy matching, that is, it can support requests with misspellings, ignoring the ambiguity in the meaning of keywords; the implemented scheme that supports fuzzy retrieval of synonyms expands synonyms for keywords, but cannot support Fuzzy matching of word forms; on the other hand, in the existing schemes, the method used more for fuzzy matching of word forms is to construct word form fuzzy sets based on wildcards, which consumes a lot of storage space

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Searchable encryption method and system for supporting fuzzy retrieval of word morphology and word meaning in cloud environments
  • Searchable encryption method and system for supporting fuzzy retrieval of word morphology and word meaning in cloud environments
  • Searchable encryption method and system for supporting fuzzy retrieval of word morphology and word meaning in cloud environments

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0055] Based on the secure knn retrieval technology, the present invention can not only realize multi-keyword fuzzy retrieval, but also effectively defend against trapdoor association attacks, etc., simplifies the process of keyword index encryption and decryption, and realizes the semi-trusted situation of the cloud server The following implements the search for ciphertext. First, the data owner has a set of plaintext files F that need to be uploaded. All files in the file set F are encrypted by the data owner using an encryption algorithm to form an encrypted file set C. The keyword set is extracted from the file, and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information security, and discloses a searchable encryption method and system for supporting fuzzy retrieval of word morphology and word meaning in cloud environments. The method includes establishing a security index by adopting a Bloom filter structure to support file dynamic update; accomplishing word morphology fuzzy matching by adopting a locally sensitive Hash function; performing word meaning expansion on keywords by using a natural language toolbox, constructing a word meaning fuzzy set, and inserting the word meaning fuzzy set into the established security index so that support word meaning keyword retrieval can be converted into accurate matching retrieval; performing inner product operation to realize the ordering of retrieval results by establishing query vectors and index vectors; and using the Hash function and a security knn algorithm to make the method and the system effectively resist selection keyword attacks so that thesearching of cryptograph on a cloud server under semi-trusted conditions. Cryptograph searching functions can be achieved; and the method and the system can support fuzzy retrieval of word morphologyand word meaning, multi-keyword retrieval, and dynamic adding and deleting files.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a searchable encryption method and system supporting fuzzy retrieval of word forms and meanings in a cloud environment. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: With the increasing popularity of people storing data in the cloud, while people are storing more and more data in the cloud, the security and reliability of their data has received unprecedented attention. Although the use of encryption technology to encrypt and store files in the cloud can effectively ensure the confidentiality of data, but in this way the user's data loses a lot of operability, for example, keyword retrieval of ciphertext files. In order to provide ciphertext search methods, a large number of searchable encryption methods have emerged. Efficient multi-keyword fuzzy search for encrypted data is an ideal g...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/08G06F17/30
CPCH04L9/0869H04L63/0428H04L63/06H04L63/10H04L67/06H04L67/10
Inventor 李晖石素丽李凤华朱辉龚柏翰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products