Searchable encryption method based on semantic sorting of keywords

An encryption method and keyword technology, applied in the field of cloud security, can solve the problems of inability to search, low efficiency of full-text search, and unsuitable for large-scale data cloud computing environment.

Inactive Publication Date: 2018-12-21
SHANGHAI MARITIME UNIVERSITY
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] When the searchable encryption technology was first proposed, it used a symmetric key to encrypt each word in the document with a double-layer structure, but the full-text search method was too inefficient, and then a keyword-based public key searchable encryption system was proposed , so that any user with a public key can store data to the server, and only users with a private key can search for keywords, but this bilinear pairing-based structure makes retrieval efficiency very low, and is not suitable for large-scale data cloud computing environment
[0004] In order to better meet the search request, a keyword fuzzy search scheme was proposed. By constructing a keyword fuzzy set, it can tolerate spelling mistakes and inconsistent formats when users search, but the disadvantage is that they cannot search for documents related to the semantics of keywords.
[0005] Although some encryption methods in the existing research methods support retrieval methods such as semantic fuzzy search, multi-keyword search, parallel search, and similarity retrieval, they cannot take semantic similarity into document scoring.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Searchable encryption method based on semantic sorting of keywords
  • Searchable encryption method based on semantic sorting of keywords
  • Searchable encryption method based on semantic sorting of keywords

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further elaborated below by describing a preferred specific embodiment in detail in conjunction with the accompanying drawings.

[0039] Such as figure 1 As shown, the searchable encryption method based on keyword semantic ranking of the present invention significantly improves the performance effect in the semantic fuzzy ranking of keywords by constructing a searchable index tree, and the retrieval efficiency of authorized users is greatly improved. The detection method Contains the following steps:

[0040] Step S1, system initialization: the data owner starts from the plaintext document set F=(f 1 ,f 2 ,..., f m ) to extract keywords to get keyword set W=(w 1 ,w 2 ,...,w n ), and then generate a key SK of an encrypted plaintext document set, and send the key SK of the encrypted plaintext document set to the authorized user, where w 1 ,w 2 ,...,w n are the extracted keywords respectively;

[0041] Step S2, the data owner accordi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a searchable encryption method based on semantic sorting of keywords, includes such steps as generating encryption key by data owner and sending it to authorized user, extracting keywords from plaintext document set, constructing document mark vector according to keywords and sending it to private cloud server, creating secure index tree and sending it to public cloud server; The authorized user sends the query mark vector generated by the search keyword to the private cloud server, and sends the generated query trap to the public cloud server. The private cloud servermatches the query tag vector with the document tag vector, and sends the set of security index identifiers that may satisfy the user's query request to the public cloud server. The public cloud servercalculates document similarity, sorts the calculation results, and returns the set of ciphertext documents with the highest similarity to the authorized users. By realizing the multi-keyword semanticsorting method, the invention not only ensures the data privacy safety, but also effectively improves the retrieval efficiency.

Description

technical field [0001] The invention relates to the field of cloud security, in particular to a searchable encryption method based on keyword semantic ranking. Background technique [0002] With the rapid development of cloud technology, more and more users outsource their data to cloud servers. However, while cloud servers provide users with high-quality data storage services, they also have a great impact on users' data privacy. threaten. In order to ensure that the user's sensitive data is not leaked, most data owners use encryption technology to encrypt and store the data before uploading the data to the cloud server. Therefore, some search technologies for encrypted data have emerged as the times require. After the data is encrypted and stored in the cloud server, neither the cloud server administrator nor external attackers can obtain the real content of the data, which protects the privacy of users. But this has brought great challenges to the information retrieval ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60G06F17/30
CPCG06F21/602G06F21/6227G06F2221/2107G06F2221/2141
Inventor 肖婷婷韩德志王军毕坤段乐天
Owner SHANGHAI MARITIME UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products