Verifiable encryption and decryption method supporting multi-keyword weighted retrieval and result sorting

A keyword, encrypted file technology, applied in digital data information retrieval, unstructured text data retrieval, special data processing applications, etc.

Active Publication Date: 2020-05-15
山东齐鲁知识产权交易中心有限公司
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when using traditional k-NN technology, we have to face the problem of a large number of key management, and key management has always been a difficult problem in the cryptographic field.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verifiable encryption and decryption method supporting multi-keyword weighted retrieval and result sorting
  • Verifiable encryption and decryption method supporting multi-keyword weighted retrieval and result sorting
  • Verifiable encryption and decryption method supporting multi-keyword weighted retrieval and result sorting

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0081] Support multi-keyword weighted retrieval and result sorting and verifiable encryption and decryption methods, such as figure 2 As shown, it specifically includes the following steps:

[0082] 1) System establishment

[0083] 1.1) Generate keyword dictionary and attribute set

[0084] First, the trusted authority TA pre-defines the system keyword dictionary K={k 1 ,k 2 ,k 3 ,k 4 ,k 5 ,k 6} and attribute set Att={att 1 ,att 2 ,att 3 ,att 4 ,att 5 ,att 6}, where k 1 Indicates cloud storage technology, k 2 Indicates deduplication technology, k 3 Indicates the retrieval technique, k 4 Indicates the audit technique, k 5 Indicates blockchain technology, k 6 Represents machine learning techniques. att 1 Indicates the user's country, att 2 Indicates the province to which the user belongs, att 3 Indicates the city to which the user belongs, att 4 Indicates user gender, att 5 Indicates whether the user is married, att 6 Indicates the user's graduation sch...

Embodiment 2

[0114] Such as image 3 As shown, on the basis of Embodiment 1, when the data owner DO needs to store files, the encrypted file, encrypted file index and file keyword signature set are uploaded. Data owner DO of uploaded file f 1 For example, the specific steps are as follows:

[0115] 2.1) Generate file index

[0116] Data Owner DO 1 Generate d(d=6) dimension keyword index u=(u according to file f 1 , u 2 ,...,u 6 ), where u i (1≤i≤6) means keyword k i The correlation score Score(k j ,f)=TF j ×IDF j ,1≤j≤6, where (wherein the term frequency TF shows the frequency of the keyword in the file, and the inverse document frequency IDF shows the importance of the keyword in the entire file set, specifically, n j Indicates the keyword k j Frequency of occurrence in file f; |f| means {n j}; N represents the number of files in the entire collection; N j Indicates that it contains the keyword k j number of files);

[0117] 2.2) Encrypted file index

[0118] Data Own...

Embodiment 3

[0128] On the basis of Embodiment 1, when a data user DU needs to retrieve a file, he needs to Figure 4 Steps to generate a trapdoor and send it to the cloud server CS; the cloud server CS then according to Figure 5 Steps to retrieve the files in the cloud through the trapdoor, and finally return the retrieved files to the data user DU. Data User DU 1 For example, the specific steps are as follows:

[0129] 3.1) Generate search query

[0130] data user DU 1 According to the keyword dictionary K of the system, generate a multi-keyword set K' to be asked, and then generate keyword weights a=(a 1 ,a 2 ,...,a 6 ),in

[0131] For example, DU 1 Need to retrieve keywords containing k 3 (retrieval technique) and k 6 (Machine learning technology) For files with two keywords, the weighted values ​​corresponding to the two keywords are 0.4 and 0.6 respectively. The larger the weight value, the more important the keyword, and the data user DU 1 The weighted search query for...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a verifiable encryption and decryption method supporting multi-keyword weighted retrieval and result sorting. Firstly, an outsourcing file is encrypted based on an attribute-based encryption idea, so that the access permission of a data user is preset, and the data user meeting the attribute requirement can directly decrypt a retrieved file. Secondly, a k-nearest neighbor(k-NN) technology is improved, so that communication burden caused by the fact that a data owner and a data user need to share a splitting factor in advance is reduced and avoided, and meanwhile, theaccuracy of multi-keyword retrieval is also improved. Thirdly, although the cloud server is supposed to be not completely credible, most of existing retrieval schemes do not consider verification of retrieval results returned by the cloud server, and in the method, a data user can verify whether a retrieval result file contains all queried keywords or not, so that correctness of the retrieval fileis verified.

Description

technical field [0001] The invention belongs to the technical field of retrieval of encrypted files in cloud storage, and in particular relates to a verifiable encryption and decryption method that supports sorting and verifiable results of multi-keyword weighted retrieval. Background technique [0002] As a basic branch of cloud computing, cloud storage can provide data owner (Data Owner, DO) with the service of storing files, and at the same time, it also needs to support files stored on the cloud to be retrieved on-demand from time to time. With the rapid development of cloud storage, more and more DOs choose to store files on cloud servers (Cloud Server, CS), which can not only reduce the local storage burden of DOs, but also make full use of the powerful retrieval capabilities of the cloud platform. . However, existing keyword-based techniques for retrieving data on the cloud have numerous challenges in terms of security, functionality, and efficiency. [0003] The fi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/33G06F16/338G06F21/60G06F21/62
CPCG06F16/3334G06F16/338G06F21/602G06F21/6218G06F2221/2107
Inventor 李艳平梁岩荣李彦卓段雅婷
Owner 山东齐鲁知识产权交易中心有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products