Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Fuzzy Query Encryption Method Supporting Dynamic Authentication in Untrusted Cloud Computing Environment

A computing environment and dynamic verification technology, applied in computing, computer security devices, instruments, etc., can solve the problem that there is no method that can simultaneously support encrypted data fuzzy query, verification result and dynamic update.

Inactive Publication Date: 2019-05-28
CENT SOUTH UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing queryable encryption methods only address issues such as fuzzy query, verifiable query, or dynamic update alone, but no method can support fuzzy query, verification results, and dynamic update of encrypted data at the same time.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Fuzzy Query Encryption Method Supporting Dynamic Authentication in Untrusted Cloud Computing Environment
  • A Fuzzy Query Encryption Method Supporting Dynamic Authentication in Untrusted Cloud Computing Environment
  • A Fuzzy Query Encryption Method Supporting Dynamic Authentication in Untrusted Cloud Computing Environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0053] The experimental hardware environment is Windows 7 operating system, the CPU is Intel Core i5-4590 (3.30GHz), the memory is 4GB, and it is implemented by Java programming language. The data set is a collection of IEEE INFOCOM papers in the past 10 years, containing more than 3,500 articles. By extracting the keywords contained in the documents, a keyword set is formed. The experiment uses the 256-bit AES symmetric encryption algorithm to encrypt and decrypt the document, uses the RSA accumulator with a key length of 1024 bits to generate verification evidence, and uses SHA-256 as the hash function.

[0054] A fuzzy query encryption method that supports dynamic verification in an untrusted cloud computing environment. The overall architecture is as follows: figure 1 shown, including the following steps:

[0055] Step 1: The data owner uses the k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fuzzy query encryption method supporting dynamic verification in an unreliable cloud computing environment. The method achieves protection of user query privacy in a cloud computing environment, and improves a query experience of an encrypted data in the cloud computing environment. The method defines a similarity between keywords by editing a distance, a fuzzy keyword set is constructed by using wildcards, and a security index is constructed based on an inverted index, which enables users to query fuzzy keyword. A verifiable set is constructed using verifiable techniques to verify whether nor not a server tampers with query results and to verify whether or not the query results returned by the cloud server are correct and complete. In order to solve the problem that users need to update a lot of data in the cloud computing environment, the data is updated efficiently. The method supports the users to do the fuzzy query, update the encrypted data dynamically, verify the correctness and integrity of the query results, and improves the users' query experience under the premise of protecting data privacy.

Description

technical field [0001] The invention relates to the field of computer science and technology, in particular to a fuzzy query encryption method supporting dynamic verification in an untrustworthy cloud computing environment. Background technique [0002] With the rapid development of cloud computing, queryable encryption schemes have gradually gained people's attention and recognition. A large number of users upload personal files through cloud disks. However, while people enjoy the convenience brought by cloud computing services, they also face the risk of sensitive information leakage. In a cloud computing environment, users lose direct control over their data. In order to protect users' private information from being cracked by the cloud, many users choose to encrypt their personal data before uploading. Users need to query on encrypted data sets, and plaintext information query methods cannot be applied to encrypted data, so queryable encryption methods have become a ho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/14G06F21/60H04L29/06
CPCG06F16/152G06F21/602H04L63/0435
Inventor 罗跃逸朱小玉袁修贵
Owner CENT SOUTH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products