A searchable encryption system and method based on a suffix tree

An encryption system and suffix tree technology, applied in the Internet field, can solve problems such as inability to meet various user needs, untrustworthy third-party servers, fixed search formats, etc.

Pending Publication Date: 2019-05-28
NORTHEASTERN UNIV
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, while cloud storage services bring convenience, it also makes the security issues of data storage and processing increasingly prominent.
Third-party servers are often untrustworthy, and users inevitably face the risk of information leakage
[0005] However, the search encryption scheme for keyword processing has a relatively fixed search format
The keywords of the file are pre-set, which cannot meet various user needs
For example, genetic data in the electronic medical field has a simple structure and large similarities, and it is difficult to define its keywords

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A searchable encryption system and method based on a suffix tree
  • A searchable encryption system and method based on a suffix tree
  • A searchable encryption system and method based on a suffix tree

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0069] A searchable encryption system based on a suffix tree, using a two-party entity scheme, that is, the client and the server, such as figure 1 As shown, it includes initialization module, security index building module, substring search module and verification and decryption module;

[0070] The initialization module is used to construct an encryption key and a suffix tree;

[0071] Construct encryption key: run by the client, initialize the public and private keys of the client and the keys required for encryption;

[0072] The secure index construction module is used for index construction and index encryption;

[0073] Build index: run by the client, build the d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a searchable encryption system and method based on a suffix tree, and relates to the technical field of the Internet. The system comprises an initialization module used for constructing an encryption key and a suffix tree, a security index construction module used for constructing an index and encrypting the index, a sub-character string search module used for constructing asearch token and searching, and a verification decryption module used for decrypting and verifying. The method comprises the following steps of firstly, constructing a suffix tree and an encryption index for a given character string, and uploading the encryption index to a server; and when the client carries out character string search, generating and sending a search token to the server, enabling the server to search according to the search token and send a search result to the client to complete the search. According to the searchable encryption system and method based on the suffix tree, the efficient searching of any character string is achieved, the subcharacter string searching problem of ciphertext data is solved, and a user can inquire the ciphertext data without using keywords.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a searchable encryption system and method based on a suffix tree. Background technique [0002] With the rapid development of Internet technology, computer network technology has benefited every household. The 2018 Global Digital Report shows that the number of Internet users has exceeded the 4 billion mark. The continuous increase in the number of users leads to a surge in data information. In order to save local storage space and make a backup for existing data, cloud computing combines virtualization technology with the network, stores data in remote servers, and processes data by the server. However, while cloud storage services bring convenience, it also makes the security issues of data storage and processing increasingly prominent. Third-party servers are often untrustworthy, and users inevitably face the risk of information leakage. Therefore, protecting the secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F16/903G06F16/901
CPCG06F16/901G06F21/62G06F16/903G06F21/60
Inventor 周福才郭斯栩葛悦孙僖泽
Owner NORTHEASTERN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products