Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Fine-grained multi-user security searchable encryption method in cloud-edge collaborative environment

A technology of collaborative environment and encryption method, applied in the field of multi-user secure searchable encryption, to achieve the effect of reducing computing cost

Pending Publication Date: 2022-06-17
HUNAN UNIV OF SCI & TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

So data owners are unwilling to share keys in real life, and another solution allows each data owner to encrypt the data index with its own key, in which case the data user has to share the key with all data owners The query trapdoor must be submitted multiple times to complete the retrieval of the ciphertext, so compared with the single-user model, the most important challenge is that different data owners should be able to choose different keys to build a secure searchable index to ensure that the data flexibility and security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fine-grained multi-user security searchable encryption method in cloud-edge collaborative environment
  • Fine-grained multi-user security searchable encryption method in cloud-edge collaborative environment
  • Fine-grained multi-user security searchable encryption method in cloud-edge collaborative environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The present invention will be further described below with reference to the accompanying drawings and embodiments.

[0048] like figure 1 As shown, a fine-grained multi-user secure searchable encryption method in a cloud-edge collaborative environment, the steps are:

[0049] Step 1: The present invention takes the cloud-edge collaboration platform as the research background, and constructs a multi-user system model. The system model includes multiple data owners, multiple data users, cloud servers and edge servers. figure 2 As shown, the cloud server is defined as an “honest but curious” semi-trusted threat entity, and the edge server is defined as a trusted entity.

[0050] The second step is the system initialization phase.

[0051] The specific steps of the system initialization phase are:

[0052] Input a security parameter to the system model, output the public parameters of the system model, and construct the working environment: set G 1 , G 2 are two multi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fine-grained multi-user security searchable encryption method in a cloud-edge collaborative environment, which comprises the following steps of: constructing a multi-user system model by taking a cloud-edge collaborative platform as a research background; a system initialization stage; a security index construction stage; a query trap door generation stage; a security retrieval stage; and a ciphertext decryption stage. According to the method, in a cloud-side collaborative environment, a data owner constructs security indexes for different files by adopting a temporary key through an edge server, an authorized user generates a query trap door under the condition of not knowing the temporary key, and the cloud server correctly realizes keyword matching under the condition of not knowing the temporary key; a secure searchable encryption scheme of a plurality of data owners, a plurality of data users, a cloud server and an edge server is realized; in addition, under the cloud-side collaborative environment, the edge server is utilized to help the user to encrypt and decrypt the data, so that the computing cost of the user is remarkably reduced.

Description

technical field [0001] The invention relates to the field of data encryption, in particular to a fine-grained multi-user secure searchable encryption method in a cloud-edge collaborative environment. Background technique [0002] As a new computing model, cloud computing has the characteristics of powerful computing power, massive resources and on-demand allocation. With the maturity and rapid development of cloud computing technology, users with limited resources can store data in the cloud, and enjoy efficient and fast file storage and processing services at a small cost, while enjoying high-quality data services. The local management overhead is reduced, but data outsourcing leads to the separation of data ownership and management rights. How to ensure the security of data in cloud servers has become a key issue to be solved urgently in cloud computing. The common solution is to encrypt the user data first, and then upload the encrypted ciphertext data to the cloud. When...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32H04L9/40H04L67/06H04L67/10G06F16/13G06F16/14
CPCH04L63/0442H04L63/10H04L63/123H04L67/10H04L67/06H04L9/3033H04L9/3236H04L9/3073H04L9/3247G06F16/13G06F16/152H04L2209/72Y02D30/50
Inventor 张世文何家毅李梦玲晏紫微梁伟
Owner HUNAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products