Verifiable ciphertext data range query method

A technology of data range and query method, applied in the field of cloud computing, can solve problems such as inability to obtain correct conclusions and analysis deviations

Active Publication Date: 2018-06-22
JINAN UNIVERSITY
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the sample of the case is incomplete, the analys...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verifiable ciphertext data range query method
  • Verifiable ciphertext data range query method
  • Verifiable ciphertext data range query method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0068] This embodiment discloses a verifiable ciphertext data range query method, the steps are as follows:

[0069] Step S1, for each local data that the data owner needs to upload to the cloud server, first sort the local data that needs to be uploaded to the cloud server at the data owner terminal according to the order from large to small or from small to large, and then for For each local data, record the front and rear data of each local data at the same time, and obtain the triplet data of each local data; at the same time, convert each local data into a prefix set, and according to the sorting of each local data, the prefix set of each local data Stored in a tree-like PBtree;

[0070] Wherein, in this step, when sorting the local data that needs to be uploaded to the cloud server according to the order from large to small, the first local data and the positive infinity symbol and the second local data form triplet data, The last local data, the penultimate local data ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a verifiable ciphertext data range query method. The method comprises the steps that sorting is conducted aiming at each local data to obtain triple data and prefix sets of each local data, and the prefix sets of each local data are stored in a PBtree; encryption is conducted aiming at each triple data and each prefix set, and each encrypted local data is stored in leaf nodes in the PBtree; the above processed data is transmitted to a cloud server; a trap door is generated through the query range, searching is conducted by the cloud server in the PBtree by using the trap door, finally the ciphertext data in the corresponding searched leaf nodes is returned, decryption is conducted on the ciphertext data by a data user, and whether or not the size of the obtained data is constant is determined according to the decrypted data to determine whether or not the results returned by the cloud server are complete. According to the method, by storing additional information in the PBtree leaf nodes, user queries are verifiable to prevent incompleteness of the queried results of the cloud server.

Description

technical field [0001] The invention relates to the field of cloud computing, in particular to a verifiable query method for ciphertext data range. Background technique [0002] In recent years, driven by the rapid development of Internet technology, our life enjoys all kinds of convenience brought by Internet technology all the time. In terms of data storage, data outsourcing models such as cloud storage have been recognized by more and more users. Cloud storage services can be divided into public cloud and private cloud in terms of deployment methods. The private cloud is used within the enterprise to provide data upload, storage and sharing services. Because it is used within the enterprise, the private cloud is controllable for users to access data. Within the enterprise, only users authorized by the administrator can access the data stored in the cloud server. The administrator can stop certain users' access rights at any time. Since the server is local and not conne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/64H04L9/06H04L29/06
CPCG06F21/64H04L9/0643H04L63/0442
Inventor 赖俊祚张江河王传胜李燕玲熊婕
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products