Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A multi-user encrypted search method in cloud storage

A search method and multi-user technology, applied in the field of cloud computing security, can solve problems such as system damage, and achieve the effect of dynamic management, data security protection, efficiency and high efficiency

Active Publication Date: 2018-06-15
SOUTHEAST UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In a multi-user encrypted search environment, if the method of sharing secret keys is adopted, if a user revokes the search permission, but since the decryption key has been distributed to the revoked user, once the revoked user leaks the decryption key, it will affect the entire System wreaks havoc
Therefore, the management of secret keys will become a thorny issue

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A multi-user encrypted search method in cloud storage
  • A multi-user encrypted search method in cloud storage
  • A multi-user encrypted search method in cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] This embodiment is designed to complete the initial generation and distribution of secret keys. The purpose of key distribution is: users have their own key material, and the trusted private cloud stores their own key and the user's auxiliary key. Expressed in a form:

[0037] steps

content

100

TPC initializes to generate key material

102

TPC makes the public key public and the corresponding secret key remains private

[0038] 104

TPC calculates user secret key and user auxiliary secret key

106

TPC sends the user secret key to the user and stores the user auxiliary secret key at the same time

[0039] The steps in Embodiment 1 are described as follows:

[0040] Step 100: TPC initialization generates key material. TPC creates a q-order cyclic group G according to the generator g; H is a secure hash function, f is a pseudo-random function f s (), s is its f s The secret key of (), h=g R ,in De...

Embodiment 2

[0047] This embodiment is designed to complete the data upload stage. The purpose of this stage is to encrypt the data and keywords that users need to upload and store them on the public cloud. Data encryption upload is divided into user encryption and TPC encryption upload. Including but not limited to the following steps (expressed in a table):

[0048] steps

content

108

User U first needs to encrypt data and data keywords

110

The user sends the encrypted data and the keywords of the data to the TPC for processing

112

After the user passes the TPC authentication, the TPC will encrypt again

114

TPC uploads the encrypted data to the public cloud

[0049] The process of data upload phase is as follows figure 2 shown.

[0050] The steps in Embodiment 2 are described as follows:

[0051] Step 108: the first user u encrypts the data d to be uploaded and the keywords of the data d.

[0052]

[0053] Step 110:...

Embodiment 3

[0059] This embodiment is designed to complete the data search phase. The purpose of this stage is: the user submits a search request to the TPC, the TPC processes the search request, and sends the search trapdoor query value to the public cloud for search, and finally the TPC returns the data that the user is interested in. Including but not limited to the following steps (expressed in a table):

[0060] steps

content

116

The user submits a search request to the TPC, and the TPC then distributes the search material after authenticating the user

118

User generates search trapdoor, sent to TPC

120

TPC takes out the user's auxiliary secret key and calculates the trapdoor query value

122

Match the trapdoor query value with the data item on the public cloud, and return the matched data to TPC

124

TPC first processes the retrieved data and sends it to the second user u 2

126

The user decrypts the data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-user encrypted search method in cloud storage, comprising an initialization stage, a data uploading stage, and a data search stage. In the initialization stage, secret key material is distributed from a trusted private cloud to a group of authorized users. In the data uploading stage, a data owner encrypts data and keywords through an encryption algorithm and sends the encrypted data to the trusted private cloud, and the trusted private cloud encrypts the data for the second time and stores a data packet to a public cloud. The data search stage includes the following steps: a data user sends a search request to generate trapdoor query; after receiving a trapdoor, the trusted private cloud checks the legitimacy of the search identity of the user, and uses a matching algorithm to search the encrypted data on the public cloud after the legitimacy of the search identity is proved; after the data is searched successfully, matching searched data to be decrypted is returned to the trusted private cloud; and the trusted private cloud pre-decrypts the data and returns the data to the data user for decryption. By using the method of the invention, a user not only can upload his or her data, but also can search data uploaded by other users.

Description

technical field [0001] The invention relates to a multi-user encrypted search method in cloud storage, belonging to the technical field of cloud computing security. Background technique [0002] From the online mail system email to Facebook's online photo album service, more and more cloud storage is entering the lives of ordinary people. With the continuous development of cloud computing technology, cloud storage is widely used in services such as backup or outsourcing data to reduce operating costs, such as Amazon Storage Service, Baidu Cloud. However, these remote servers cannot be fully trusted because administrators or hackers may have full access to the server with root privileges and can manipulate plaintext data. Therefore, in order to safely store sensitive data on an untrusted server, the data must be encrypted, which reduces security and privacy risks by hiding all information about the plaintext data. Although storing encrypted data can ensure data security and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/08H04L29/06
Inventor 万长胜潘浩黄杰
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products