Data searchable encryption and keyword search method, system, terminal and device

An encryption method and keyword technology, applied in file systems, digital data protection, electronic digital data processing, etc., can solve problems such as troublesome operation, limited searchable keywords, and increased data set construction time.

Active Publication Date: 2019-03-19
广州能西信息科技有限公司
View PDF15 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the keywords that can be queried are limited, and when modifying the keyword set, it is necessary to resubmit or build a new keyword set. This process increases the time for data set construction and also makes the operation more troublesome.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data searchable encryption and keyword search method, system, terminal and device
  • Data searchable encryption and keyword search method, system, terminal and device
  • Data searchable encryption and keyword search method, system, terminal and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0111] This embodiment discloses a data searchable encryption method, such as figure 1 As shown, the steps are as follows:

[0112] Step S1, obtaining the data file uploaded by the data owner;

[0113] Step S2, extracting the keywords of each data file; performing abstract extraction on each data file at the same time to obtain an abstract file; wherein, in this embodiment, the process of obtaining each abstract file is as follows:

[0114] First, extract the summary file from the data file through the document summary extraction algorithm; then use the file number corresponding to the summary as an index to store the summary in the corresponding position, and fill the remaining positions with characters to form a summary file.

[0115] Step S3, according to the corresponding relationship between each keyword and each data file, generate a dictionary γ after performing data processing through an encryption algorithm, wherein the dictionary γ stores the tags corresponding to e...

Embodiment 2

[0147] This embodiment discloses a keyword search method, such as figure 2 As shown, the steps are as follows:

[0148] Step X1, first obtain the dictionary γ obtained by the data searchable encryption method of the embodiment, the encrypted data file and the encrypted summary file;

[0149] When receiving the keywords sent by the user that need to be searched, first determine whether there is an encrypted data file that includes the keyword through the search dictionary γ; if so, return the corresponding encrypted data file to the user as a query result Decrypt; if not, enter step X2;

[0150] Wherein in the present embodiment, for each keyword that needs to be searched, the specific process of determining whether the keyword is included in the encrypted data file by searching the dictionary γ is as follows:

[0151] Step X11, for each keyword that the user needs to search, generate a pair of sub-keys K' for the keyword according to the master key K issued by the user 1 ,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data searchable encryption and keyword search method, a system, a terminal and a device. In the data searchable encryption process, the data file uploaded by a data owner isobtained. extracting the keywords of each data file; extracting a summary from each data file to obtain a summary file; a dictionary gamma is generated after data processing by an encryption algorithmaccording to the corresponding relationship between each keyword and each data file, and encrypted for each data file to obtain an encrypted data file; the digest file after encryption is obtained byencrypting each digest file. During keyword search: obtaining that dictionary Gamma; the encrypted data file and the abstract file; when receive the keyword search, searching whether the data file includes the keyword through the dictionary Gamma; if not, searching the keyword in the abstract file; if the search is successful, adding the label index pair of the keyword to the dictionary Gamma; the invention greatly improves the keyword search efficiency.

Description

technical field [0001] The invention belongs to the technical field of searchable encryption, in particular to a data searchable encryption and keyword search method, system, terminal and equipment. Background technique [0002] With the development of Internet applications, more and more users often implement search by inputting search keywords in a search page and triggering a search operation. Specifically, after the search page obtains the input search keyword and the triggered search operation, the corresponding associative words will be listed according to the input search keyword, and the user will get the search result related to the associative word when the user clicks on a certain associative word , and you can browse the detailed information corresponding to the search result by clicking the desired search result. Since the above search process needs to rely on multiple operations input by the user to obtain the information expected by the user, it has the disad...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F16/13
CPCG06F21/602G06F21/62
Inventor 李西明粟晨郭玉彬陶汝裕
Owner 广州能西信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products