An Efficient and Robust Dynamically Searchable Symmetric Encryption Method and System

A symmetric encryption and robust technology, applied in the field of cloud storage security, can solve the problems of inability to perform normal retrieval, damage to user data, and inability to guarantee the robustness of searchable symmetric encryption methods, achieving efficient retrieval, improving robustness, and ensuring The effect of forward security

Active Publication Date: 2021-04-20
HUAZHONG UNIV OF SCI & TECH +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, in the process of using, the user may delete a keyword that does not exist, or delete a keyword repeatedly, or delete this keyword before adding a keyword, for security and confidentiality Considering these errors, traditional searchable symmetric encryption methods cannot detect these errors, and these errors may be fatal to the ciphertext retrieval process. In severe cases, user data will be damaged and normal retrieval cannot be performed.
In general, the robustness of existing searchable symmetric encryption methods cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Efficient and Robust Dynamically Searchable Symmetric Encryption Method and System
  • An Efficient and Robust Dynamically Searchable Symmetric Encryption Method and System
  • An Efficient and Robust Dynamically Searchable Symmetric Encryption Method and System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0077] Before explaining the technical solution of the present invention in detail, a brief introduction to the architecture of the outsourced storage system is given. like figure 1 As shown, the outsourced storage system includes two entities, the retrieval client and the retrieval server. The retrieval client is the data owner. Its main function is to initialize the entire system and generate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an efficient and robust dynamically searchable symmetric encryption method and system, belonging to the field of cloud storage security, including: for any keyword w, obtain the key used in the latest operation associated with it at the retrieval client Information and the corresponding ciphertext index L' and trapdoor T' to generate the ciphertext of the current operation and send it to the retrieval server, so as to store it in the ciphertext database; the ciphertext meta information of the generated ciphertext includes L ’ and T’; the ciphertext meta-information of the deletion operation ciphertext also includes the deletion credential; the key information is updated when the retrieval ciphertext is generated, and the ciphertext meta-information also includes the difference between the previous retrieval operation and the key used in the current retrieval operation To update the credentials between, send L' and T' while sending the retrieval ciphertext; at the retrieval server, obtain all the ciphertexts associated with the keyword w, delete the ciphertexts that need to be deleted, and send the result set to the retrieval client. The invention can improve the robustness of the searchable symmetric encryption method.

Description

technical field [0001] The invention belongs to the field of cloud storage security, and more specifically relates to an efficient and robust dynamically searchable symmetric encryption method and system. Background technique [0002] Data outsourcing storage is a new trend after the development of cloud computing and cloud storage technology to a certain extent, it can provide users with convenient access to data and safe backup. In the outsourced storage scenario, as long as there is Internet, users can access their files anytime and anywhere, and they don’t need to worry about data loss caused by damage to their local devices. Therefore, people are now more and more inclined to use outsourced data storage technology. [0003] In data outsourcing storage, data privacy and security are very important, and the data uploaded by users often contains secret information that you do not want others to know. At this point, it is necessary to encrypt the data to protect the plaint...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62H04L29/06
CPCG06F21/602G06F21/6218G06F2221/2107H04L63/0435
Inventor 徐鹏陈天阳金海王蔚
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products