Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Verifiable semantic security multi-keyword search method in cloud storage

A keyword search and semantic security technology, applied in the field of encrypted search, can solve problems such as untrustworthy key generation center, unclear authorization description, and no query result verification

Active Publication Date: 2019-03-08
HENAN UNIV OF SCI & TECH
View PDF9 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this scheme, the user's authorization still adopts the "0" or "1" authorization model. Once the user is authorized, the user management agency will send the key that can be used to generate the query trapdoor to the querying user, that is, the authorized key. The "1" model, such an authorization method allows users to request any multi-keyword connection query, which cannot meet the requirements in many applications, and there is no query result verification function in this solution
[0007] The Chinese patent with the application number CN201711332605.0 "Certificate-free verifiable multi-keyword ciphertext query system and method" specifically relates to a non-certificate verifiable multi-keyword ciphertext query system and method, which introduces a key In this scheme, the key generation center is different from the traditional ciphertext query based on the public key encryption algorithm. In this paper, the key generation center is also assumed to be untrustworthy. The information generates a partial private key, and the data owner and data user generate a complete private key based on the partial private key and secret value, so that the key generation center cannot obtain the private key of the data owner and data user, thus increasing the protection of the private key. safety
However, in this technical solution, the user’s authorization description is not clear, and before the data owner outsources the data, the data owner uses the public key encryption algorithm to encrypt the plaintext document set. Since the public key encryption algorithm has the characteristics of slow encryption speed, all Encrypting relatively large plaintext files with public key algorithms is impractical
Moreover, this technical solution only provides a technical framework, and does not provide a specific algorithm description
[0008] Moreover, the four existing technologies listed above are not semantically secure, which is not enough security for applications with semantic security requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verifiable semantic security multi-keyword search method in cloud storage
  • Verifiable semantic security multi-keyword search method in cloud storage
  • Verifiable semantic security multi-keyword search method in cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0161] Below we combine as figure 1 The system structure diagram shown and the electronic medical record EMR shown in Table 1 illustrate that the technical solution of the present invention executes a multi-keyword search process for electronic medical records.

[0162] Table 1 Electronic Medical Records

[0163]

[0164]

[0165] Step 1, system initialization, TA is responsible for the generation of the system key, the specific process is as follows in steps 1.1-1.3:

[0166] Step 1.1: TA runs the dual vector space generation algorithm δ dpvs (1 λ ,N) output a group N is the dimension of the vector space, N=2n+3, and n is the length of the attribute vector and the query vector.

[0167] Step 1.2: TA runs the orthogonal basis generation algorithm δ ob (1 λ ,N)N=2n+3, output is an orthonormal basis, that is, for all Satisfy δ when i=j i,j = 1, otherwise δ i,j =0.

[0168] Step 1.3: TA runs initialization algorithm Setup(1 λ ,2n+3), return system publi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a verifiable semantic security multi-keyword search method in cloud storage. The method comprises the following six steps: initializing the system, establishing a shared key between a TA and a data owner, encrypting the data document and its index by the data owner, generating a query trapdoor by the TA, performing security query by a cloud server, and querying a user verification query result. The method realizes the semantic security multi-keyword connection query of the encrypted index by inner product predicate encryption and dual system encryption, and implementsfine-grained authorization and overcomes the shortcomings of the traditional "0" or "1" authorization model by introducing a trusted TA. The TA verifies the query user's query qualification and sendsa query trapdoor for the authenticated user, which solves the problem that the data owner needs to be online always. The method, which can achieve fine-grained authorization, resist dictionary attacks, and verify the correctness of query results, is a semantic security multi-keyword search method.

Description

technical field [0001] The invention relates to the technical field of encrypted search, in particular to a multi-keyword search method with verifiable semantic security in cloud storage. Background technique [0002] Cloud computing, as a new computing model after distributed computing and grid computing, can provide powerful data storage, management and computing capabilities. In recent years, with the rapid development of cloud computing, many companies or organizations have begun to outsource data to cloud servers, which not only enables users to access remote data anytime and anywhere, but also reduces users' local computing and maintenance costs. However, cloud servers are maintained and managed by third-party Internet commercial companies (such as Amazon, Google, etc.), and usually do not belong to the same trust domain as users. Therefore, while cloud computing brings convenient services, it may also cause severe security risks. In order to protect data security an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/30G06F16/953
CPCH04L9/3033H04L9/3073H04L63/045H04L63/062H04L67/1097
Inventor 张丽丽张志勇李玉祥宋斌牛丹梅赵长伟向菲靳正芬
Owner HENAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products