Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Searchable encryption method and system, storage medium, vehicle-mounted network and intelligent power grid

An encryption method and indexing technology, applied in transmission systems, digital transmission systems, encryption devices with shift registers/memory, etc., can solve problems such as difficulty in index update and deletion, difficulty in rapid update, complete and complex index structure, etc.

Active Publication Date: 2020-08-18
XIDIAN UNIV
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007](3) At present, the index structure of some schemes is complete and complicated, which makes it difficult to update and delete the index
[0008] The difficulties in solving the above problems and defects are as follows: (1) It is a big challenge to improve the accuracy and accuracy of multi-keyword fuzzy matching under the premise of ensuring safety. (2) The cloud server stores a large amount of encrypted data, and it becomes extremely difficult to complete the rapid update of the index without leaking the secret

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Searchable encryption method and system, storage medium, vehicle-mounted network and intelligent power grid
  • Searchable encryption method and system, storage medium, vehicle-mounted network and intelligent power grid
  • Searchable encryption method and system, storage medium, vehicle-mounted network and intelligent power grid

Examples

Experimental program
Comparison scheme
Effect test

comparative approach 1

[0103] In the simulation of this invention, first test the generation time of the index, respectively extract keywords to 5, 10, 15, 20, and 25 files to construct the S-HashMap index, and compare it with other two schemes (comparison scheme 1: Privacy preserving multi -keyword ranked search over encrypted cloud data. Comparison scheme 2: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement.) for comparison, such as Image 6 As shown, the present invention has obvious advantages in index generation efficiency.

[0104] Figure 7 For the simulation of trapdoor generation time in this method, the present invention adopts an encryption algorithm similar to the comparison scheme, so the time consumption growth trend among multiple schemes is similar, but the time consumption of the present invention is still smaller than the other two comparison schemes. Figure 8 The simulation for which the time is retrieved in this method. In the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of wireless communication network security. The invention discloses a searchable encryption method and system, a storage medium, a vehicle-mounted networkand an intelligent power grid, and the searchable encryption method comprises the steps: carrying out vectorization of a keyword through a dual coding function, constructing an S-HashMap safety indexthrough the characteristics of a position-sensitive Hash function, and guaranteeing a single node and a single keyword on the index; measuring the similarity between the keywords by using the Euclidean distance, and generating a primary query position before query; and meanwhile, introducing a fault-tolerant value to realize fuzzy matching, and summarizing and sorting search results of each querykeyword by adopting an integral system to obtain Top-k files with the highest matching degree. According to the searchable encryption method, efficient and safe retrieval and updating of the data in the cloud environment are achieved. Aiming at data management research in a cloud environment, a searchable encryption scheme supporting multi-keyword fuzzy retrieval is designed aiming at high efficiency and safety of data retrieval and updating, so that safe and efficient data query and updating are realized.

Description

technical field [0001] The invention belongs to the technical field of wireless communication network security, and in particular relates to a searchable encryption method, system, storage medium, vehicle network, and smart grid. Background technique [0002] At present, with the rapid development of mobile computing and wireless network communication, the application of many emerging networks such as vehicle network and smart grid in storage and computing resources is restricted to a certain extent. Entities with limited resource management capabilities outsource data to cloud servers, and traditionally, data owners encrypt data and outsource it to cloud servers. Although the encryption of plaintext can ensure the confidentiality of data, it brings a large overhead for data query use, because these operations are only applicable to plaintext and not to ciphertext. If the cloud server returns the ciphertext data to the user for processing, it will obviously increase the com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/903H04L9/06H04L29/08H04L29/06
CPCG06F16/903H04L9/0631H04L9/0643H04L67/10H04L63/10
Inventor 樊凯陈琪王昊洋金雄海李晖
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products