Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A safe pair index construction and retrieval method capable of resisting keyword privacy disclosure

A keyword pair and construction method technology, applied in the direction of digital data protection, etc., can solve problems such as security restrictions, inability to prevent attacker keyword information, disclosure of keyword privacy, etc.

Active Publication Date: 2019-05-10
福建国科信息科技有限公司
View PDF1 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the determinism of search results still cannot prevent attackers from using data users' search patterns to obtain access keyword information.
[0015] Currently, the literature Liu C, Zhu L H, Wang M, and Tan Y-a. Search pattern leakage insearchable encryption: Attacks and new construction [J]. Information Sciences, vol.265, pp.176-188, 2014. Formally proposed the search pattern specific attack model, and gave two specific solutions (RDBC and RSBC), but the larger the segmentation factor l in this scheme, the lower the efficiency of the scheme, and the scheme is still from the perspective of access mode Keyword privacy will be leaked
[0016] Therefore, most of the current searchable encryption schemes based on keywords mainly resist keyword privacy leakage from the perspective of ciphertext indistinguishability and trapdoor indistinguishability for the sake of search efficiency. The security of these schemes has been greatly restricted due to the consideration of keyword privacy leakage in both the acquisition mode and the search mode.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A safe pair index construction and retrieval method capable of resisting keyword privacy disclosure
  • A safe pair index construction and retrieval method capable of resisting keyword privacy disclosure
  • A safe pair index construction and retrieval method capable of resisting keyword privacy disclosure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0097] Before describing the method of present embodiment in detail, earlier the design concept of this method is described as follows:

[0098] The system model designed by the present invention includes two types of users and cloud servers, one is the data owner (dataowner, DO) responsible for uploading shared data; the other is the data user (data user, DU), which is mainly reflected in the query The data to be queried, and the information you want to know; the server is a cloud service provider (cloud service provider, CSP), responsible for storing data for the data owner DO and retrieving data for the legitimate user DU. The relationship between the three parties is as figure 2 Shown:

[0099] Both the data owner DO and the legal user DU need to authenticate their identities in a trusted authentication center, and obtain authorization values ​​from the trusted authentication center. For the relevant key K and the document decryption key, DO only needs to share the colu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a security pair index construction and retrieval method capable of resisting keyword privacy disclosure. The method comprises the following steps: constructing a security pairindex and retrieving the security pair index, and the security pair index construction comprises the following steps: S1, a data owner calculates a related score corresponding to each keyword according to a to-be-uploaded data document, calculates a real index and encrypts and accesses a keyword pair set; S2, the data owner calculates a false index and a mixed index through a real index, encryptsthe false index and the mixed index by using an authorization secret key, and obtains a safe pair index by combining an access keyword pair set; S3, the data owner encrypts the to-be-uploaded data document to obtain a ciphertext document set; S4, the data owner uploads the security pair index and the ciphertext set to the cloud server. According to the method and the device, keyword privacy leakage caused by an access mode and a search mode based on keywords can be resisted.

Description

technical field [0001] The invention belongs to the technical field of searchable encryption in cloud computing security, and specifically relates to a security pair index structure and a retrieval method for anti-keyword privacy leakage. Background technique [0002] In the context of the era of big data, both individual users and large organizations have more and more data, such as the medical data generated by medical smart devices 24 hours a day or the daily Purchase and sales records result in serious shortage of local storage space for users. Based on cloud computing technology and network communication technology, cloud service providers concentrate a large number of computing resources and storage resources. Users with limited resources only need to pay a certain fee to the cloud service provider to easily use the computing and storage services provided by the cloud service provider. [0003] Due to the low cost of storage resources brought by cloud storage service...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60
Inventor 李艳萍曹强苏院
Owner 福建国科信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products