CN104394155A - Multi-user cloud encryption keyboard searching method capable of verifying integrity and completeness - Google Patents

Multi-user cloud encryption keyboard searching method capable of verifying integrity and completeness Download PDF

Info

Publication number
CN104394155A
CN104394155A CN201410708142.3A CN201410708142A CN104394155A CN 104394155 A CN104394155 A CN 104394155A CN 201410708142 A CN201410708142 A CN 201410708142A CN 104394155 A CN104394155 A CN 104394155A
Authority
CN
China
Prior art keywords
file
data
index
keyword
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410708142.3A
Other languages
Chinese (zh)
Other versions
CN104394155B (en
Inventor
王晓明
李诗旸
吴岱霓
甘庆晴
王耄
周锐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Jinan University Science Park Management Co ltd
Guangzhou Ruima Information Technology Co ltd
Original Assignee
Jinan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinan University filed Critical Jinan University
Priority to CN201410708142.3A priority Critical patent/CN104394155B/en
Publication of CN104394155A publication Critical patent/CN104394155A/en
Application granted granted Critical
Publication of CN104394155B publication Critical patent/CN104394155B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The invention is mainly used for searching a searchable encryption technology under a public key password system, and discloses a multi-user cloud encryption keyboard searching method capable of verifying integrity and completeness. The method can be used for verifying the search result completeness and the outsourced data integrity under the cloud environment and setting the multi-user authority. The method can be used for realizing the verification of the search result completeness and the outsourced data integrity by using signatures to bind keyword indexes and associated encryption files thereof, realizing multi-user privacy query by using a re-encryption technology and dynamically updating the query authority of the user. Moreover, the index structure and the query mechanism of the encrypted file are further optimized, so that the query efficiency is improved by using hash query in the query process, and the rapid access to the cloud data is realized.

Description

Multi-user's cloud cryptography key word searching method of integrality and completeness can be verified
Technical field
The present invention relates to the searched for Encryption Technology Research field under public-key cryptosystem, in particular to a kind of multi-user's cloud cryptography key word searching method verifying integrality and completeness, the method can revene lookup result completeness and outsourcing data integrity under cloud environment, and sets multi-user authority.
Background technology
Along with the flourish of computer networking technology and the social expansion to information resources demand, increasing enterprises and individuals wishes to be stored by cloud to reduce local infrastructure cost, and obtains higher service quality.But cloud is stored in and brings convenience, while the service of easy-to-use and low cost, also brings many new safety problems.Nowadays data are stored on third party cloud platform, and data owner loses the control to oneself data, and cloud service provider is not completely believable, make high in the clouds data be faced with the risk of leakage.
Data encryption is the basic means of protection high in the clouds data; first data were encrypted by user before uploading sensitive data; even if the data that such assailant and cloud service provider obtain encryption also cannot obtain its content, thus ensure that the safety that data store beyond the clouds.But, does is problem in enciphered data, how to search out the content needed for user? 2000, Song proposes the concept can searching for encryption first in his paper " A.Practical techniques forsearches on encrypted data ", and propose first keyword search scheme based on symmetric cryptography, realize carrying out query search to the data of encryption, cause scientific research personnel to the research can searching for encryption technology.2004, Boneh proposes the scheme being achieved first public key encryption keyword search based on discrete logarithm by linear pairing in document " Public key encryption withkeyword search ", is applied among public-key cryptosystem general at present searching for encryption technology.Along with the development can searching for encryption technology, in order to more closing to reality application demand, scientific research scholar is had to propose the research directions such as encryption range searching scheme, encryption connection keyword search scheme and encryption fuzzy keyword searching scheme successively.In recent years, due to the rise that cloud computing and cloud store, new study hotspot is become to the access control of encrypting database, integrity verification and encryption retrieval.
The research being applied in the searched for encryption technology of cloud platform not only needs the search coupling realizing the request of data of encryption and the file index of encryption, also need the feature stored for the many authorized users of cloud platform and big data quantity, realize the function of quick-searching in multi-user's dynamic access control and enormous amount data.
Existing great majority can be searched for encipherment scheme and all focus on how in enciphered data, to inquire required content, and do not take into full account the integrality of outsourcing data and the completeness of Query Result.But, under cloud memory module, due to third party ISP and non-fully is credible.User worries whether high in the clouds data replace or damage by victim or cloud service provider.Therefore, user needs checking Query Result being carried out to integrality and completeness, thus to ensure that user obtains Query Result be all data meeting user's search request, and is not replaced or damages.
Existing great majority encryption at present search plan all can only realize single user inquiry.But under cloud storage environment, data owner wishes and multiple user's sharing data.Therefore, need the searching and managing mechanism designing facing multiple users, realize authorizing and cancelling of multi-user's search access right.In addition, existing major part can search for encipherment scheme in search procedure, is all the method adopting linear matched, the inquiry request of encryption is mated with the index entry of encryption one by one, and storing the cloud platform of enormous amount data, search efficiency is not enough to the demand meeting cloud application.
Therefore, seek one and in revene lookup result completeness under cloud environment and outsourcing data integrity, and important researching value can be had to the cryptography key word searching method that multi-user authority sets.
Summary of the invention
Main purpose of the present invention is that the shortcoming overcoming prior art is with not enough, a kind of multi-user's cloud cryptography key word searching method verifying integrality and completeness is provided, the method can in revene lookup result completeness under cloud environment and outsourcing data integrity, also support multi-user's inquiry, search efficiency is high simultaneously.
Object of the present invention is realized by following technical scheme: the multi-user's cloud cryptography key word searching method can verifying integrality and completeness, comprises step:
(1) data owner is encrypted data file, extracts multiple keyword simultaneously and be encrypted to form the key word index for inquiring about from the data file uploaded; Simultaneously to each keyword extracted, utilize homomorphism hash function to generate keyword summary, set up a keyword abstract in this locality; Data owner generates the public signature key and signature private key that are used for data signature, before outsourcing data, signs, finally the data file of encryption, key word index and signature are sent to cloud server with its signature private key to each keyword summary;
(2) cloud server is data file and the key word index memory allocated space of above-mentioned encryption, cloud server is using each key word index as query term simultaneously, set up search index table, preserve index information and signing messages, and set up the address that chained list preserves the All Files associated with each key word index, connect chained list and search index table by the pointer entry of search index table;
(3) data owner is by the private key of escape way needed for the data file of multiple authorized user distribution inquiry encryption, data owner also generates the re-encrypted private key of corresponding authorized user simultaneously, and the re-encrypted private key table all re-encrypted private key be combined to form sends to cloud server, in query script, the authorized user private key of oneself forms inquiry gating transmit to cloud server;
(4) cloud server is inquired about inquiry thresholding according to search index table, finds out the file group and signing messages that meet authorized user inquiry, and returns to authorized user;
(5) after the authorized user signing messages that receives keyword and file group, the summary in signature is solved with the public signature key of data owner and homomorphism hash function, then from encrypt file group, file is solved, then verify that this solves file whether consistent with summary with the keyword of inquiry, if consistent, then represent that file group file is complete and Query Result is complete, otherwise represent that file is imperfect, Query Result is incomplete; Described file group file complete representation data file is not modified or replaces, and described Query Result complete expression Query Result includes the data file of all indexes containing this keyword.
Concrete, in described step (1), to each data file M, data owner uses symmetric key k to be encrypted, and encrypt file is expressed as E k(M), wherein E k() is the symmetric encipherment algorithm for encrypt file;
For i-th keyword W i, key word index is INDEX (W i)=H 2(t), wherein if G 1, G 2the multiplicative group of prime number p that to be all rank be, wherein g is multiplicative group G 1generator, definition bilinear map e:G 1× G 1→ G 2, e (g, g) is multiplicative group G 2generator, if H 1(): { 0,1} *→ G 1, H 2(): G 2→ { 0,1} logp, for the private key that data owner adopts for cryptography key word indexing, for the PKI of cloud server, for the private key of cloud server.
Concrete, in described step (1), for i-th keyword W i, the formula utilizing homomorphism hash function to generate keyword summary is:
HMAC(W i)=H r(Z(M 1)×f(W i)+Z(M 2)×f(W i)+……+Z(M i)×f(W i));
Wherein f (): { 0,1} *→ { 0,1} nsafe one-way Hash function, H r() is homomorphism hash function, and Z () is the hash function for compressing, M 1, M 2... M ifor data file.
Concrete, described data owner generates the public signature key PK ' be used for data signature dOwith signature private key SK ' dO, before outsourcing data, data owner is with its signature private key SK ' dOto each keyword summary HMAC (W i) sign, namely obtain e ' sk() is the public key encryption algorithm for signing.
Preferably, in described step (3), data owner selects as the private key of its cryptography key word indexing, and calculate PKI then Stochastic choice by SK uidistribute to authorized user U ias the private key of its generated encryption key word inquiry thresholding, U ifor the ID of authorized user, generate the re-encrypted private key of this authorized user finally by each authorized user identities number and its re-encrypted private key one to one re-encrypted private key table be sent to cloud server.
Concrete, in described step (3), in query script, it is as follows to the step of cloud server that authorized user forms inquiry gating transmit with the private key of oneself: authorized user U iuse its key SK uiwith the keyword that will inquire about generated encryption key word inquiry thresholding wherein U ifor the ID of this authorized user, authorized user is inquiry thresholding T wsend to cloud server.
Concrete, in described step (4), cloud server is receiving the inquiry thresholding of authorized user after, by inquiry re-encrypted private key table, find this authorized user U ire-encrypted private key carry out acting on behalf of re-encryption conversion as follows:
T W ′ = e ( H 1 ( W ~ ) SK Ui , PK S SK DO SK Ui ) SK S = e ( H 1 ( W ~ ) , PK S SK DO ) SK S ;
Cloud server navigates to and thresholding T ' according to search index table wcorresponding key word index INDEX (W i), and by traveling through the file address chained list that this table pointer item points to, obtain the All Files address with this keyword association, take out the file group meeting search request, cloud server as Query Result, returns to the authorized user U of current queries using the signing messages of this file group and this keyword i.
Preferably, in described step (5), after the signing messages that authorized user receives keyword and encrypt file group, first authorized user first uses data owner public signature key PK ' dOsolve the summary in signature, then from encrypt file group, solve file M 1, M 2... M i, with the homomorphism hash function H generating summary r(), compression function Z () and safe one-way Hash function f (): { 0,1} *→ { 0,1} nchecking summary, checking formula is:
HMAC(W 1)=H r(Z(M 1)×f(W 1)+Z(M 2)×f(W 1)+……+Z(M i)×f(W 1));
If expression formula is set up, then M 1, M 2... M ifile is complete, is not namely modified or replaces, otherwise just represents that file is imperfect.Signature establishes associating of keyword and file, and certifying signature correctness, namely demonstrates the completeness of Query Result.
Preferably, describedly verify that multi-user's cloud cryptography key word searching method of integrality and completeness also comprises step: (6) upgrade cloud outsourcing data, and renewal rewards theory is divided into following two kinds of situations:
(6-1) as will data file E be added k(M l), the index of this file comprises multiple keyword W iand W j, then step of updating is as follows:
(6-1-1) first data owner generates keyword W iand W jindex with and then trasaction key W iand W jcorresponding summary HMAC (W i) and HMAC (W j), data owner first takes out keyword W in local keyword abstract iand W jcorresponding summary HMAC (W i) and HMAC (W j), utilize the homomorphism character of homomorphism hash function to complete renewal rewards theory:
HMAC(W i)′=HMAC(W i)×H r(Z(M L)·f(W i));
HMAC(W j)′=HMAC(W j)×H r(Z(M L)·f(W j));
Data owner is written back to local keyword abstract the summary after renewal again, upgrades;
(6-1-2), after upgrading local keyword abstract, data owner utilizes signature private key SK ' dOkeyword summary is signed:
σ ( W i ) = E SK DO ′ ( HMAC ( W i ) ) ;
σ ( W j ) = E SK DO ′ ( HMAC ( W j ) ) ;
(6-1-3) in renewal cryptography key word indexing with after generating signature, data owner sends to cloud server to carry out Data Update the data file of encryption, key word index and signature;
(6-1-4), after cloud server receives data, upgrade search index table, navigate to key word index INDEX (W by hash query i) and INDEX (W j) list item at place, upgrade signature sigma (W i), σ (W j), and in the file address chained list of correspondence, insert preservation file E k(M l) node of address;
(6-2) as key word index W will be added in file index l, and stored in comprising W lmultiple data file E of keyword k(M i), E k(M j), then step of updating is as follows:
(6-2-1) data owner generates keyword W lindex and to file M i, M jbe encrypted;
(6-2-2) summary is generated: HMAC (W l)=H r(Z (M i) f (W l)) × H r(Z (M j) f (W l)), and summary to be kept in local keyword abstract, and with data owner's signature private key SK ' dOsummary is signed: σ ( W L ) = E SK DO ′ ( HMAC ( W L ) ) ;
(6-2-3) data owner is index INDEX (W l), file E k(M i), E k(M j) and signature sigma (W l) send to cloud server to carry out data outsourcing;
(6-2-4) after cloud server receives data, upgrade search index table, cloud server calculates the cryptographic Hash hash of key word index 2(INDEX (W l)) list item position, location, distribute this space to key word index INDEX (W l), if there is hash-collision, employing is closed hash mode and is evaded conflict, then signature sigma (W l) stored in concordance list, and set up file address chained list preservation file E k(M i), E k(M j) address information.
Preferably, describedly verify that multi-user's cloud cryptography key word searching method of integrality and completeness also comprises step:
(7) data owner if desired revocation user U dsearch access right, then send the ID U of this user dwith cancel an order to cloud server, cloud server navigates to user U by hash query dat the list item of re-encrypted private key table, deleting this list item, making the user by cancelling authority cannot complete legal thresholding re-encryption, execution query manipulation that cannot be legal when inquiring about.
Compared with prior art, tool has the following advantages and beneficial effect in the present invention:
(1) the present invention supports hidden inquiry.Data owner, when setting up key word index, employs its private key and is encrypted key word index.Because cloud server and assailant cannot obtain the private key of data owner, so cloud server and assailant also cannot obtain the information of any associated keyword from cryptography key word indexing.When authorized user proposes inquiry request to cloud server, user uses the private key of oneself to be encrypted keyword thresholding, and Cloud Server and assailant cannot know any information of relevant keyword from the keyword thresholding of encryption.In addition, the hash function H of keyword thresholding is generated 1() is integrated in the encipheror of client, and Cloud Server and assailant also cannot carry out keyword guessing attack.Therefore, cloud server can only provide search service, cannot learn any information about keyword.
(2) the invention provides the inquiry of specifying.Data owner, when generated encryption key word indexing, introduces the PKI of cloud server, provides the authentication function to querying server.In query script, only have the cloud server private key of oneself just can carry out query manipulation.Because assailant does not know the private key of cloud server, even if assailant obtains cryptography key word thresholding, also query manipulation cannot be completed.
(3) the invention provides controlled inquiry.In the present invention, authorized user is needed to use the private key of oneself could generate legal keyword query thresholding.Owing to not knowing the private key of authorized user, assailant and cloud server pseudo-cannot produce legal keyword query thresholding.Therefore, in not authorized user's license situation, assailant and cloud server cannot carry out any search.
(4) the invention provides multi-user's inquiry.The present invention uses and acts on behalf of re-encryption to realize the function of multi-user's inquiry.Each authorized user has a query key, and uses this query key generated encryption key word to inquire about thresholding.If the query key of certain user has been revealed, cloud server can abolish this query key, then regenerates new query key for the user of compromised keys, and this process does not affect other validated users and uses its key to inquire about.
(5) the invention provides the completeness of Query Result and the checking of outsourcing data integrity, signature of the present invention covers the All Files be associated with key word index, can verify whether this data file is replaced, revises in the process of outsourcing, gets final product verification of data integrity.Use signature that the All Files belonging to key word index and its is associated, can verify whether all satisfactory files all successfully return, get final product the completeness of revene lookup result.Data owner uses its private key SK ' dOsign, authorized user needs usage data owner PKI PK ' dOverifying, can verification msg source be data owner.
(6) optimum indexing of the present invention and inquiry mode promote search efficiency, and the present invention is optimized traditional searched for encrypted indexes structure, introduce hash query in keyword query link.In query script, by the inquiry of user, calculate inquiry cryptographic Hash, then locator key word indexing memory location.Under the condition not considering hash-collision, average length of search ASL=1, the time complexity of inquiry is similar to O (1), in query script, introduces hash query mechanism, significantly improves the search efficiency of system, realize the fast finding to high in the clouds data.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of the inventive method.
Fig. 2 is the structure chart of re-encrypted private key table.
Fig. 3 is the schematic diagram of search index table.
Fig. 4 is the exemplary plot that cloud server is encrypted inquiry.
Fig. 5 is after adding data file, to the renewal process schematic diagram of cloud outsourcing data.
Fig. 6 is add key word index in file index after, to the renewal process schematic diagram of cloud outsourcing data.
Embodiment
Below in conjunction with embodiment and accompanying drawing, the present invention is described in further detail, but embodiments of the present invention are not limited thereto.
Embodiment 1
The present invention mainly studies the searched for encryption technology under public-key cryptosystem; propose a kind of multi-user's cloud cryptography key word searching method verifying integrality and completeness; the method achieve the query and search function to enciphered data, and protect the inquiry privacy of user.On the basis realizing basic encryption search, the present invention is directed to the feature that multi-user access and big data quantity store under cloud environment, propose multi-user and inquire about setting, and optimize index structure and the inquiry mechanism of encrypt file, realize the function of dynamic subscriber's control of authority and quick-searching enciphered data.The present invention have also been devised the authentication mechanism of Query Result completeness and outsourcing data integrity, uses homomorphism hash function to associate encrypt file with signature binding key word index with it and provides authentication function.
Verify that the detailed process of multi-user's cloud cryptography key word searching method of integrality and completeness is described in detail below in conjunction with Fig. 1 to above-mentioned.
(1) system model
Data owner is encrypted data file and index key corresponding to file.And enciphered data is stored into cloud server.Cloud server is the file group memory allocated space of data owner, and sets up key word index structure and realize query function.Multiple authorized user can generate the inquiry thresholding of band cryptography key word according to the private key of oneself, and sends to cloud server to inquire about.Cloud server is inquired about thresholding to user and is inquired about, and finds out the file and authorization information that meet user's inquiry, and returns to inquiring user.User can according to Query Result and authorization information, the completeness of revene lookup result and integrality.
(2) common parameter and secret generating
Common parameter generates: establish G 1, G 2the multiplicative group of prime number p that to be all rank be, wherein g is multiplicative group G 1generator.Definition bilinear map e:G 1× G 1→ G 2, e (g, g) is multiplicative group G 2generator.If H 1(): { 0,1} *→ G 1, H 2(): G 2→ { 0,1} logp, f (): { 0,1} *→ { 0,1} nsafe one-way Hash function, H r() is homomorphism hash function, and Z () is the hash function for compressing.If E k() is the symmetric encipherment algorithm for encrypt file, and INDEX () is the key word index of public key encryption, and HMAC () is the algorithm generating keyword summary, E ' sk() is the public key encryption algorithm for signing.
Secret generating: data owner selects as the private key of its cryptography key word indexing, and calculate PKI data owner selects symmetric key k, for data file encryption.In addition, data owner also need generate for data signature public private key pair (SK ' dO, PK ' dO).Cloud server is selected as its private key, and calculate PKI data owner's Stochastic choice and distribute to user U i, as the private key of its generated encryption key word inquiry thresholding.And generate the re-encrypted private key of this user send cloud server to.Cloud server stores re-encrypted private key table, and list structure as shown in Figure 2.
(3) data owner generates key word index, encrypt file and digital signature
Generate key word index and data file encryption: for each keyword W i, data owner calculates and calculate key word index INDEX (W i)=H 2(t).Use symmetric key k to be encrypted to each data file M data owner, encrypt file is expressed as E k(M).
Generate signature: suppose file M 1, M 2, M 3index all comprise keyword W 1, then indexing model is as shown in table 1:
Table 1 key word index structure
Data owner calculates keyword W 1summary:
HMAC (W 1)=H r(Z (M 1) × f (W 1)+Z (M 2) × f (W 1)+Z (M 3) × f (W 1)), and being stored in the keyword abstract of local maintenance, keyword abstract structure is as shown in table 2.
Table 2 keyword abstract structure
Keyword Summary
W 1 HMAC(W 1)
W 2 HMAC(W 2)
... ...
W i HMAC(Wi)
... ...
Before outsourcing data, data owner is with its signature private key SK ' dOto each keyword summary HMAC (W i) sign, namely data owner sends to cloud server to carry out data outsourcing storage file, key word index and signature.
(4) cloud server stores data and data query
Index structure: cloud server is the file group memory allocated space of data owner after receiving the key word index of data owner's outsourcing, file and signature, and set up the key word index structure for inquiring about.
The present embodiment introduces hash query mechanism in query script, thus improves search efficiency.Meanwhile, the present embodiment introduces signature, thus ensure that completeness and the integrality of Query Result.The structure of the search index table that the present embodiment is set up as shown in Figure 3.In figure, ad (Ek (Mj)) represents the address of encrypt file Ek (Mj) in cloud stores.
Cloud server as query term, sets up search index table with each key word index, preserves index information and signing messages.And set up the address that chained list preserves the All Files associated with key word index, connect chained list and concordance list by the pointer entry of search index table.In search procedure, hash query is used to improve keyword search mechanism.Cloud server by calculating the cryptographic Hash of key word index, the memory location of locator key word indexing, then travels through the file address chained list of its pointer entry sensing, can inquire the address of all encrypt files associated with this key word index.
Query script:
User's generated encryption key word inquiry thresholding: authorized user U iuse its key SK uiand key word of the inquiry generated encryption key word inquiry thresholding wherein U ifor the ID of this authorized user.Authorized user is inquiry thresholding T wsend to cloud server.
Cloud server is encrypted search: cloud server is receiving the inquiry thresholding of authorized user after, by calculating Hash 1(U i) find user U iact on behalf of re-encrypted private key carry out acting on behalf of re-encryption conversion as follows:
T W ′ = e ( H 1 ( W ~ ) SK Ui , PK S SK DO SK Ui ) SK S = e ( H 1 ( W ~ ) , PK S SK DO ) SK S
Cloud server calculates Hash 2(T ' w), navigate to and thresholding T ' wcorresponding key word index INDEX (W i), and by traveling through the file address chained list of this list item pointed, obtain the All Files address with this keyword association, take out the file group meeting search request.Cloud server as Query Result, returns to inquiring user using the signature of this file group and this keyword.
Example: in the diagram, if inquiry thresholding is cloud server passes through Hash 2(T ' w) navigate to INDEX (W 1) corresponding to list item, take out signature sigma (W 1), and the file address chained list that traversal is drawn can obtain W 1corresponding file group (E k(M 1), E k(M 2), E k(M 3)).
Cloud server is signature sigma (W 1) and index contain W 1encrypt file group (E k(M 1), E k(M 2), E k(M 3)) return to inquiring user U as Query Result i.
(5) user authentication data
User receives signature sigma (W 1) and encrypt file group (E k(M 1), E k(M 2), E k(M 3)) after, first user first uses data owner public signature key PK ' dOsolve σ (W 1) in summary HMAC (W 1).Then from encrypt file group (E k(M 1), E k(M 2), E k(M 3)) in solve file M 1, M 2, M 3, with the homomorphism hash function H generating summary r(), compression function Z () and safe one-way Hash function f () function validates summary:
HMAC(W 1)=H r(Z(M 1)×f(W 1)+Z(M 2)×f(W 1)+Z(M 3)×f(W 1));
If expression formula is set up, then M 1, M 2, M 3file is complete, is not namely modified or replaces.Signature establishes associating of keyword and file, and certifying signature correctness, namely demonstrates the completeness of Query Result.
(6) outsourcing Data Update
Outsourcing Data Update: this programme considers data owner's upgrading demand to cloud outsourcing data, renewal rewards theory is divided into following two kinds of situations:
<1> adds data file E k(M l), the index of file comprises multiple keyword W iand W j.
First data owner generates keyword W according to the method for previous step (3) iand W jindex INDEX ( W i ) = e ( H 1 ( W i ) , PK S SK DO ) With INDEX ( W j ) = e ( H 1 ( W j ) , PK S SK DO ) .
Trasaction key W again iand W jcorresponding summary HMAC (W i) and HMAC (W j).Data owner first takes out keyword W in local abstract iand W jcorresponding summary HMAC (W i) and HMAC (W j), utilize the homomorphism character of homomorphism hash function to complete renewal rewards theory:
HMAC(W i)′=HMAC(W i)×H r(Z(M L)·f(W i));
HMAC(W j)′=HMAC(W j)×H r(Z(M L)·f(W j));
Data owner also needs the summary after renewal to be written back to local abstract, upgrades.
After upgrading local abstract, data owner utilizes signature private key SK ' dOsummary is signed:
&sigma; ( W i ) = E SK DO &prime; ( HMAC ( W i ) )
&sigma; ( W j ) = E SK DO &prime; ( HMAC ( W j ) )
In renewal cryptography key word indexing with after generating signature, data owner is file E k(M l), key word index INDEX (W i), INDEX (W j) and signature sigma (W i) and σ (W j) send to cloud server to carry out Data Update.
After cloud server receives data, need trasaction key index structure, key word index INDEX (W can be navigated to by hash query i) and INDEX (W j) list item at place, upgrade signature sigma (W i), σ (W j), and in the file address chained list of correspondence, insert preservation file E k(M l) node of address, complete operation is as shown in Figure 5.
<2> adds key word index W in file index l, and stored in comprising W lmultiple data file E of keyword k(M i), E k(M j).
First data owner generates keyword W according to the method for previous step (3) lindex INDEX ( W L ) = e ( H 1 ( W L ) , PK S SK DO ) , And to file M i, M jbe encrypted.
Regeneration is made a summary: HMAC (W l)=H r(Z (M i) f (W l)) × H r(Z (M j) f (W l)) and summary is kept in local abstract.And with data owner's signature private key SK ' dOsummary is signed:
Data owner is index INDEX (W l), file E k(M i), E k(M j) and signature sigma (W l) send to cloud server to carry out data outsourcing.
After cloud server receives data, need to upgrade index structure.Cloud server calculates the cryptographic Hash hash of key word index 2(INDEX (W l)) list item position, location, distribute this space to key word index INDEX (W l), if there is hash-collision, employing is closed hash mode and is evaded conflict.Again signature sigma (W l) stored in concordance list, and set up file address chained list preservation file E k(M i), E k(M j) address information.Renewal process as shown in Figure 6.
(7) subscriber authorisation with cancel authority
<1> subscriber authorisation:
Before user is encrypted search, first data owner needs to authorize user.For user U l, data owner's Stochastic choice distribute to user U las its query key, and generate the re-encrypted private key of this user user identification number U lwith re-encrypted private key RK uL → DOcloud server S is sent to hidden passageway.
Authorized user U lby query key SK uLgenerate legal inquiry thresholding, and use re-encrypted private key RK by Cloud Server uL → DOre-encryption conversion is carried out, execution query manipulation that can be correct to inquiry thresholding.
<2> cancels user right power:
Data owner if desired cancels user U dsearch access right, need the ID U sending this user dwith cancel an order to cloud server, cloud server navigates to user U by hash query dat the list item of re-encrypted private key table, deleting this list item, making the user by cancelling authority cannot complete legal thresholding re-encryption, execution query manipulation that cannot be legal when inquiring about.
For the completeness of solution cryptography key word search and the validation problem of data integrity, the present embodiment utilizes homomorphism hash function, for the renewable informative abstract of each key word of the inquiry Index Design, and with data owner's private key, summary is signed, to realize the function verified.Meanwhile, the multiple data files using index key and comprise this keyword build informative abstract, and inquiring user can be verified, and whether the All Files relevant to key word of the inquiry all returns (completeness of Query Result).And due to the information containing the All Files that key word of the inquiry is correlated with of making a summary, therefore, the process of checking summary itself also contains the checking of the integrality to each data file, namely can verify that the file whether inquired about is not modified replacement.After information generated summary, data owner uses its private key, signs to informative abstract, ensures that the signature for verifying derives from data owner.In order to realize dynamically updating of informative abstract, the present embodiment also uses homomorphism hash function information generated to make a summary, and when the index structure of Outsourced database changes, utilizes the homomorphism character of homomorphism hash function, can realize dynamically updating informative abstract.
Provide a concrete application scenarios below so that the use procedure of the present embodiment to be described.
Cloud service provider opens cloud storage platform to enterprise (data owner), and enterprise realizes sharing of intra-company's data at this platform of use, thus reduces the data management cost of company.Company executives uploads cloud storage center by after intra-company's data encryption, for ease of search, the file uploaded is extracted the encryption of multiple keyword and forms the index being convenient to retrieve.Not to be lost in cloud service center in order to the data of guarantee company and to distort, company executives by calculating the summary of the keyword extracted from file, at local maintenance keyword abstract, to check the integrality of data afterwards.
Intra-company's data of encryption and index upload in the memory space of cloud service provider distribution, and cloud service provider cloud server, using each key word index as query term, sets up search index table, preserve index information and signing messages.And set up the address that chained list preserves the All Files associated with key word index, connect chained list and concordance list by the pointer entry of search index table.
When company low layer employee wishes the inquiry carrying out intra-company's material, corporate executive is the key that bottom employee distributes inquiry intra-company data by escape way, and is encrypted one by one by the key of low layer employee and form re-encrypted private key table and send to cloud service provider.In search procedure, employee forms search gating transmit to cloud service provider with the private key of oneself, cloud service provider uses hash query to improve keyword search mechanism, because improve search efficiency, thus can faster for bottom employee returns result for retrieval.
After low layer employee obtains the data returned, certifying signature correctness, because signature establishes associating of keyword and file in this programme, thus once demonstrate the correctness of signature, namely demonstrates the completeness of Query Result.Signature verification is correct, and represent that data are not modified or replace, enciphered data can be decrypted.
When company personnel have new ideas into personnel and Personnel Who Left time, company executives can be authorized the intra-company's data check authority dispensed or reclaim.
Above-described embodiment is the present invention's preferably execution mode; but embodiments of the present invention are not restricted to the described embodiments; change, the modification done under other any does not deviate from Spirit Essence of the present invention and principle, substitute, combine, simplify; all should be the substitute mode of equivalence, be included within protection scope of the present invention.

Claims (10)

1. can verify multi-user's cloud cryptography key word searching method of integrality and completeness, it is characterized in that, comprise step:
(1) data owner is encrypted data file, extracts multiple keyword simultaneously and be encrypted to form the key word index for inquiring about from the data file uploaded; Simultaneously to each keyword extracted, utilize homomorphism hash function to generate keyword summary, set up a keyword abstract in this locality; Data owner generates the public signature key and signature private key that are used for data signature, before outsourcing data, signs, finally the data file of encryption, key word index and signature are sent to cloud server with its signature private key to each keyword summary;
(2) cloud server is data file and the key word index memory allocated space of above-mentioned encryption, cloud server is using each key word index as query term simultaneously, set up search index table, preserve index information and signing messages, and set up the address that chained list preserves the All Files associated with each key word index, connect chained list and search index table by the pointer entry of search index table;
(3) data owner is by the private key of safe lane needed for the data file of multiple authorized user distribution inquiry encryption, data owner also generates the re-encrypted private key of corresponding authorized user simultaneously, and the re-encrypted private key table use safety channel all re-encrypted private key be combined to form sends to cloud server, in query script, the authorized user private key of oneself forms inquiry gating transmit to cloud server;
(4) cloud server is inquired about inquiry thresholding according to search index table, finds out the file group and signing messages that meet authorized user inquiry, and returns to authorized user;
(5) after the authorized user signing messages that receives keyword and file group, the summary in signature is solved with the public signature key of data owner and homomorphism hash function, then from encrypt file group, file is solved, then verify that this solves file whether consistent with summary with the keyword of inquiry, if consistent, then represent that file group file is complete and Query Result is complete, otherwise represent that file is imperfect, Query Result is incomplete; Described file group file complete representation data file is not modified or replaces, and described Query Result complete expression Query Result includes the data file of all indexes containing this keyword.
2. the multi-user's cloud cryptography key word searching method verifying integrality and completeness according to claim 1, it is characterized in that, in described step (1), to each data file M, data owner uses symmetric key k to be encrypted, and encrypt file is expressed as E k(M), wherein E k() is the symmetric encipherment algorithm for encrypt file;
For i-th keyword W i, key word index is INDEX (W i)=H 2(t), wherein if G 1, G 2the multiplicative group of prime number p that to be all rank be, wherein g is multiplicative group G 1generator, definition bilinear map e:G 1× G 1→ G 2, e (g, g) is multiplicative group G 2generator, if H 1(): { 0,1} *→ G 1, H 2(): G 2→ { 0,1} logp, for the private key that data owner adopts for cryptography key word indexing, for the PKI of cloud server, for the private key of cloud server.
3. the multi-user's cloud cryptography key word searching method verifying integrality and completeness according to claim 1, is characterized in that, in described step (1), for i-th keyword W i, the formula utilizing homomorphism hash function to generate keyword summary is:
HMAC(W i)=H r(Z(M 1)×f(W i)+Z(M 2)×f(W i)+……+Z(M i)×f(W i));
Wherein f (): { 0,1} *→ { 0,1} nsafe one-way Hash function, H r() is homomorphism hash function, and Z () is the hash function for compressing, M 1, M 2... M idata file.
4. the multi-user's cloud cryptography key word searching method verifying integrality and completeness according to claim 1, is characterized in that, in described step (1), described data owner generates the public signature key PK ' be used for data signature dOwith signature private key SK ' dO, before outsourcing data, data owner is with its signature private key SK ' dOto each keyword summary HMAC (W i) sign, namely obtain e ' sk() is the public key encryption algorithm for signing.
5. the multi-user's cloud cryptography key word searching method verifying integrality and completeness according to claim 1, is characterized in that, in described step (3), data owner selects as the private key of its cryptography key word indexing, and calculate PKI then Stochastic choice by SK uidistribute to authorized user U ias the private key of its generated encryption key word inquiry thresholding, U ifor the ID of authorized user, generate the re-encrypted private key of this authorized user finally by each authorized user identities number and its re-encrypted private key one to one re-encrypted private key table be sent to cloud server.
6. the multi-user's cloud cryptography key word searching method verifying integrality and completeness according to claim 5, it is characterized in that, in described step (3), in query script, it is as follows to the step of cloud server that authorized user forms inquiry gating transmit with the private key of oneself: authorized user U iuse its key SK uiwith the keyword that will inquire about generated encryption key word inquiry thresholding wherein U ifor the ID of this authorized user, authorized user is inquiry thresholding T wsend to cloud server.
7. the multi-user's cloud cryptography key word searching method verifying integrality and completeness according to claim 6, it is characterized in that, in described step (4), cloud server is receiving the inquiry thresholding of authorized user after, by inquiry re-encrypted private key table, find this authorized user U ire-encrypted private key carry out acting on behalf of re-encryption conversion as follows:
T W &prime; = e ( H 1 ( W ~ ) SK Ui , PK S SK DO SK Ui ) SK S = e ( H 1 ( W ~ ) , PK S SK DO ) SK S ;
Cloud server navigates to and thresholding T ' according to search index table wcorresponding key word index INDEX (W i), and by traveling through the file address chained list that this table pointer item points to, obtain the All Files address with this keyword association, take out the file group meeting search request, cloud server as Query Result, returns to the authorized user U of current queries using the signing messages of this file group and this keyword i.
8. the multi-user's cloud cryptography key word searching method verifying integrality and completeness according to claim 1, it is characterized in that, in described step (5), after the signing messages that authorized user receives keyword and encrypt file group, first authorized user first uses data owner public signature key PK ' dOsolve the summary in signature, then from encrypt file group, solve file M 1, M 2... M i, with the homomorphism hash function H generating summary r(), compression function Z () and safe one-way Hash function f (): { 0,1} *→ { 0,1} nchecking summary, checking formula is:
HMAC(W 1)=H r(Z(M 1)×f(W 1)+Z(M 2)×f(W 1)+……+Z(M i)×f(W 1));
If expression formula is set up, then M 1, M 2... M ifile is complete, is not namely modified or replaces, otherwise just represents that file is imperfect.
9. the multi-user's cloud cryptography key word searching method verifying integrality and completeness according to claim 1, it is characterized in that, also comprise step: (6) upgrade cloud outsourcing data, renewal rewards theory is divided into following two kinds of situations:
(6-1) as will data file E be added k(M l), the index of this file comprises multiple keyword W iand W j, then step of updating is as follows:
(6-1-1) first data owner generates keyword W iand W jindex with and then trasaction key W iand W jcorresponding summary HMAC (W i) and HMAC (W j), data owner first takes out keyword W in local keyword abstract iand W jcorresponding summary HMAC (W i) and HMAC (W j), utilize the homomorphism character of homomorphism hash function to complete renewal rewards theory:
HMAC(W i)′=HMAC(W i)×H r(Z(M L)·f(W i));
HMAC(W j)′=HMAC(W j)×H r(Z(M L)·f(W j));
Data owner is written back to local keyword abstract the summary after renewal again, upgrades;
(6-1-2), after upgrading local keyword abstract, data owner utilizes signature private key SK ' dOkeyword summary is signed:
&sigma; ( W i ) = E SK DO &prime; ( HMAC ( W i ) ) ;
&sigma; ( W j ) = E SK DO &prime; ( HMAC ( W j ) ) ;
(6-1-3) in renewal cryptography key word indexing with after generating signature, data owner sends to cloud server to carry out Data Update the data file of encryption, key word index and signature;
(6-1-4), after cloud server receives data, upgrade search index table, navigate to key word index INDEX (W by hash query i) and INDEX (W j) list item at place, upgrade signature sigma (W i), σ (W j), and in the file address chained list of correspondence, insert preservation file E k(M l) node of address;
(6-2) as key word index W will be added in file index l, and stored in comprising W lmultiple data file E of keyword k(M i), E k(M j), then step of updating is as follows:
(6-2-1) data owner generates keyword W lindex and to file M i, M jbe encrypted;
(6-2-2) summary is generated: and summary is kept in local keyword abstract, and with data owner's signature private key SK ' dOsummary is signed: &sigma; ( W L ) = E SK DO &prime; ( HMAC ( W L ) ) ;
(6-2-3) data owner is index INDEX (W l), file E k(M i), E k(M j) and signature sigma (W l) send to cloud server to carry out data outsourcing;
(6-2-4) after cloud server receives data, upgrade search index table, cloud server calculates the cryptographic Hash hash of key word index 2(INDEX (W l)) list item position, location, distribute this space to key word index INDEX (W l), if there is hash-collision, employing is closed hash mode and is evaded conflict, then signature sigma (W l) stored in concordance list, and set up file address chained list preservation file E k(M i), E k(M j) address information.
10. the multi-user's cloud cryptography key word searching method verifying integrality and completeness according to claim 1, is characterized in that, also comprise step:
(7) data owner if desired revocation user U dsearch access right, then send the ID U of this user dwith cancel an order to cloud server, cloud server navigates to user U by hash query dat the list item of re-encrypted private key table, deleting this list item, making the user by cancelling authority cannot complete legal thresholding re-encryption, execution query manipulation that cannot be legal when inquiring about.
CN201410708142.3A 2014-11-27 2014-11-27 It can verify that multi-user's cloud encryption keyword searching method of integrality and completeness Active CN104394155B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410708142.3A CN104394155B (en) 2014-11-27 2014-11-27 It can verify that multi-user's cloud encryption keyword searching method of integrality and completeness

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410708142.3A CN104394155B (en) 2014-11-27 2014-11-27 It can verify that multi-user's cloud encryption keyword searching method of integrality and completeness

Publications (2)

Publication Number Publication Date
CN104394155A true CN104394155A (en) 2015-03-04
CN104394155B CN104394155B (en) 2017-12-12

Family

ID=52611990

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410708142.3A Active CN104394155B (en) 2014-11-27 2014-11-27 It can verify that multi-user's cloud encryption keyword searching method of integrality and completeness

Country Status (1)

Country Link
CN (1) CN104394155B (en)

Cited By (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104780161A (en) * 2015-03-23 2015-07-15 南京邮电大学 Searchable encryption method supporting multiple users in cloud storage
CN104821876A (en) * 2015-04-16 2015-08-05 华中科技大学 Dynamic searchable symmetrical encryption method supporting physical deletion
CN104980437A (en) * 2015-06-12 2015-10-14 电子科技大学 Identity-based authorized third party data integrity proving method
CN105763322A (en) * 2016-04-13 2016-07-13 同济大学 Obfuscatable encryption key-insulated digital signature making method and system
CN105763324A (en) * 2016-04-19 2016-07-13 四川理工学院 Controllable searchable encryption searching method being able to verify multi user-ends
CN105868987A (en) * 2016-03-28 2016-08-17 中国银联股份有限公司 Method and system for sharing information among devices
CN106022145A (en) * 2016-05-17 2016-10-12 上海凭安网络科技有限公司 Cryptograph index-based data query method
CN106022584A (en) * 2016-05-13 2016-10-12 成都镜杰科技有限责任公司 Resource management method for small enterprises
CN106227783A (en) * 2016-07-18 2016-12-14 浪潮软件集团有限公司 Government affair data aggregation device, data providing end, system and method
CN106375344A (en) * 2016-11-02 2017-02-01 华北电力大学(保定) Intelligent grid load integrity attack detection method for cloud storage
CN106559379A (en) * 2015-09-25 2017-04-05 富泰华工业(深圳)有限公司 High in the clouds encryption system and method
CN106603636A (en) * 2016-11-29 2017-04-26 中国银联股份有限公司 Error transaction standardization method and device
CN106610995A (en) * 2015-10-23 2017-05-03 华为技术有限公司 Ciphertext index creating method, device and system
CN106776791A (en) * 2016-11-23 2017-05-31 深圳大学 A kind of pattern matching verification method and device based on cloud service
CN106897368A (en) * 2017-01-16 2017-06-27 西安电子科技大学 Database update operating method is set and its be can verify that in the summation of Merkle Hash
CN107181596A (en) * 2017-06-05 2017-09-19 福建师范大学 It is a kind of that encryption method can search for based on Bilinear map
CN107256248A (en) * 2017-06-07 2017-10-17 福州大学 Encryption method can search for based on asterisk wildcard in cloud storage safety
CN107395568A (en) * 2017-06-21 2017-11-24 西安电子科技大学 A kind of cipher text retrieval method of more data owner's certifications
CN107454106A (en) * 2017-09-15 2017-12-08 北京海泰方圆科技股份有限公司 A kind of method and device of Information Authentication
CN107451281A (en) * 2017-08-08 2017-12-08 东北大学 Outsourced database SQL query integrity verification system and method based on ADS
CN108021677A (en) * 2017-12-07 2018-05-11 成都博睿德科技有限公司 The control method of cloud computing distributed search engine
CN108038225A (en) * 2017-12-25 2018-05-15 北京九章云极科技有限公司 A kind of data processing method and system
CN108062485A (en) * 2017-12-15 2018-05-22 北京工业大学 A kind of fuzzy keyword searching method of multi-service oriented device multi-user
CN108400871A (en) * 2018-01-25 2018-08-14 南京邮电大学 In conjunction with the searching ciphertext system and method for identity and the support proxy re-encryption of attribute
CN108616593A (en) * 2018-05-03 2018-10-02 湖南东方华龙信息科技有限公司 Method by the way that storage of linked list high in the clouds certificate can be traced
TWI638271B (en) * 2017-11-08 2018-10-11 國立成功大學 Cloud server system with encrypted file keyword fuzzy search function
WO2018232554A1 (en) * 2017-06-19 2018-12-27 深圳大学 Pattern string match verification method, device, apparatus and storage medium
CN109120399A (en) * 2018-08-10 2019-01-01 广东工业大学 A kind of data ciphering method based on asymmetric encryption, decryption method and system
CN109274504A (en) * 2018-11-20 2019-01-25 桂林电子科技大学 A kind of multi-user's big data storage sharing method and system based on cloud platform
CN109299217A (en) * 2018-11-02 2019-02-01 符安文 A kind of secure storage and search method based on block chain
CN109492410A (en) * 2018-10-09 2019-03-19 华南农业大学 Data can search for encryption and keyword search methodology, system and terminal, equipment
CN109543434A (en) * 2018-11-28 2019-03-29 深圳市墨者安全科技有限公司 Block chain information encryption method, decryption method, storage method and device
CN109547413A (en) * 2018-10-23 2019-03-29 莆田学院 The access control method of convertible data cloud storage with data source authentication
CN110073430A (en) * 2016-12-21 2019-07-30 默克专利有限公司 For the anti-fake composite safe label based on PUF
CN110139131A (en) * 2018-02-09 2019-08-16 网宿科技股份有限公司 A kind of method and terminal of playing video file
CN110168554A (en) * 2017-01-06 2019-08-23 微软技术许可有限责任公司 Strong resource identity in cloud mandatory system
CN110166466A (en) * 2019-05-28 2019-08-23 湖南大学 It is a kind of efficiently the multi-user of renewal authority to can search for encryption method and system
JP6599066B1 (en) * 2018-05-08 2019-10-30 三菱電機株式会社 Registration device, server device, secret search system, secret search method, registration program, and server program
CN110691078A (en) * 2019-09-25 2020-01-14 东北大学 Block chain-based data dynamic reliability verification method
CN110851848A (en) * 2019-11-12 2020-02-28 广西师范大学 Privacy protection method for symmetric searchable encryption
CN111404895A (en) * 2020-03-06 2020-07-10 湖南智慧政务区块链科技有限公司 Method, equipment and storage medium for distributing and recovering readable permission of shared data
CN113037743A (en) * 2021-03-05 2021-06-25 杭州奕锐电子有限公司 Encryption method and system for cloud server file
CN113127536A (en) * 2021-04-14 2021-07-16 上海同态信息科技有限责任公司 Offline fuzzy matching framework based on homomorphic configuration encryption
CN114520747A (en) * 2022-04-21 2022-05-20 山东省计算中心(国家超级计算济南中心) Data security sharing system and method taking data as center
CN115225364A (en) * 2022-07-15 2022-10-21 中国科学技术大学 High-efficiency dynamic access control method and system for cloud-oriented encrypted data
US11645424B2 (en) 2020-04-27 2023-05-09 International Business Machines Corporation Integrity verification in cloud key-value stores
US11770250B2 (en) 2021-02-10 2023-09-26 Huazhong University Of Science And Technology Method and system for ensuring search completeness of searchable public key encryption

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103024035A (en) * 2012-12-11 2013-04-03 上海交通大学 Safe and energy-saving encryption searching method based on mobile cloud platform
US20140019765A1 (en) * 2011-01-07 2014-01-16 Thomson Licensing Device and method for online storage, transmission device and method, and receiving device and method
CN103607405A (en) * 2013-11-27 2014-02-26 东北大学 Ciphertext search authentication method oriented towards cloud storage
CN103873236A (en) * 2012-12-12 2014-06-18 华为技术有限公司 Searchable encryption method and equipment thereof
CN104021157A (en) * 2014-05-22 2014-09-03 西安理工大学 Method for keyword searchable encryption based on bilinear pairs in cloud storage
CN104023051A (en) * 2014-05-22 2014-09-03 西安理工大学 Multi-user multi-keyword searchable encryption method in cloud storage
CN104038349A (en) * 2014-07-03 2014-09-10 西安电子科技大学 Effective and verifiable public key searching encryption method based on KP-ABE

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140019765A1 (en) * 2011-01-07 2014-01-16 Thomson Licensing Device and method for online storage, transmission device and method, and receiving device and method
CN103024035A (en) * 2012-12-11 2013-04-03 上海交通大学 Safe and energy-saving encryption searching method based on mobile cloud platform
CN103873236A (en) * 2012-12-12 2014-06-18 华为技术有限公司 Searchable encryption method and equipment thereof
CN103607405A (en) * 2013-11-27 2014-02-26 东北大学 Ciphertext search authentication method oriented towards cloud storage
CN104021157A (en) * 2014-05-22 2014-09-03 西安理工大学 Method for keyword searchable encryption based on bilinear pairs in cloud storage
CN104023051A (en) * 2014-05-22 2014-09-03 西安理工大学 Multi-user multi-keyword searchable encryption method in cloud storage
CN104038349A (en) * 2014-07-03 2014-09-10 西安电子科技大学 Effective and verifiable public key searching encryption method based on KP-ABE

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张蓓;王晓明: "带关键词检索的公钥加密方案", 《计算机工程 第36卷第6期》 *

Cited By (74)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104780161B (en) * 2015-03-23 2018-04-10 南京邮电大学 Support multi-user's to can search for encryption method in a kind of cloud storage
CN104780161A (en) * 2015-03-23 2015-07-15 南京邮电大学 Searchable encryption method supporting multiple users in cloud storage
CN104821876A (en) * 2015-04-16 2015-08-05 华中科技大学 Dynamic searchable symmetrical encryption method supporting physical deletion
CN104821876B (en) * 2015-04-16 2018-02-16 华中科技大学 A kind of dynamic for supporting that physics is deleted can search for symmetric encryption method
CN104980437B (en) * 2015-06-12 2019-02-12 电子科技大学 A kind of authorization third party's data integrity method of proof of identity-based
CN104980437A (en) * 2015-06-12 2015-10-14 电子科技大学 Identity-based authorized third party data integrity proving method
CN106559379A (en) * 2015-09-25 2017-04-05 富泰华工业(深圳)有限公司 High in the clouds encryption system and method
CN106610995A (en) * 2015-10-23 2017-05-03 华为技术有限公司 Ciphertext index creating method, device and system
CN105868987B (en) * 2016-03-28 2019-08-13 中国银联股份有限公司 A kind of method and system of shared information between devices
CN105868987A (en) * 2016-03-28 2016-08-17 中国银联股份有限公司 Method and system for sharing information among devices
CN105763322B (en) * 2016-04-13 2019-01-25 同济大学 A kind of encryption key isolation digital signature method and system obscured
CN105763322A (en) * 2016-04-13 2016-07-13 同济大学 Obfuscatable encryption key-insulated digital signature making method and system
CN105763324A (en) * 2016-04-19 2016-07-13 四川理工学院 Controllable searchable encryption searching method being able to verify multi user-ends
CN106022584A (en) * 2016-05-13 2016-10-12 成都镜杰科技有限责任公司 Resource management method for small enterprises
CN106022145B (en) * 2016-05-17 2019-07-30 上海凭安网络科技有限公司 A kind of data query method based on ciphertext index
CN106022145A (en) * 2016-05-17 2016-10-12 上海凭安网络科技有限公司 Cryptograph index-based data query method
CN106227783B (en) * 2016-07-18 2019-10-25 山东爱城市网信息技术有限公司 A kind of government data polyplant, data provide end, system and method
CN106227783A (en) * 2016-07-18 2016-12-14 浪潮软件集团有限公司 Government affair data aggregation device, data providing end, system and method
CN106375344A (en) * 2016-11-02 2017-02-01 华北电力大学(保定) Intelligent grid load integrity attack detection method for cloud storage
CN106776791A (en) * 2016-11-23 2017-05-31 深圳大学 A kind of pattern matching verification method and device based on cloud service
WO2018094764A1 (en) * 2016-11-23 2018-05-31 深圳大学 Method and device for pattern string match verification based on cloud service
CN106603636A (en) * 2016-11-29 2017-04-26 中国银联股份有限公司 Error transaction standardization method and device
CN110073430A (en) * 2016-12-21 2019-07-30 默克专利有限公司 For the anti-fake composite safe label based on PUF
CN110168554A (en) * 2017-01-06 2019-08-23 微软技术许可有限责任公司 Strong resource identity in cloud mandatory system
CN110168554B (en) * 2017-01-06 2023-09-19 微软技术许可有限责任公司 Strong resource identity in cloud escrow system
CN106897368A (en) * 2017-01-16 2017-06-27 西安电子科技大学 Database update operating method is set and its be can verify that in the summation of Merkle Hash
CN107181596A (en) * 2017-06-05 2017-09-19 福建师范大学 It is a kind of that encryption method can search for based on Bilinear map
CN107181596B (en) * 2017-06-05 2020-08-04 福建师范大学 Searchable encryption method based on bilinear pairings
CN107256248B (en) * 2017-06-07 2020-05-08 福州大学 Wildcard-based searchable encryption method in cloud storage security
CN107256248A (en) * 2017-06-07 2017-10-17 福州大学 Encryption method can search for based on asterisk wildcard in cloud storage safety
WO2018232554A1 (en) * 2017-06-19 2018-12-27 深圳大学 Pattern string match verification method, device, apparatus and storage medium
CN107395568A (en) * 2017-06-21 2017-11-24 西安电子科技大学 A kind of cipher text retrieval method of more data owner's certifications
CN107451281A (en) * 2017-08-08 2017-12-08 东北大学 Outsourced database SQL query integrity verification system and method based on ADS
CN107454106A (en) * 2017-09-15 2017-12-08 北京海泰方圆科技股份有限公司 A kind of method and device of Information Authentication
CN107454106B (en) * 2017-09-15 2018-07-06 北京海泰方圆科技股份有限公司 A kind of method and device of Information Authentication
TWI638271B (en) * 2017-11-08 2018-10-11 國立成功大學 Cloud server system with encrypted file keyword fuzzy search function
CN108021677A (en) * 2017-12-07 2018-05-11 成都博睿德科技有限公司 The control method of cloud computing distributed search engine
CN108062485A (en) * 2017-12-15 2018-05-22 北京工业大学 A kind of fuzzy keyword searching method of multi-service oriented device multi-user
CN108038225B (en) * 2017-12-25 2019-02-12 北京九章云极科技有限公司 A kind of data processing method and system
CN108038225A (en) * 2017-12-25 2018-05-15 北京九章云极科技有限公司 A kind of data processing method and system
CN108400871A (en) * 2018-01-25 2018-08-14 南京邮电大学 In conjunction with the searching ciphertext system and method for identity and the support proxy re-encryption of attribute
CN108400871B (en) * 2018-01-25 2019-09-10 南京邮电大学 In conjunction with the searching ciphertext system and method for identity and the support proxy re-encryption of attribute
CN110139131A (en) * 2018-02-09 2019-08-16 网宿科技股份有限公司 A kind of method and terminal of playing video file
CN108616593A (en) * 2018-05-03 2018-10-02 湖南东方华龙信息科技有限公司 Method by the way that storage of linked list high in the clouds certificate can be traced
CN112042150B (en) * 2018-05-08 2024-02-23 三菱电机株式会社 Registration device, server device, concealment search system, concealment search method, and computer-readable recording medium
US11831769B2 (en) * 2018-05-08 2023-11-28 Mitsubishi Electric Corporation Registration device, server device, searchable encryption system, and searchable encryption method
CN112042150A (en) * 2018-05-08 2020-12-04 三菱电机株式会社 Registration device, server device, confidential search system, confidential search method, registration program, and server program
US20200412536A1 (en) * 2018-05-08 2020-12-31 Mitsubishi Electric Corporation Registration device, server device, searchable encryption system, and searchable encryption method
JP6599066B1 (en) * 2018-05-08 2019-10-30 三菱電機株式会社 Registration device, server device, secret search system, secret search method, registration program, and server program
WO2019215818A1 (en) * 2018-05-08 2019-11-14 三菱電機株式会社 Registration device, server device, secret search system, secret search method, registration program, and server program
CN109120399A (en) * 2018-08-10 2019-01-01 广东工业大学 A kind of data ciphering method based on asymmetric encryption, decryption method and system
CN109492410A (en) * 2018-10-09 2019-03-19 华南农业大学 Data can search for encryption and keyword search methodology, system and terminal, equipment
CN109492410B (en) * 2018-10-09 2020-09-01 华南农业大学 Data searchable encryption and keyword search method, system, terminal and equipment
CN109547413B (en) * 2018-10-23 2021-04-27 莆田学院 Access control method of convertible data cloud storage with data source authentication
CN109547413A (en) * 2018-10-23 2019-03-29 莆田学院 The access control method of convertible data cloud storage with data source authentication
CN109299217A (en) * 2018-11-02 2019-02-01 符安文 A kind of secure storage and search method based on block chain
CN109274504A (en) * 2018-11-20 2019-01-25 桂林电子科技大学 A kind of multi-user's big data storage sharing method and system based on cloud platform
CN109274504B (en) * 2018-11-20 2021-07-13 桂林电子科技大学 Multi-user big data storage sharing method and system based on cloud platform
CN109543434A (en) * 2018-11-28 2019-03-29 深圳市墨者安全科技有限公司 Block chain information encryption method, decryption method, storage method and device
CN110166466B (en) * 2019-05-28 2020-02-21 湖南大学 Multi-user searchable encryption method and system capable of efficiently updating permissions
CN110166466A (en) * 2019-05-28 2019-08-23 湖南大学 It is a kind of efficiently the multi-user of renewal authority to can search for encryption method and system
CN110691078A (en) * 2019-09-25 2020-01-14 东北大学 Block chain-based data dynamic reliability verification method
CN110691078B (en) * 2019-09-25 2021-07-13 东北大学 Block chain-based data dynamic reliability verification method
CN110851848B (en) * 2019-11-12 2022-03-25 广西师范大学 Privacy protection method for symmetric searchable encryption
CN110851848A (en) * 2019-11-12 2020-02-28 广西师范大学 Privacy protection method for symmetric searchable encryption
CN111404895A (en) * 2020-03-06 2020-07-10 湖南智慧政务区块链科技有限公司 Method, equipment and storage medium for distributing and recovering readable permission of shared data
US11645424B2 (en) 2020-04-27 2023-05-09 International Business Machines Corporation Integrity verification in cloud key-value stores
US11770250B2 (en) 2021-02-10 2023-09-26 Huazhong University Of Science And Technology Method and system for ensuring search completeness of searchable public key encryption
CN113037743A (en) * 2021-03-05 2021-06-25 杭州奕锐电子有限公司 Encryption method and system for cloud server file
CN113127536A (en) * 2021-04-14 2021-07-16 上海同态信息科技有限责任公司 Offline fuzzy matching framework based on homomorphic configuration encryption
CN113127536B (en) * 2021-04-14 2023-07-28 上海同态信息科技有限责任公司 Offline fuzzy matching system based on homomorphic encryption
CN114520747A (en) * 2022-04-21 2022-05-20 山东省计算中心(国家超级计算济南中心) Data security sharing system and method taking data as center
CN115225364A (en) * 2022-07-15 2022-10-21 中国科学技术大学 High-efficiency dynamic access control method and system for cloud-oriented encrypted data
CN115225364B (en) * 2022-07-15 2023-11-17 中国科学技术大学 Efficient dynamic access control method and system for cloud encrypted data

Also Published As

Publication number Publication date
CN104394155B (en) 2017-12-12

Similar Documents

Publication Publication Date Title
CN104394155A (en) Multi-user cloud encryption keyboard searching method capable of verifying integrity and completeness
CN106127075B (en) Encryption method can search for based on secret protection under a kind of cloud storage environment
Yang et al. Multi-user private keyword search for cloud computing
EP3375129B1 (en) Method for re-keying an encrypted data file
CN104978239B (en) A kind of method, apparatus and system realizing more Backup Data dynamics and updating
CN106330865A (en) Property base keyword searching method supporting efficient revocation in cloud environment
CN103731432A (en) Multi-user supported searchable encryption system and method
CN103607405A (en) Ciphertext search authentication method oriented towards cloud storage
CN102685148A (en) Method for realizing secure network backup system under cloud storage environment
CN103095733A (en) Keyword cipher text retrieval method for cloud storage
CN105007284B (en) With the public audit method of secret protection in multi-manager group shared data
CN106850228A (en) A kind of foundation of portable intelligent password management system and operating method
CN111625852B (en) Electronic signature method based on document and user private key under hybrid cloud architecture
CN104967693A (en) Document similarity calculation method facing cloud storage based on fully homomorphic password technology
US9037846B2 (en) Encoded database management system, client and server, natural joining method and program
CN108632385B (en) Time sequence-based cloud storage privacy protection method for multi-branch tree data index structure
CN104993931A (en) Multi-user encrypted search method in cloud storage
CN108123934A (en) A kind of data integrity verifying method towards mobile terminal
CN112532650A (en) Block chain-based multi-backup safe deletion method and system
CN107094075A (en) A kind of data block dynamic operation method based on convergent encryption
Sun et al. A fine‐grained and traceable multidomain secure data‐sharing model for intelligent terminals in edge‐cloud collaboration scenarios
CN104901968A (en) Method for managing and distributing secret keys in secure cloud storage system
Parameswarath et al. User-empowered privacy-preserving authentication protocol for electric vehicle charging based on decentralized identity and verifiable credential
CN114679340B (en) File sharing method, system, device and readable storage medium
CN114531680B (en) Light-weight IBC bidirectional identity authentication system and method based on quantum key

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20201221

Address after: 510632 No. 601, Whampoa Avenue, Tianhe District, Guangdong, Guangzhou

Patentee after: Guangzhou Jinan University Science Park Management Co.,Ltd.

Address before: 510632 No. 601, Whampoa Avenue, Guangzhou, Guangdong

Patentee before: Jinan University

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210107

Address after: 510000 Room 501, 37 Huajing Road, Tianhe District, Guangzhou City, Guangdong Province

Patentee after: Guangzhou Ruima Information Technology Co.,Ltd.

Patentee after: Guangzhou Jinan University Science Park Management Co.,Ltd.

Address before: 510632 No. 601, Whampoa Avenue, Tianhe District, Guangdong, Guangzhou

Patentee before: Guangzhou Jinan University Science Park Management Co.,Ltd.

TR01 Transfer of patent right