CN103297962A - Opportunity network route method and system based on encrypted fuzzy keywords - Google Patents

Opportunity network route method and system based on encrypted fuzzy keywords Download PDF

Info

Publication number
CN103297962A
CN103297962A CN2013101533333A CN201310153333A CN103297962A CN 103297962 A CN103297962 A CN 103297962A CN 2013101533333 A CN2013101533333 A CN 2013101533333A CN 201310153333 A CN201310153333 A CN 201310153333A CN 103297962 A CN103297962 A CN 103297962A
Authority
CN
China
Prior art keywords
fuzzy
interest
keyword
keywords
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013101533333A
Other languages
Chinese (zh)
Other versions
CN103297962B (en
Inventor
王飞
吴�琳
徐勇军
安竹林
黄晁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo Zhongke Integrated Circuit Design Center Co ltd
Institute of Computing Technology of CAS
Original Assignee
Ningbo Zhongke Integrated Circuit Design Center Co ltd
Institute of Computing Technology of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningbo Zhongke Integrated Circuit Design Center Co ltd, Institute of Computing Technology of CAS filed Critical Ningbo Zhongke Integrated Circuit Design Center Co ltd
Priority to CN201310153333.3A priority Critical patent/CN103297962B/en
Publication of CN103297962A publication Critical patent/CN103297962A/en
Application granted granted Critical
Publication of CN103297962B publication Critical patent/CN103297962B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides an opportunity network route method and system based on encrypted fuzzy keywords. The opportunity network route method includes the steps: S1, calculating fuzzy sets and trap door sets of subscribed interesting keyword sets, wherein the fuzzy sets and the trap door sets correspond to interesting keywords, S2, calculating the similarity between every two trap door sets through a similarity matching algorithm, S3, releasing nodes, extracting released interesting keyword sets according to the released content, calculating a search keyword set which corresponds to each interesting keyword in the released interesting keyword sets by means of a trusted third party, wherein the search keyword set is served as the control information of the released content, the control information and the encrypted released content are combined to form a released content package, and sending the released content package to all forwarding nodes which are connected with the released content package, and S4, establishing a route table with the route information of the released content package as the head portion and the identity label of the released content package as the tail portion after the forwarding nodes receive the subscribed interesting package.

Description

A kind of based on opportunistic network routing method and the system of encrypting fuzzy keyword
Technical field
The present invention relates to the information security technology in the information science field wireless communication, relate in particular to a kind of based on opportunistic network routing method and the system of encrypting fuzzy keyword.
Background technology
Opportunistic network has the general characteristic that postpones the tolerance network, and the chance of meeting of utilizing node motion to bring realizes the self-organizing network of communication, and its target is for the data communication problem in the circuit network between solving frequently.Several tangible characteristics are arranged in opportunistic network: 1. can't obtain routing iinformation from end-to-end link, the information that intermediate node will obtain according to oneself is carried out routing decision.2. do not have definite target, target normally meets the node of a certain feature, may be to belong to some zones, and also may be can finish with a kind of function, also may be interested in certain customizing messages.3. need utilize the information of various communication system different levels, this just makes application message in the opportunistic network, network information etc. all be retracted to same level, has formed flat network configuration.Along with popularizing and development of communication equipments such as mobile phone, panel computer, notebook computer, opportunistic network develops aspect application demand rapidly.
Content-based opportunistic network is a kind of opportunistic network that decides route according to the content of message, be used as routing iinformation with message content, coming down to drive with the interest of user in the opportunistic network communication of opportunistic network, so more precisely, is the opportunistic network centered by interest.With respect to based on the opportunistic network that copies, be that the opportunistic network of fundamental construction more is adapted to promotion and application in people's daily life with social context or message content, but at present content-based opportunistic network research, forefathers' work mostly makes up routing forwarding message based on clear and definite inquiry or index, this can cause such a case, when the user has only knowledge seldom to the content of being concerned about and during the solution having to take try, after submitting to complete inquiry to obtain content, they can feel to be kept in the dark themselves, have reduced the user interactivity of opportunistic network.
In addition, privacy protecting is based on very severe problem in the opportunistic network of content.In opportunistic network focusing on people, the forwarding of message need make up route by the content of pass-along message, no matter be that the issue of the broadcasting of recipient's interest and publisher's content all needs the forwarding by one or more different forwarding persons, though be the user equally, forwarding person is not received the person and the publisher trusts.So node wishes that the message that can send oneself carries out strict access control, the recipient is when carrying out the broadcasting of interest, do not wish other recipient, the interest that intermediate node is known oneself, and the publisher is when carrying out the issue of content, do not wish other publisher, intermediate node yet and oneself specify outside the recipient know own content distributed interest guiding.Thereby in content-based opportunistic network, forwarding how to carry out route under the situation of not revealing user privacy information becomes the problem of a sternness of containing opportunistic network development.
The search of cryptography key word is a kind of technology that the high in the clouds enciphered data is carried out keyword search that occurs along with the development of cloud memory technology, and the expert has carried out broad research to it both at home and abroad, and this is wherein remarkable based on the encryption retrieval technique achievement of symmetric key encryption.Yet in opportunistic network, the message of sender user's issue also needs between a plurality of publisher users to maintain secrecy mutually towards being one group of recipient user, and is as the same between a plurality of recipient users.Thereby it is more suitable based on the asymmetric-key encryption search technique.The thought of the key search technology on the enciphered data mainly contains two kinds based on the searching algorithm of homomorphic cryptography with based on the searching algorithm of trapdoor technology.Homomorphic cryptography is based on the cryptological technique of the computational complexity theory of a mathematics difficult problem.Obtain an output to handling through the data of homomorphic cryptography, this output is decrypted, its result is the same with the output result who obtains with Same Way processing unencrypted initial data.Be based on key search function on the enciphered data that trapdoor thought realizes based on the searching algorithm of trapdoor technology.Trap-door one-way function is the special one-way function of a class that a trapdoor is arranged.It at first is an one-way function, is easy in one direction calculate and is difficult in the other direction calculate.But, if obtain that secret trapdoor, then also can be easy at this function of another direction calculating.The effect of trapdoor is similar to the private key in the asymmetric-key encryption technology, and trapdoor function just is equivalent to cryptographic algorithm.
Summary of the invention
The invention provides a kind of based on opportunistic network routing method and the system of encrypting fuzzy keyword; in order to protect privacy of user; the expansion of fuzzy interest search efficiently and opportunistic network applied environment is provided; tolerance is intermittent to be connected; therefore the present invention can allow the user to issue in opportunistic network and encrypt fuzzy interest keyword; improve opportunistic network in efficient and the flexibility of content aspect sharing, and can allow forwarding person to realize the opportunistic network routing procedure by the search of the publisher being encrypted fuzzy interest keyword.
For achieving the above object, the invention provides a kind of opportunistic network routing method based on the encryption fuzzy keyword, this method comprises:
Step 1, subscribe to node the subscription interest set of keywords of opportunistic network content is submitted to trusted third party, at first calculated the fuzzy set of each interest keyword correspondence in the described subscription interest set of keywords by described trusted third party, calculate the trapdoor collection according to described fuzzy set again, and this trapdoor collection is returned to the subscription node;
Step 2, described subscription node is with the routing iinformation of described trapdoor collection as message, utilize the identify label of described routing iinformation and described subscription node to form subscription interest bag, then described subscription interest bag and similarity are sent to connected all forward node;
Step 3, publisher node utilizes trusted third party according to the issue interest set of keywords of its content distributed extraction, according to searching for the search key set that cryptography key word algorithm calculates each interest keyword correspondence in the described issue interest set of keywords, and with the set of described search key as content distributed control information, utilize the content distributed bag of content distributed composition of described control information and encryption, and described content distributed bag is sent to connected all forward node;
After step 4, described forward node received described subscription interest bag, as head, its identify label was set up routing table and is carried out routing decision according to described routing table as afterbody with its routing iinformation;
Described forward node is with the control information of the described content distributed bag of its reception, and the head of the routing iinformation in the described routing table, according to searching for the search calculating that cryptography key word algorithm carries out searching for the cryptography key word, and then calculate similarity between content distributed bag control information and the trapdoor collection by the similarity matching algorithm, carry out routing decision according to described result of calculation then.
Further, described step 1 comprises:
Step 11 at the initial phase that described opportunistic network is disposed, is determined this opportunistic network
In all legal keywords of relating to form dictionaries;
Step 12, each legal keyword that all legal keywords are formed in the dictionary at this calculates elementary fuzzy set by Wildcard-based Fuzzy Set Construction, then by the dictionary filtration treatment, obtains fuzzy set.
Step 13 is calculated its trapdoor at each fuzzy keyword in the described fuzzy set, forms the trapdoor collection at each fuzzy keyword.
Subscription interest set of keywords in the wherein said step 1 is dynamic change, subscribes to node regularly changes the opportunistic network content according to subscriber's interests change subscription interest set of keywords.
Routing table in the described step 4 is dynamic change, dynamically updates described routing table by the exchange of carrying out routing iinformation between a plurality of forwarding persons.
For achieving the above object, it is a kind of based on the opportunistic network route system of encrypting fuzzy keyword that the present invention also provides, and this system comprises:
The interest processing module, subscribe to node the subscription interest set of keywords of opportunistic network content is submitted to trusted third party, at first calculated the fuzzy set of each interest keyword correspondence in the described subscription interest set of keywords by described trusted third party, calculate the trapdoor collection according to described fuzzy set again, and this trapdoor collection is returned to the subscription node;
Subscribe to processing module, described subscription node is with the routing iinformation of described trapdoor collection as message, utilize the identify label of described routing iinformation and described subscription node to form subscription interest bag, then described subscription interest bag and similarity are sent to connected all forward node;
Release processing module, publisher node utilizes trusted third party according to the issue interest set of keywords of its content distributed extraction, according to searching for the search key set that cryptography key word algorithm calculates each interest keyword correspondence in the described issue interest set of keywords, and with the set of described search key as content distributed control information, utilize the content distributed bag of content distributed composition of described control information and encryption, and described content distributed bag is sent to connected all forward node;
After route processing module, described forward node received described subscription interest bag, as head, its identify label was set up routing table as afterbody, and carries out routing decision according to described routing table with its routing iinformation;
Described forward node is with the control information of the described content distributed bag of its reception, and the head of the routing iinformation in the described routing table, according to searching for the search calculating that cryptography key word algorithm carries out searching for the cryptography key word, and then calculate similarity between content distributed bag control information and the trapdoor collection by the similarity matching algorithm, carry out routing decision according to described result of calculation then.。
Further, described interest processing module comprises:
The initial treatment module at the initial phase that described opportunistic network is disposed, is determined all legal keywords composition dictionaries that relate in this opportunistic network;
The Fuzzy Processing module, each legal keyword that all legal keywords are formed in the dictionary at this calculates elementary fuzzy set by Wildcard-based Fuzzy Set Construction, then by the dictionary filtration treatment, obtains fuzzy set.
The trapdoor collection obtains module, calculates its trapdoor at each fuzzy keyword in the described fuzzy set, forms the trapdoor collection at each fuzzy keyword.
Subscription interest set of keywords in the wherein said interest processing module is dynamic change, subscribes to node regularly changes the opportunistic network content according to subscriber's interests change subscription interest set of keywords.
Routing table in the wherein said route processing module is dynamic change, dynamically updates described routing table by the exchange of carrying out routing iinformation between a plurality of forwarding persons.
Beneficial functional of the present invention is:
1. the introducing of fuzzy keyword support, keyword quantity is limited when carrying out routing decision based on accurate keyword in the chance networking before can solving on the one hand, user's blindness is big, single etc. the limitation of applied environment, the expansion that has improved the opportunistic network applied environment greatly; Route querying and the calculating of calculating by similarity between the fuzzy keyword set of multi-to-multi in addition, with respect to man-to-man situation before, can improve the diffusivity of message in the opportunistic network to a certain extent, improve opportunistic network in the efficient of content aspect sharing.
2. on security of routing, user's privacy is ensured by the encryption search key search that PEKS expands, researcher has before proved that PEKS can resist the selection plaintext attack under the analogy speech model at random, certainly this is based on the hypothesis that Bilinear Diffie-Hellman Problem is difficulty, unless this just means the TrapDoor that can get access to certain keyword, otherwise it is impossible wanting to obtain the keyword content, the process that generates TrapDoor then needs the private key of TTP, generates and distribution so have only TTP to calculate Trapdoor.In encrypting fuzzy keyword searching, concerning the recipient, now in order to support the search of fuzzy keyword, each interest keyword to its submission, generate corresponding fuzzy set earlier according to its needs, and to each candidate word in the fuzzy set, all follow top analysis.
3. concerning intermediate node, its process of setting up route and exchange route does not relate to the cryptography operation to TrapDoor and cryptography key word, search in the process of route, finish trapdoor function set and the matching degree calculating that can search for the set of cryptography key word by the TEST that calls among the PEKS in the FuzzyTest operation, and make routing decision.In this process, both do not got access to any one candidate word content of recipient's interest keyword corresponding fuzzy set, do not get access to any index content of the content of transmitting yet, realized complete privacy model.Gather to search for based on encrypting fuzzy keyword on the one hand in addition; can protect user's privacy to a certain extent; even the content distributed control information of user is broken, the exposure of fuzzy set still can not allow the assailant do binding accurately between user identity and the user interest.
In sum; the present invention can be good at being applied to opportunistic network routing forwarding process safe protection, and being particularly suitable for transmitting end-to-end link in message can't assurance, carry out the secret protection of routing table index information and the content distributed index information of publisher user between user and the user in loose, the focusing on people content-based opportunistic network system of trusting relationship.In addition, the present invention can also create and search routing iinformation that support to encrypt fuzzy keyword searching, and the very big flexibility that has improved content-based opportunistic network further drops into the use of people's daily life and haves laid a good foundation for opportunistic network.
Describe the present invention below in conjunction with the drawings and specific embodiments, but not as a limitation of the invention.
Description of drawings
Fig. 1 is of the present invention a kind of based on the opportunistic network routing method flow chart of encrypting fuzzy keyword;
Fig. 2 is of the present invention a kind of based on the opportunistic network route system schematic diagram of encrypting fuzzy keyword;
Fig. 3 is the content-based opportunistic network communication schematic diagram of one embodiment of the invention;
Fig. 4 be one embodiment of the invention based on the opportunistic network establishing route of encrypting fuzzy keyword searching and search schematic diagram;
Fig. 5 is FuzzyTest and the RoutingLookup algorithm false code figure of one embodiment of the invention.
Embodiment
Fig. 1 is of the present invention a kind of based on the opportunistic network routing method flow chart of encrypting fuzzy keyword.As shown in Figure 1, this method comprises:
Step 1, subscribe to node the subscription interest set of keywords of opportunistic network content is submitted to trusted third party, at first calculated the fuzzy set of each interest keyword correspondence in the described subscription interest set of keywords by described trusted third party, calculate the trapdoor collection according to described fuzzy set again, and this trapdoor collection is returned to the subscription node;
Step 2, described subscription node is with the routing iinformation of described trapdoor collection as message, utilize the identify label of described routing iinformation and described subscription node to form subscription interest bag, then described subscription interest bag and similarity are sent to connected all forward node;
Step 3, publisher node utilizes trusted third party according to the issue interest set of keywords of its content distributed extraction, according to searching for the search key set that cryptography key word algorithm calculates each interest keyword correspondence in the described issue interest set of keywords, and with the set of described search key as content distributed control information, utilize the content distributed bag of content distributed composition of described control information and encryption, and described content distributed bag is sent to connected all forward node;
After step 4, described forward node received described subscription interest bag, as head, its identify label was set up routing table and is carried out routing decision according to described routing table as afterbody with its routing iinformation;
Described forward node is with the control information of the described content distributed bag of its reception, and the head of the routing iinformation in the described routing table, according to searching for the search calculating that cryptography key word algorithm carries out searching for the cryptography key word, and then calculate similarity between content distributed bag control information and the trapdoor collection by the similarity matching algorithm, the similarity that generates according to described result of calculation is carried out routing decision then.
Further, described step 1 comprises:
Step 11 at the initial phase that described opportunistic network is disposed, is determined this opportunistic network
In all legal keywords of relating to form dictionaries;
Step 12, each legal keyword that all legal keywords are formed in the dictionary at this calculates elementary fuzzy set by Wildcard-based Fuzzy Set Construction, then by the dictionary filtration treatment, obtains fuzzy set.
Step 13 is calculated its trapdoor at each fuzzy keyword in the described fuzzy set, forms the trapdoor collection at each fuzzy keyword.
Subscription interest set of keywords in the wherein said step 1 is dynamic change, subscribes to node regularly changes the opportunistic network content according to subscriber's interests change subscription interest set of keywords.
Routing table in the described step 4 is dynamic change, dynamically updates described routing table by the exchange of carrying out routing iinformation between a plurality of forwarding persons.
Fig. 2 is of the present invention a kind of based on the opportunistic network route system schematic diagram of encrypting fuzzy keyword.As shown in Figure 2, this system comprises:
Interest processing module 100, subscribe to node the subscription interest set of keywords of opportunistic network content is submitted to trusted third party, at first calculated the fuzzy set of each interest keyword correspondence in the described subscription interest set of keywords by described trusted third party, calculate the trapdoor collection according to described fuzzy set again, and this trapdoor collection is returned to the subscription node;
Subscribe to processing module 200, described subscription node is with the routing iinformation of described trapdoor collection as message, utilize the identify label of described routing iinformation and described subscription node to form subscription interest bag, then described subscription interest bag and similarity are sent to connected all forward node;
Release processing module 300, publisher node utilizes trusted third party according to the issue interest set of keywords of its content distributed extraction, according to searching for the search key set that cryptography key word algorithm calculates each interest keyword correspondence in the described issue interest set of keywords, and with the set of described search key as content distributed control information, utilize the content distributed bag of content distributed composition of described control information and encryption, and described content distributed bag is sent to connected all forward node;
After route processing module 400, described forward node received described subscription interest bag, as head, its identify label was set up routing table as afterbody, and carries out routing decision according to described routing table with its routing iinformation;
Described forward node is with the control information of the described content distributed bag of its reception, and the head of the routing iinformation in the described routing table, according to searching for the search calculating that cryptography key word algorithm carries out searching for the cryptography key word, and then calculate similarity between content distributed bag control information and the trapdoor collection by the similarity matching algorithm, carry out routing decision according to described result of calculation then.
Further, described interest processing module 100 comprises:
Initial treatment module 110 at the initial phase that described opportunistic network is disposed, is determined all legal keywords composition dictionaries that relate in this opportunistic network;
Fuzzy Processing module 120, each legal keyword that all legal keywords are formed in the dictionary at this calculates elementary fuzzy set by Wildcard-based Fuzzy Set Construction, then by the dictionary filtration treatment, obtains fuzzy set.
The trapdoor collection obtains module 130, calculates its trapdoor at each fuzzy keyword in the described fuzzy set, forms the trapdoor collection at each fuzzy keyword.
Subscription interest set of keywords in the wherein said interest processing module 100 is dynamic change, subscribes to node regularly changes the opportunistic network content according to subscriber's interests change subscription interest set of keywords.
Routing table in the wherein said route processing module 400 is dynamic change, dynamically updates described routing table by the exchange of carrying out routing iinformation between a plurality of forwarding persons.
The present invention relates generally to following content: (1) is based on construction method and the similarity matching process of the cryptography key word fuzzy set of dictionary; (2) based on opportunistic network establishing route and the lookup method of encrypting fuzzy keyword searching.
The relative poor efficiency of existing fuzzy set construction method, such as " Wildcard-based Fuzzy Set Construction ", each keyword can correspondingly produce O (l d) (key length is l to individual fuzzy keyword, editing distance is d), if adopt such fuzzy set construction method to make up the keyword fuzzy set of encryption, the final computing cost that causes and storage overhead are intolerable in the communication environment of the such relative complex of opportunistic network.
In addition current based on society in the contextual opportunistic network, establishing route and the lookup method realized by the search of cryptography key word are arranged, but only the routing policy limitation that can realize based on clear and definite cryptography key word is very big, is difficult to in the opportunistic network that to be extended to that focus be put on man content-based.
(1) based on construction method and the similarity matching process of the keyword fuzzy set of the encryption of dictionary
Specific practice:
At the initial phase that opportunistic network is disposed, determine all legal keywords composition dictionaries that may relate in the network.
At first calculate elementary fuzzy set by Wildcard-based Fuzzy SetConstruction at each legal keyword that may relate to.Filter out by dictionary then that those do not have the keyword of practical significance in the elementary fuzzy set, finally constitute the secondary fuzzy set.
Calculate its trapdoor at each fuzzy keyword in the secondary fuzzy set, form the trapdoor collection at each keyword.
Can calculate similarity by the similarity matching algorithm between any two trapdoor collection.(the similarity matching algorithm is seen accompanying drawing 5)
(2) based on opportunistic network establishing route and the lookup method of encrypting fuzzy keyword searching
Specific practice:
The user that certain intention is obtained the opportunistic network content submits to trusted third party with the interest set of keywords of this contents extraction and calculates fuzzy set and the trapdoor collection of each keyword correspondence and return to this user.
This user wants to obtain the trapdoor collection of content related interests keyword mapping as the routing iinformation of message then, together with the identity sign of oneself, forms subscription interest bag and sends to forwarding person's node that all run into.
After forwarding person's node gets access to and subscribes to interest, the routing iinformation in the subscription interest bag as head, is made up the identity sign of subscribing in the interest bag routing iinformation and sets up routing table as afterbody.The exchange of carrying out routing iinformation between a plurality of forwarding persons replenishes routing table.
Publisher's node is in content distributed, but the PKI that the interest keyword utilization that this content is extracted utilizes trusted third party to provide is calculated corresponding search key set, as content distributed control information, content distributed together with after encrypting formed content distributed bag and sends to the forwarding person's node that runs into.
Forwarding person's node get access to content distributed after, the head of routing iinformation in the control information of content distributed bag and the routing table is encrypted the search key search calculates, carry out routing decision according to the similarity of returning.
Enumerate an embodiment now, specific as follows:
Content-based opportunistic network structure comprises three class users: subscriber A, forwarding person B, publisher C, in such network model, want the user who from opportunistic network, obtains content the interest RA of oneself can be sent in the middle of the network, the publisher issues concrete content PC in the middle of network, and intermediate node (one or more) is then set up routing table FT according to RA, is used for PC is transmitted.Content-based opportunistic network structure chart as shown in Figure 3.
We define D 0Form dictionary for all legal english keywords that may relate in the network, each node u has own interested all possible set of keywords Concerning each node, this is integrated into opportunistic network and can change in current life cycle, and size is also fixed
Figure BDA00003118545700101
Much smaller than D 0Size, different nodes Different.
In the content-based opportunistic network, the interest of node has certain ageing, and namely after after a while, the interest of node can change, so the subscriber can upgrade the interest of oneself as required.When the user as subscriber A, its interest broadcasting RA is by control information CI AAnd the identity of A composition, be expressed as RA=[CI A, ID A].
Do not considering under the safe situation CI A=W A, wherein Represent current time, the interested N of A AIndividual keyword,
Figure BDA00003118545700104
ID AUnique identification for A.Here it is emphasized that the node in all opportunistic networks, N A=M C=N 0It is a fixed value.
When the user as publisher C, the content of its issue is by control information CI C, load P CAccess control policy tree with message
Figure BDA00003118545700105
Form, be expressed as PC=[CI C, P C].Under the situation of not considering privacy and confidentiality, CI C=W C, representative can the index load P CM CIndividual keyword is formed, wherein
Figure BDA00003118545700106
P CBe the content distributed net load of PC.
When the user as intermediate node B, the k bar routing table in its routing table is shown FT[k]=[RI k, SID k].SID kThen represent RI kInterested subscriber's set.Intermediate node also can be safeguarded the message buffer tabulation List of oneself B, be the set that needs to transmit content, size is L BBe expressed as List B = { PC B , 1 , PC B , 2 , . . . , PC B , L B }
PEKS is based on a kind of cryptography key word searching method of bilinearity mapping, allows a node whether to have some keyword in the situation of obtaining any redundant information judges enciphered data.PEKS is made of three cryptography primitive:
1) PEKS uses the PKI of certain node A and a keyword w as input, and the cryptography key word w' that can search for of output w when only having w', can't get access to w.Be expressed as
w'=PEKS(A pub,w)
2) Trapdoor uses the private key of certain node A and keyword w as input, the trapdoor TD of output w w, the calculating of trapdoor function needs the private key of node A, so it is privately owned.Be expressed as
TD w=Trapdoor(A priv,w)
3) Test uses the cryptography key word w' that can search for and a trapdoor function TD as input, returns true when satisfying TD at the same time and be the trapdoor of w and TD and be the trapdoor that is associated with w, otherwise returns false.Be expressed as
Flag=Test(w',TD)
Flag=true,if?TD=Trapdoor(A priv,w)
Flag=false,if?TD≠Trapdoor(A priv,w)
The concrete enforcement of safety routing method among the present invention is described below:
Certain subscriber A iIssue the interest RA=[CI of oneself A, ID A], A iWill
Figure BDA00003118545700111
Submit to the TTP of trusted third party, calculate fuzzy set and corresponding trapdoor function collection by TTP.To subscriber A iInterested each keyword produces the fuzzy set based on dictionary
F ω , d D 0 = { ω ′ , ed ( ω ′ , ω ) ≤ d ⊥ ω ′ ∈ D 0 } , ∀ ω ∈ W A i
The fuzzy set of each keyword is sent to the TTP of trusted third party, according to its private key TTP PrivThe fuzzy keyword trapdoor collection that structure is corresponding,
T A i , ω = { TD = Trapdoor ( TTP priv , ω ′ ) , ∀ ω ′ ∈ F ω , d D 0 } , ∀ ω ∈ W A i
The trapdoor collection that each keyword is shone upon is as new afterwards
Figure BDA00003118545700114
Produce new RA iSend to the intermediate node that all run into.Forwarding person B kReceiving subscriber A iThe RA that sends iAfterwards, can be with each bar RA iIn control information as the stem of routing table, with A iIdentity be filled in the middle of the routing table as last portion, as a route, so just finished the initial foundation of route.Two forwarding persons can carry out the exchange of route after meeting, copy in the middle of the other side's the routing table that is routed to oneself.
Publisher C jThe new content load that is producing
Figure BDA00003118545700115
Afterwards, according to want the set of keywords that content distributed specifying information mark can this load of index Utilize the PKI TTP of trusted third party PubCalculate
Figure BDA00003118545700117
Corresponding keyword PEKS set is as new
Figure BDA00003118545700118
PEKS C j = { ω ′ = PEKS ( TTP pub , ω ) , ∀ ω ∈ W C j }
With the load after the encryption
Figure BDA000031185457001110
Form PC in the lump j, send to the forwarding person that all run into.Bob runs into a series of events of taking place behind the subscriber Alice as shown in Figure 4 under initial condition.
If intermediate node B runs into node D, then carry out route querying, more clear in order to describe, we define a kind of for the trapdoor function S set TDWith can search for cryptography key word S set W'Between operation FuzzyTest (S TD, S W'), the implication of this operation is S W'Index and the S of representative TDMatching degree between the routing iinformation of representative, return value is more big, and the matching degree that representative is searched for generally is more high.Based on this operation, carry out route querying according to route querying algorithm Routing Lookup and go forward side by side walking along the street by decision-making.The algorithm false code of FuzzyTest and RoutingLookup as shown in Figure 5.
Certainly; the present invention also can have other various embodiments; under the situation that does not deviate from spirit of the present invention and essence thereof; those of ordinary skill in the art work as can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection range of the appended claim of the present invention.

Claims (8)

1. the opportunistic network routing method based on the encryption fuzzy keyword is characterized in that, comprising:
Step 1, subscribe to node the subscription interest set of keywords of opportunistic network content is submitted to trusted third party, at first calculated the fuzzy set of each interest keyword correspondence in the described subscription interest set of keywords by described trusted third party, calculate the trapdoor collection according to described fuzzy set again, and this trapdoor collection is returned to the subscription node;
Step 2, described subscription node is with the routing iinformation of described trapdoor collection as message, utilize the identify label of described routing iinformation and described subscription node to form subscription interest bag,, then described subscription interest bag and similarity are sent to connected all forward node;
Step 3, publisher node utilizes described trusted third party according to the issue interest set of keywords of its content distributed extraction, according to searching for the search key set that cryptography key word algorithm calculates each interest keyword correspondence in the described issue interest set of keywords, and with the set of described search key as content distributed control information, utilize the content distributed bag of content distributed composition of described control information and encryption, and described content distributed bag is sent to connected all forward node;
After step 4, described forward node received described subscription interest bag, as head, its identify label was set up routing table as afterbody, and carries out routing decision according to described routing table with its routing iinformation;
Described forward node is with the control information of the described content distributed bag of its reception, and the head of the routing iinformation in the described routing table, according to searching for the search calculating that cryptography key word algorithm carries out searching for the cryptography key word, and then calculate similarity between content distributed bag control information and the trapdoor collection by the similarity matching algorithm, carry out routing decision according to described result of calculation then.
2. as claimed in claim 1 based on the opportunistic network routing method of encrypting fuzzy keyword, it is characterized in that described step 1 comprises:
Step 11 at the initial phase that described opportunistic network is disposed, is determined all legal keywords composition dictionaries that relate in this opportunistic network;
Step 12, each legal keyword that all legal keywords are formed in the dictionary at this calculates elementary fuzzy set by Wildcard-based Fuzzy Set Construction, then by the dictionary filtration treatment, obtains fuzzy set.
Step 13 is calculated its trapdoor at each fuzzy keyword in the described fuzzy set, forms the trapdoor collection at each fuzzy keyword.
3. as claimed in claim 1 based on the opportunistic network routing method of encrypting fuzzy keyword, it is characterized in that, subscription interest set of keywords in the described step 1 is dynamic change, subscribes to node regularly changes the opportunistic network content according to subscriber's interests change subscription interest set of keywords.
4. the opportunistic network routing method based on the encryption fuzzy keyword as claimed in claim 1 is characterized in that the routing table in the described step 4 is dynamic change, dynamically updates described routing table by the exchange of carrying out routing iinformation between a plurality of forwarding persons.
5. the opportunistic network route system based on the encryption fuzzy keyword is characterized in that, comprising:
The interest processing module, subscribe to node the subscription interest set of keywords of opportunistic network content is submitted to trusted third party, at first calculated the fuzzy set of each interest keyword correspondence in the described subscription interest set of keywords by described trusted third party, calculate the trapdoor collection according to described fuzzy set again, and this trapdoor collection is returned to the subscription node;
Subscribe to processing module, described subscription node is with the routing iinformation of described trapdoor collection as message, utilize the identify label of described routing iinformation and described subscription node to form subscription interest bag, then described subscription interest bag and similarity are sent to connected all forward node;
Release processing module, publisher node utilizes trusted third party according to the issue interest set of keywords of its content distributed extraction, according to searching for the search key set that cryptography key word algorithm calculates each interest keyword correspondence in the described issue interest set of keywords, and with the set of described search key as content distributed control information, utilize the content distributed bag of content distributed composition of described control information and encryption, and described content distributed bag is sent to connected all forward node;
After route processing module, described forward node received described subscription interest bag, as head, its identify label was set up routing table and is carried out routing decision according to described routing table as afterbody with its routing iinformation;
Described forward node is with the control information of the described content distributed bag of its reception, and the head of the routing iinformation in the described routing table, according to searching for the search calculating that cryptography key word algorithm carries out searching for the cryptography key word, and then calculate similarity between content distributed bag control information and the trapdoor collection by the similarity matching algorithm, carry out routing decision according to described result of calculation then.
6. as claimed in claim 5 based on the opportunistic network route system of encrypting fuzzy keyword, it is characterized in that described interest processing module comprises:
The initial treatment module at the initial phase that described opportunistic network is disposed, is determined all legal keywords composition dictionaries that relate in this opportunistic network;
The Fuzzy Processing module, each legal keyword that all legal keywords are formed in the dictionary at this calculates elementary fuzzy set by Wildcard-based Fuzzy Set Construction, then by the dictionary filtration treatment, obtains fuzzy set.
The trapdoor collection obtains module, calculates its trapdoor at each fuzzy keyword in the described fuzzy set, forms the trapdoor collection at each fuzzy keyword.
7. as claimed in claim 5 based on the opportunistic network route system of encrypting fuzzy keyword, it is characterized in that, subscription interest set of keywords in the described interest processing module is dynamic change, subscribes to node regularly changes the opportunistic network content according to subscriber's interests change subscription interest set of keywords.
8. as claimed in claim 5 based on the opportunistic network route system of encrypting fuzzy keyword, it is characterized in that, routing table in the described route processing module is dynamic change, dynamically updates described routing table by the exchange of carrying out routing iinformation between a plurality of forwarding persons.
CN201310153333.3A 2013-04-27 2013-04-27 A kind of opportunistic network routing method based on encryption fuzzy keyword and system Expired - Fee Related CN103297962B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310153333.3A CN103297962B (en) 2013-04-27 2013-04-27 A kind of opportunistic network routing method based on encryption fuzzy keyword and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310153333.3A CN103297962B (en) 2013-04-27 2013-04-27 A kind of opportunistic network routing method based on encryption fuzzy keyword and system

Publications (2)

Publication Number Publication Date
CN103297962A true CN103297962A (en) 2013-09-11
CN103297962B CN103297962B (en) 2015-08-26

Family

ID=49098146

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310153333.3A Expired - Fee Related CN103297962B (en) 2013-04-27 2013-04-27 A kind of opportunistic network routing method based on encryption fuzzy keyword and system

Country Status (1)

Country Link
CN (1) CN103297962B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105307176A (en) * 2015-11-10 2016-02-03 中国科学院信息工程研究所 Routing method for robustness information in mobile social opportunity network
CN107302518A (en) * 2016-04-15 2017-10-27 任子行网络技术股份有限公司 Inter-domain routing system safe condition cognitive method and device based on Weighted Similarity
CN108055657A (en) * 2017-12-14 2018-05-18 深圳Tcl数字技术有限公司 Nodal information retransmission method, the network equipment and computer readable storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101945134A (en) * 2010-09-20 2011-01-12 中国人民解放军国防科学技术大学 Event matching method based on popularity of attributes in publication and subscription system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101945134A (en) * 2010-09-20 2011-01-12 中国人民解放军国防科学技术大学 Event matching method based on popularity of attributes in publication and subscription system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
朱红松等: "基于精细梯度策略的多链路协同数据转发协议", 《软件学报》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105307176A (en) * 2015-11-10 2016-02-03 中国科学院信息工程研究所 Routing method for robustness information in mobile social opportunity network
CN105307176B (en) * 2015-11-10 2019-03-08 中国科学院信息工程研究所 Robustness message routing method in a kind of mobile social opportunistic network
CN107302518A (en) * 2016-04-15 2017-10-27 任子行网络技术股份有限公司 Inter-domain routing system safe condition cognitive method and device based on Weighted Similarity
CN108055657A (en) * 2017-12-14 2018-05-18 深圳Tcl数字技术有限公司 Nodal information retransmission method, the network equipment and computer readable storage medium

Also Published As

Publication number Publication date
CN103297962B (en) 2015-08-26

Similar Documents

Publication Publication Date Title
Li et al. Blockchain-based searchable symmetric encryption scheme
Singh et al. Blockchain based intelligent vehicle data sharing framework
Zhang et al. BaDS: Blockchain-based architecture for data sharing with ABS and CP-ABE in IoT
Li et al. Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage
CN107491497B (en) Multi-user multi-keyword sequencing searchable encryption system supporting query in any language
Singh et al. Intelligent vehicle-trust point: Reward based intelligent vehicle communication using blockchain
CN109660555B (en) Content secure sharing method and system based on proxy re-encryption
CN106803784A (en) The multi-user based on lattice is fuzzy in secure multimedia cloud storage can search for encryption method
CN103944711B (en) Cloud storage ciphertext retrieval method and system
Guan et al. Toward privacy-preserving cybertwin-based spatiotemporal keyword query for ITS in 6G era
CN105743888A (en) Agent re-encryption scheme based on keyword research
CN104021157A (en) Method for keyword searchable encryption based on bilinear pairs in cloud storage
CN102780698A (en) User terminal safety communication method in platform of Internet of Things
Li et al. A lightweight fine-grained searchable encryption scheme in fog-based healthcare IoT networks
CN114036240A (en) Multi-service provider private data sharing system and method based on block chain
Li et al. Verifiable searchable encryption with aggregate keys for data sharing in outsourcing storage
Liu et al. EMK-ABSE: Efficient multikeyword attribute-based searchable encryption scheme through cloud-edge coordination
Li et al. Secure and temporary access delegation with equality test for cloud-assisted IoV
Lahiri et al. A trustworthy blockchain based framework for impregnable IoV in edge computing
Li et al. A secure index resisting keyword privacy leakage from access and search patterns in searchable encryption
CN107609425B (en) Safe Top-k query method and device for double-layer sensor network
CN103297962B (en) A kind of opportunistic network routing method based on encryption fuzzy keyword and system
CN113468440A (en) Anonymous query method for protecting location privacy based on SF-blind filtering protocol
CN108632257B (en) Method and system for acquiring encrypted health record supporting hierarchical search
CN116633625A (en) Symmetric searchable encryption system and method based on alliance chain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150826

CF01 Termination of patent right due to non-payment of annual fee