CN103544301A - Efficient and safe multi-keyword-supporting searching method in mobile cloud - Google Patents

Efficient and safe multi-keyword-supporting searching method in mobile cloud Download PDF

Info

Publication number
CN103544301A
CN103544301A CN201310530307.8A CN201310530307A CN103544301A CN 103544301 A CN103544301 A CN 103544301A CN 201310530307 A CN201310530307 A CN 201310530307A CN 103544301 A CN103544301 A CN 103544301A
Authority
CN
China
Prior art keywords
search
document
key
encrypted
mobile cloud
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310530307.8A
Other languages
Chinese (zh)
Inventor
管海兵
李健
马汝辉
顾振国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI JIAO TONG UNIVERSITY WUXI RESEARCH INSTITUTE
Shanghai Jiaotong University
Original Assignee
SHANGHAI JIAO TONG UNIVERSITY WUXI RESEARCH INSTITUTE
Shanghai Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI JIAO TONG UNIVERSITY WUXI RESEARCH INSTITUTE, Shanghai Jiaotong University filed Critical SHANGHAI JIAO TONG UNIVERSITY WUXI RESEARCH INSTITUTE
Priority to CN201310530307.8A priority Critical patent/CN103544301A/en
Publication of CN103544301A publication Critical patent/CN103544301A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/93Document management systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses an efficient and safe multi-keyword-supporting searching method in a mobile cloud. The method is based on a TF-IDF (Term Frequency-Inverse Document Frequency) search model; a data owner stores an encrypted document and an encrypted document index in a cloud end, and a data user inputs a keyword which is encrypted by Fast Accumulated Hashing to search the encrypted document stored in the cloud end, so that search safety is realized. The isolation of search is realized through the addition of noise. The search control is realized through user registration and verification. The high efficiency of search is realized through one-time communication, keyword compression, establishment of search cache and binary set. The efficient and safe multi-keyword-supporting searching method in the mobile cloud guarantees security of document collection, keywords and indexes involved in the search process in the aspect of security, simplifies the search process, increases the search efficiency, compresses total communication amount and reduces communication bandwidth in the aspect of efficiency, and solves the bandwidth bottleneck problem of the encrypted search on a cloud platform.

Description

The searching method of the support multiple key of highly effective and safe in a kind of mobile cloud
Technical field
The present invention proposes a kind of efficient multiple key search model based on mobile cloud platform, particularly, from safety perspective, guaranteed the document sets relating to search procedure, key word, and the safety of index, from the angle of efficiency, simplified search procedure, promote search efficiency, compressed communication total amount, reduced communication bandwidth.Solved the bandwidth bottleneck problem of search on mobile cloud platform of encrypting.
Background technology
Along with the development of cloud computing, increasing service provider is more ready the service arrangement of oneself in cloud platform rather than oneself purchases and safeguard the hardware of oneself.Service provider also stores the data of oneself into high in the clouds.Along with the development of mobile device, increasing situation is directly to use mobile client to visit the resource in high in the clouds simultaneously.But high in the clouds is not completely believable as third party.So directly storing data especially sensitive data into high in the clouds certainly will bring a lot of safe hidden danger.So will guarantee the security of data and the security of search when data are put into high in the clouds.Whole traffic model is as Fig. 1.
Meanwhile, due to the own characteristic of mobile client, as the restriction of computing power, the restriction of bandwidth and restriction of energy consumption etc.Therefore the design in search procedure seems particularly important, will guarantee the security of data and the security of search procedure on the one hand, makes on the other hand communication process be applicable to mobile client.The security of data is the security of data acquisition and the security of index, and high in the clouds is not known the details of document content and index content.The security of search procedure comprises the security of search key, when making high in the clouds not know search key content, can not add up search key.
Along with the development of cloud service, it is particularly important that the security of high in the clouds data seems, the present invention is intended to set up a kind of search procedure and makes, in mobile client low bandwidth, under the prerequisite of low computing power, can search for efficiently and safely.Guarantee the security of user and service provider's data.Also to make the result of search word and search there is the degree of correlation better simultaneously.
Main search technique is mainly divided into Boolean retrieval and rank search both at home and abroad now, wherein according to keyword, in document, whether there is providing the scoring of document during Boolean retrieval, the degree of correlation of the result drawing of the result that this method draws and rank search has a certain distance, but easier realizing in difficulty of encryption search.
Be rank search on the other hand, rank search provides correlativity better, thereby the result drawing also matches with the intention of search, and at present a lot of encryption search has also realized based on rank searches plain searching algorithm.Wherein mainly be divided into single keyword search and multiple key search, as its name suggests, single keyword search is exactly that each user only inputs a key word, then after system encryption, sends to high in the clouds.But single key word can not provide correlativity better.
In addition be multiple key search, academic circles at present has the multiple key search problem that adopts diverse ways solution to encrypt.Aspect security, all reach requirement, but all can not be adapted to mobile cloud platform in the angle of efficiency.
Aspect functional, aspect security, the present invention adopts the TF-IDF model of academia and industry member comparative maturity, and TF-IDF model is lexical item frequency-inverse document frequency model, and this model can solve the degree of correlation search of multiple key effectively.
Security aspect, the present invention has adopted the method for the Fast Accumulated Hashing of academia's comparative maturity, makes in the guaranteed while of security, and efficiency is greatly improved.
In sum, in the solution existing now, all for main flow cloud platform, all limited to the support of mobile cloud, these methods all cannot directly be moved on mobile cloud platform.
Summary of the invention
In view of above-mentioned existing method is applied to the defect of mobile cloud platform, problem to be solved by this invention is to provide a kind of encryption way of search of efficient safe mobile cloud platform, overcomes the disappearance that the too high performance causing of communication cost of encrypting in search procedure and user experience.
To achieve these goals, being generalized into systematic design object is:
L is functional
The functional multiple key that refers to that system must be inputted according to user draw relevant document sets.
The evincible security of l
Evincible security is that all data of high in the clouds and high in the clouds processing of being put into must be through encrypting, and high in the clouds can not decrypt result within the limited time.
L searches for isolation
Search isolation refers to that the content of key word or the information such as purport of document sets can not be inferred according to search key and the document sets of returning in high in the clouds in search procedure.
L searches for control
Search is controlled and to be referred to that high in the clouds cannot arbitrarily search for any key word, and all search operations must be the validated users through data set provider authentication.
L search is hidden
Search is hidden and to be referred to that user sends to high in the clouds in search procedure key word is through encryption, need to allow high in the clouds when not knowing concrete key word for client searches out relevant document.
L searches for high efficiency
Search high efficiency is exactly according to the feature of mobile cloud platform, makes communication cost as far as possible few, and communication cost is divided into two parts here, and first refers to the number of times of communication, and second refers to the total bandwidth of communication.To this two-part communication cost be reduced by optimize communicate process as far as possible, enable to adapt to mobile cloud platform.
The present invention adopts following technical scheme:
The searching method of the support multiple key of highly effective and safe in a kind of mobile cloud, based on TF-IDF search model, data owner is stored in high in the clouds by the document index of the document of encryption and encryption, data consumer inputs the keyword of encryption and searches for being stored in the encrypted document in high in the clouds, and returns to the document searching.This search model has guaranteed the functional of system, and the accuracy of the rank search of multiple key is guaranteed.
The method that its document index and key word are encrypted comprises the steps:
(1) the TF-IDF search model based in information retrieval, generates document index with TF-IDF;
(2) two concordance lists that TF-IDF generated, TF table and IDF table are taken advantage of according to each lexical item, and each lexical item will obtain a concrete mark corresponding to each document; Score table after the processing obtaining, according to Score table, carries out cluster to the mark of Score table, the lexical item in a cluster, and application Fast Accumulated Hashing is encrypted.
Above-mentioned encryption method of searching for has guaranteed the security of search.
It is further characterized in that: in the key word of encrypting, add noise, in the document index of encrypting, add noise complete or collected works.Thereby realize the isolation of search.
Further: user registers the owner of the forward data of search, data owner sends the key of set of result documents to user; User must provide to high in the clouds the identity information of oneself when searching for, the identity information that high in the clouds provides according to user when searching for is again verified to data owner, after being verified, retrieve again, and returning to the encrypted document collection of search, user is decrypted and knows the particular content returning to document the encrypted document collection returning according to previous key.Thereby realize the control of search.
In order to guarantee the high efficiency of search, the present invention adopts following method:
1. described in, key word ciphering process has been located data consumer.
2. described in, the transmission of cryptography key word is front through overcompression.
3. described in, the cryptography key word of data consumer's input is stored in buffer memory, for search next time, calls.
4. described in, the search burst of Score table adopts the set of two minutes.
Adding and the method such as user's registration of the encryption of the present invention by key word, noise, from safety perspective, guaranteed the document sets relating to search procedure, key word, and the safety of index, from the angle of efficiency, simplified search procedure, promoted search efficiency, compress communication total amount, reduced communication bandwidth.Solved the bandwidth bottleneck problem of search on mobile cloud platform of encrypting.
Accompanying drawing explanation
Fig. 1 is the traffic model taking out of the encryption search of mobile cloud platform.
Fig. 2 is existing generated query procedure communication process.
Fig. 3 is the keyword query process after improving.
Fig. 4 is the key word ciphertext generative process based on user preference.
Embodiment
Below with reference to real process, the committed step of said system design object is further elaborated to understand fully object of the present invention, feature and effect.
In order to realize the functional of system, the present invention is based on the TF-IDF search model in information retrieval, with TF-IDF, generate article index, because TF-IDF itself can not guarantee index security, so the present invention carries out to it the encryption that can search for, guaranteed like this functional of system, the accuracy of the rank search of multiple key is guaranteed.
Aspect evincible security, the present invention adopts the method for Fast Accumulated Hashing, the index that step generates is above encrypted, the index generating due to TF-IDF is two concordance lists, certain operations need to be carried out and Fast Accumulated Hashing cipher mode can be applied, first we take advantage of TF table and IDF table according to each lexical item, and each lexical item will obtain a concrete mark corresponding to each document like this.We are referred to as Score table table after the processing obtaining, according to Score table, the mark of Score table are carried out to cluster, the lexical item in a cluster, and we apply Fast Accumulated Hashing and are encrypted.By above step, just can realize evincible security, make high in the clouds and third party all have no idea to know the content of index and key word.And for the security of document sets, can adopt existing symmetric cryptography mode to be encrypted the security that just can guarantee document sets.
From functional aspect, through after above-mentioned ciphering process, encrypt the algorithm of search and also will do the variation responding, it during original search, is the scoring of must assigning in each document according to each lexical item, now owing to having applied Fast Accumulated Hashing encryption method, so searching algorithm also will change, during retrieval, be no longer to mark for the score of document according to lexical item, but the cluster dropping on according to key word is marked.Each cluster has a mark, and cluster is based on document, so each document has some clusters, further, whether pass judgment on key word drops in a cluster, whether whether only need to check the Q-character of key word to drop on just can to judge in a cluster this key word in this cluster, if in obtaining certain mark, the final mark summation obtaining according to each document sorts and is the document sets of returning.
In search isolation, the correlativity that the present invention has mainly solved key word and returned to document, although because through encrypting, the same key word of each search always produces same key word ciphertext and identical document sets ciphertext, like this through after the statistical learning of certain hour, if key word has been deciphered in high in the clouds, just can guess the purport that document sets, if the purport of document sets has been known in same high in the clouds, also likely guess searching preferences and the custom that the content of key word and then may learn user.So correlativity that the present invention is intended to break this key word and returns to document between collection.Because the document sets of returning under the prerequisite of same key word cannot change, so can solve this problem by changing the mode of key word ciphertext, in view of above analysis, the present invention has added certain noise in the ciphertext of key word, and the key word ciphertext that the same key word that is generates is different.Equally, because added noise just must add beyond the clouds the mode of certain denoising in key word ciphertext, make noise can not affect the correctness of search.The present invention is based on the characteristic of Fast Accumulated Hashing, added the complete or collected works of noise in index, any like this noise will be all noise complete or collected works' subset, and they still meet the subordinate relation of key word and document sets.So can not affect the accuracy of document searching.
Aspect search control, what the present invention adopted is traditional authentication mode, and all users must register the owner of the forward data of search, and data owner will send the key of set of result documents to user like this.User must provide to high in the clouds the identity information of oneself, the identity information that high in the clouds provides according to user when searching for again to verify to data owner when searching for like this, is retrieving, and return to the document sets of search after being verified.Certainly the document sets of returning is also ciphertext, and user must be decrypted just and can know the particular content returning to document the document sets of returning according to previous key.
Aspect search hides, the present invention adopts is that the mode of the generation individual element of Fast Accumulated Hashing generates, the mode that generates key word ciphertext must be to match with the mode of generating indexes ciphertext, because the key word ciphertext generating must be discernible in the index after encryption, so just can reach the object of search.
Finally, in search high efficiency, the present invention has done 4 optimizations.
First for whole communication process, the present invention communicates by letter existing twice communication as Fig. 3 as Fig. 2 is modified into once, in existing encryption searching method, in the process of key word generating ciphertext, can only inquire about to the owner of data, user oneself does not have the index of ability generation key word, after the present invention improves, user does not need to inquire about to the owner of data in search, directly in this locality, generates the ciphertext of key word.
The secondth, for the size of key word ciphertext, due to the requirement of Fast Accumulated Hashing for security, the key word ciphertext generating is larger, but due to wherein effectively information be only the Q-character that has recorded key word, so the present invention compresses key word ciphertext, making needs the information of transmission to come amount to greatly reduce after compression.
The 3rd the present invention generates key word ciphertext step to key word and has carried out further optimization, because unique user is in search procedure, always there is certain searching preferences, so the key word of a frequent search of user does not have king-sized difference, so may learn user's searching preferences, and some key words that user is often searched for store, in the time of so each search, just do not need all to carry out key word ciphering process at every turn, directly according to former buffer memory, obtain key word ciphertext, only need to add that certain noise is just passable.This operation can greatly reduce needed time lifting user in key word generative process and experience.Idiographic flow is as Fig. 4.
The 4th is in search procedure beyond the clouds, because Score table has been carried out to burst in to Score table application Fast Accumulated Hashing, now, in the process of search, the complexity of search directly depends on the situation of the burst of search, so burst has been carried out the set of two minutes here, the complexity of search can have been risen to O (logN) from original O (N) like this.The efficiency of search is also greatly improved like this.

Claims (7)

1. the searching method of the support multiple key of highly effective and safe in a mobile cloud, the method is based on TF-IDF search model, data owner is stored in high in the clouds by the document index of the document of encryption and encryption, data consumer inputs the keyword of encryption and searches for being stored in the encrypted document in high in the clouds, and returns to the document searching; The method that its document index and key word are encrypted comprises the steps:
(1) the TF-IDF search model based in information retrieval, generates document index with TF-IDF;
(2) two concordance lists that TF-IDF generated, TF table and IDF table are taken advantage of according to each lexical item, and each lexical item will obtain a concrete mark corresponding to each document; Score table after the processing obtaining, according to Score table, carries out cluster to the mark of Score table, the lexical item in a cluster, and application Fast Accumulated Hashing is encrypted.
2. the searching method of the support multiple key of highly effective and safe in mobile cloud according to claim 1, is characterized in that: in the key word of encrypting, add noise, in the document index of encrypting, add noise complete or collected works.
3. the searching method of the support multiple key of highly effective and safe in mobile cloud according to claim 1 and 2, is characterized in that: user registers the owner of the forward data of search, and data owner sends the key of set of result documents to user; User must provide to high in the clouds the identity information of oneself when searching for, the identity information that high in the clouds provides according to user when searching for is again verified to data owner, after being verified, retrieve again, and returning to the encrypted document collection of search, user is decrypted and knows the particular content returning to document the encrypted document collection returning according to previous key.
4. the searching method of the support multiple key of highly effective and safe in mobile cloud according to claim 1 and 2, is characterized in that: described key word ciphering process has been located data consumer.
5. the searching method of the support multiple key of highly effective and safe in mobile cloud according to claim 1 and 2, is characterized in that: described cryptography key word transmission is front through overcompression.
6. the searching method of the support multiple key of highly effective and safe in mobile cloud according to claim 1 and 2, is characterized in that: the cryptography key word of described data consumer's input is stored in buffer memory, for search next time, calls.
7. the searching method of the support multiple key of highly effective and safe in mobile cloud according to claim 1 and 2, is characterized in that: the search burst of described Score table adopts the set of two minutes.
CN201310530307.8A 2013-10-31 2013-10-31 Efficient and safe multi-keyword-supporting searching method in mobile cloud Pending CN103544301A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310530307.8A CN103544301A (en) 2013-10-31 2013-10-31 Efficient and safe multi-keyword-supporting searching method in mobile cloud

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310530307.8A CN103544301A (en) 2013-10-31 2013-10-31 Efficient and safe multi-keyword-supporting searching method in mobile cloud

Publications (1)

Publication Number Publication Date
CN103544301A true CN103544301A (en) 2014-01-29

Family

ID=49967753

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310530307.8A Pending CN103544301A (en) 2013-10-31 2013-10-31 Efficient and safe multi-keyword-supporting searching method in mobile cloud

Country Status (1)

Country Link
CN (1) CN103544301A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9152667B1 (en) * 2013-03-15 2015-10-06 A9.Com, Inc. Cloud search analytics
CN105049196A (en) * 2015-07-13 2015-11-11 西安理工大学 Searchable encryption method of multiple keywords at specified location in cloud storage
CN109412797A (en) * 2018-11-05 2019-03-01 北京邮电大学 Cryptographic key negotiation method and client based on bit error rate judgement state base
CN110224986A (en) * 2019-05-07 2019-09-10 电子科技大学 It is a kind of that access control method efficiently can search for based on hiding strategy CP-ABE
CN110337649A (en) * 2016-12-30 2019-10-15 罗伯特·博世有限公司 The dynamic symmetry that do not discover for search pattern can search for the method and system encrypted

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101216826A (en) * 2007-01-05 2008-07-09 鸿富锦精密工业(深圳)有限公司 Information search system and method
CN101727454A (en) * 2008-10-30 2010-06-09 日电(中国)有限公司 Method for automatic classification of objects and system
CN102075542A (en) * 2011-01-26 2011-05-25 中国科学院软件研究所 Cloud computing data security supporting platform
US20110246433A1 (en) * 2010-03-31 2011-10-06 Xerox Corporation. Random number based data integrity verification method and system for distributed cloud storage
CN102938767A (en) * 2012-11-13 2013-02-20 西安电子科技大学 Efficient verified fuzzy key word searching method based on cloud data subcontract system
CN103024035A (en) * 2012-12-11 2013-04-03 上海交通大学 Safe and energy-saving encryption searching method based on mobile cloud platform

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101216826A (en) * 2007-01-05 2008-07-09 鸿富锦精密工业(深圳)有限公司 Information search system and method
CN101727454A (en) * 2008-10-30 2010-06-09 日电(中国)有限公司 Method for automatic classification of objects and system
US20110246433A1 (en) * 2010-03-31 2011-10-06 Xerox Corporation. Random number based data integrity verification method and system for distributed cloud storage
CN102075542A (en) * 2011-01-26 2011-05-25 中国科学院软件研究所 Cloud computing data security supporting platform
CN102938767A (en) * 2012-11-13 2013-02-20 西安电子科技大学 Efficient verified fuzzy key word searching method based on cloud data subcontract system
CN103024035A (en) * 2012-12-11 2013-04-03 上海交通大学 Safe and energy-saving encryption searching method based on mobile cloud platform

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
C WANG等: ""Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data"", 《IEEE TRANSACTION ON PARALLEL AND DISTRIBUTED SYSTEMS》 *
EJ GOH: ""Secure Indexes"", 《SUBMISSION》 *
K NYBERG: ""Fast Accumulated Hashing"", 《PROCEEDINGS OF THE THIRD INTERNATIONAL WORKSHOP ON FAST SOFTWARE ENCRYPTION》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9152667B1 (en) * 2013-03-15 2015-10-06 A9.Com, Inc. Cloud search analytics
US20160004776A1 (en) * 2013-03-15 2016-01-07 A9.Com, Inc. Cloud search analytics
US10311160B2 (en) 2013-03-15 2019-06-04 A9.Com, Inc. Cloud search analytics
CN105049196A (en) * 2015-07-13 2015-11-11 西安理工大学 Searchable encryption method of multiple keywords at specified location in cloud storage
CN105049196B (en) * 2015-07-13 2018-08-03 佛山市明茂网络科技有限公司 The encryption method that multiple keywords of designated position can search in cloud storage
CN110337649A (en) * 2016-12-30 2019-10-15 罗伯特·博世有限公司 The dynamic symmetry that do not discover for search pattern can search for the method and system encrypted
CN110337649B (en) * 2016-12-30 2023-10-31 罗伯特·博世有限公司 Method and system for dynamic symmetric searchable encryption with imperceptible search patterns
CN109412797A (en) * 2018-11-05 2019-03-01 北京邮电大学 Cryptographic key negotiation method and client based on bit error rate judgement state base
CN110224986A (en) * 2019-05-07 2019-09-10 电子科技大学 It is a kind of that access control method efficiently can search for based on hiding strategy CP-ABE

Similar Documents

Publication Publication Date Title
CN108334612B (en) Shape-near Chinese character full-text fuzzy retrieval method aiming at ciphertext domain
CN106127075B (en) Encryption method can search for based on secret protection under a kind of cloud storage environment
CN106776904B (en) The fuzzy query encryption method of dynamic authentication is supported in a kind of insincere cloud computing environment
US9021259B2 (en) Encrypted database system, client terminal, encrypted database server, natural joining method, and program
CN102132274A (en) Search device, search method and search program using open search engine
CN103955537A (en) Method and system for designing searchable encrypted cloud disc with fuzzy semantics
CN108628867A (en) Multi-key word cipher text retrieval method towards cloud storage and system
CN104765848A (en) Symmetrical searchable encryption method for supporting result high-efficiency sequencing in hybrid cloud storage
CN105610910A (en) Cloud storage oriented ciphertext full-text search method and system based on full homomorphic ciphers
CN103544301A (en) Efficient and safe multi-keyword-supporting searching method in mobile cloud
Ren et al. Toward secure and effective data utilization in public cloud
CN103049466A (en) Full-text search method and system based on distributed cipher-text storage
CN109493017A (en) Credible outsourcing storage method based on block chain
CN103970889A (en) Security cloud disc for Chinese and English keyword fuzzy search
CN109739945A (en) A kind of multi-key word ciphertext ordering searching method based on hybrid index
CN104992124A (en) Document safety access method for cloud storage environment
CN107533813B (en) Database system and database processing method
CN103366008A (en) Resource searching method and device
CN107273467A (en) A kind of Security Index structure and its building method for supporting to can search for encryption
CN107086917B (en) The encryption method that a kind of parallelization and structuring public key can search for
Mittal et al. Privacy preserving synonym based fuzzy multi-keyword ranked search over encrypted cloud data
CN106250453A (en) The cipher text retrieval method of numeric type data based on cloud storage and device
CN110928980B (en) Ciphertext data storage and retrieval method oriented to mobile cloud computing
US9654472B2 (en) Storage count verification system
Handa et al. An efficient approach for secure information retrieval on cloud

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned

Effective date of abandoning: 20180126

AD01 Patent right deemed abandoned