CN104993931B - The encryption searching method of multi-user in a kind of cloud storage - Google Patents

The encryption searching method of multi-user in a kind of cloud storage Download PDF

Info

Publication number
CN104993931B
CN104993931B CN201510305932.1A CN201510305932A CN104993931B CN 104993931 B CN104993931 B CN 104993931B CN 201510305932 A CN201510305932 A CN 201510305932A CN 104993931 B CN104993931 B CN 104993931B
Authority
CN
China
Prior art keywords
user
data
private clound
credible
search
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510305932.1A
Other languages
Chinese (zh)
Other versions
CN104993931A (en
Inventor
万长胜
潘浩
黄杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Original Assignee
Southeast University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University filed Critical Southeast University
Priority to CN201510305932.1A priority Critical patent/CN104993931B/en
Publication of CN104993931A publication Critical patent/CN104993931A/en
Application granted granted Critical
Publication of CN104993931B publication Critical patent/CN104993931B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention discloses the encryption searching method of multi-user in cloud storage a kind of:Initial phase is realized and secret key material is distributed to one group of authorized user from credible private clound;Data upload the stage, and phase data owner user is encrypted data and keyword by using Encryption Algorithm, and encrypted data are dealt into credible private clound.Credible private clound will be in data packet storage to public cloud after secondary encryption is carried out to it;Data search stage, data send searching request, generation trapdoor inquiry using user.After credible private clound receives trapdoor, first check for the legitimacy that user searches for identity, by it is rear using matching algorithm to search for encryption data in public cloud.After searching for successfully, matched search data to be decrypted are returned to credible private clound.Credible private clound is decrypted to returning to data consumer user after the pre- decryption processing of data progress.The present invention ensures that user can not only upload the data of oneself, can also search for the data of other users upload.

Description

The encryption searching method of multi-user in a kind of cloud storage
Technical field
The present invention relates to the encryption searching methods of multi-user in cloud storage a kind of, belong to cloud computing security technology area.
Background technology
From online mailing system email, to the online album-service of Facebook, more and more cloud storage is going into general Lead to public life.With the continuous development of cloud computing technology, cloud storage is widely used in service, subtracts such as backup or outer bag data Few operation cost, such as Amazon Storage Service, Baidu's cloud.However, these remote servers cannot be trusted completely, Because administrator or hacker, which may access server completely with root authority, can simultaneously operate clear data.Therefore, it is Safely sensitive data is stored on incredible server, which must be encrypted, this pass through hide it is all about Clear data information reduces safety and privacy risk.Although the safety of data and complete can be ensured by storing encrypted data Whole property, but reduce the availability of data:Encrypted data can not support the function of search.
One simplest solution is:All data in cloud storage are downloaded, is decrypted locally, then searches for institute The clear data of expected result.For most of applications, this method will be unpractical.In order to solve to be stored in cloud In data security and functionality and search high efficiency between contradiction, it is proposed that " can search for encryption technology " this scheme. Another method allows server ciphertext data, operates in inquiry server end, and only send its result and return to user.This allows Server study clear data is queried, so that encrypted so useful.On the contrary, it is to need to support in server end The function of search of maximum possible, but ciphertext data is not understood, and therefore, the smallest possible with data confidentiality is lost.Here it is So-called search encryption (SE).
The single user that early stage proposes can search for encryption and be only applicable to the data that user search oneself is stored on cloud, search behaviour Make to be completed by a user.With the development of cloud computing, there is an urgent need to realize that multi-user shares for cloud storage data.When multi-purpose Under family encryption search environment, if using the method for sharing secret key, if some user has cancelled search permission, but due to Decryption secret key is distributed to revocation user, once revocation user reveals the decryption secret key, whole system can be caused serious It destroys.Therefore, the management of secret key will become a stubborn problem.
Invention content
Goal of the invention:In order to overcome the deficiencies in the prior art, the present invention provides multi-user in a kind of cloud storage Searching method is encrypted, access control is capable of providing and encryption is searched for, meet and be stored in public cloud (pulic cloud Server, PCS) on encryption data function of search, and realize the dynamic management of user group, sharing secret key than multi-user adds Close method is more efficient.
Technical solution:To achieve the above object, the technical solution adopted by the present invention is:
1st, in a kind of cloud storage multi-user encryption searching method, it is characterised in that:Including such as next stage:
1) initial phase:Private clound credible first carries out initialization generation secret key material, and credible private clound is by secret key material Material is divided into private key and public key;Credible private clound exports user's secret key and calculates its user at random assists secret key;Specially:It is false If TPC creates a q rank cyclic groups G according to generator g;H is the hash function of a safety, and f is a pseudo-random function fs (), s are its fsThe secret key of (), h=gR, wherein R ∈It is defined as the set of { 0,1 ... q-1 };Random selection onePrivate key SK=(a, x, s), by private key SK=(a, x, s) keep it is privately owned, while by public key PK=(G, g, q, H,f,h,gaha) open;Calculate a1*a2=a (modq), can obtain a1And a2, it is random to calculate onexc1=x- xu1, then TPC is by user's secret key (xu1,s,a1) user is sent to, while store user and assist secret key (u, xc1,a2) hair is can Believe in private clound;
2) data upload the stage:User uploads the outsourcing after encryption and stores data into public cloud, specially: User carries out first time encryption using EIGamal Encryption Algorithm to the keyword for needing to store data and data beyond the clouds; Then user by it is described carry out for the first time it is encrypted after data and keyword be sent to credible private clound;The credible private clound First to user carry out authenticating user identification, user authentication by the rear credible private clound to carried out for the first time it is encrypted after Data and the keywords of data carry out secondary encryption;Then credible private clound by the data after secondary encryption with And the keyword of data is uploaded in public cloud;
3) the data search stage:User generates searching request, when the credible private clound receives the data of user's transmission After the searching request of keyword, the search permission of credible private clound certification user first, if certification success, calculates user Search secret key M1=(gh)-rWith the search secret key M of credible private clound2=(gaha)r;Then user is secret by the search of user Key M1And the user's secret key received in the initial phase calculates the search trapdoor of the keyword of search data:Wherein:σw′=fs(w′);
Then the search trapdoor of the keyword of the data is sent in the credible private clound by user;Credible private clound After receiving search trapdoor Tu (w '), the user stored in private clound credible in initial phase is assisted secret key by credible private clound (u,xc1,a2) it is sent to the user of search;User assists secret key to recalculate data search trapdoor according to the user received:Then Query Value H=(T × M of credible privately owned cloud computing search trapdoor2) and by the Query Value H=(T ×M2) be sent in public cloud, it is inquired by secondary encrypted data described using matching algorithm in public cloud;Such as Identical with the Query Value of described search trapdoor in data present in public cloud described in fruit, then the public cloud is by related data It is sent to the credible private clound;The credible private clound receive public cloud transmission related data after first to related data into The pre- decryption processing of row, then credible private clound the data after pre- decryption are returned to the use of the transmission keyword search request again Family, user are decrypted using personal secret key, finally obtain the data for thinking inquiry.
Advantageous effect:The encryption searching method of multi-user in a kind of cloud storage provided by the invention:
The present invention proposes Multi-user search encryption method, introduces credible private clound (a trusted private Cloud, TPC) realize secret key management.This method is capable of providing access control and encryption is searched for, and meets and is stored in public cloud The function of search of encryption data on (pulic cloud server, PCS), and the dynamic management of user group is realized, than more User shares the more efficient effect of the encrypted method of secret key.The present invention carries out secret key management and user management using credible private clound, Protect the Information Security of cloud storage.The present invention uses credible privately owned cloud management secret key material, and public cloud can not be asked according to search It asks and obtains user's secret key, so the present invention meets the required Information Security requirement of encryption search, by broadcasting multi-user It searches for encipherment scheme and encrypts search plan algorithm comparison with credible private clound, the present invention has the characteristics that more efficient.
Description of the drawings
The network model that it is invention that Fig. 1, which is,;
Fig. 2 is the definition graph that data upload the stage;
Fig. 3 is the key step in data search stage;
Fig. 4 is starting stage definition graph;
Fig. 5 uploads stage key step for data.
Specific embodiment
The present invention is further described below in conjunction with the accompanying drawings.
The present invention proposes Multi-user search encryption method, introduces credible private clound (a trusted private Cloud, TPC) realize secret key management.This method is capable of providing access control and encryption is searched for, and meets and is stored in public cloud The function of search of encryption data on (pulic cloud server, PCS), and the dynamic management of user group is realized, than more User shares the more efficient effect of the encrypted method of secret key.
The main thought of this method is that encryption search is divided into three steps.The first step, initial phase, by credible privately owned Cloud TPC completes the generation and distribution of secret key material.Second step, data owner, that is, user and TPC complete data and data are closed Encrypted data and its keyword are sent on public cloud PCS by the encryption of keyword, user.Specially user by using The secret key material logarithm of initial phase TPC distributions is according to this and its keyword carries out first time encryption, and the number after encryption According to this and its keyword is sent to TPC;PCS is arrived in storage after TPC carries out encryption data secondary encryption.Third walks, and TPC is received The searching request that user sends, PCS return to encryption data, and the encryption data that TPC receives PCS returns is first decrypted in advance, finally User is decrypted to obtain data using the personal secret key of oneself, completes the data search stage.Specially:User first generates search The trapdoor request of keyword, is sent to TPC.After TPC receives searching request, first check the user of search whether in authorized user's group In, i.e., authentication is carried out to user;Then authorized user's search trapdoor value is calculated to be sent on PCS.PCS is on storage cloud Data item carries out matching search, and returns to corresponding data to be decrypted to TPC.TPC solves the data that public cloud returns in advance Request user is returned after close processing.User is decrypted to obtain oneself desired clear data with the secret key material of oneself.Invention Network model it is as shown in Figure 1.
The major architectural of the present invention is as follows:The generation and distribution of secret key material, data upload and the design of data search.Packet The entity contained has credible private clound, public cloud and user (including data owner and data consumer).Comprising algorithm have it is secret Key generating algorithm, data ciphering and deciphering algorithm and data searching algorithm.This method using credible private clound carry out secret key management and User management protects the Information Security of cloud storage.
Invention defines three kinds of entities as shown in Figure 1:Credible private clound, public cloud and user.The stage being related to includes Initial phase, data upload stage and data search phase.
The embodiment of the present invention includes three parts content, is specifically described below:
1) initial phase:Private clound credible first carries out initialization generation secret key material, and credible private clound is by secret key material Material is divided into private key and public key;Credible private clound exports user's secret key and calculates its user at random assists secret key, then credible User's secret key is sent to user by private clound, while user is stored in credible private clound and assists secret key;
Initial phase mainly completes the generation of secret key material, and private key is kept privately owned, public key is disclosed, for two below A stage prepares.
2) data upload the stage:User uploads the outsourcing after encryption and stores data into public cloud, and outsourcing is deposited Store up data such as to need to upload the document stored.Specially:User is using EIGamal Encryption Algorithm to needing to be stored in cloud The data at end and the keyword of data carry out first time encryption;Then data of the user by the progress after encrypted for the first time Credible private clound is sent to keyword;The credible private clound carries out authenticating user identification to user first, and authentication is ID based on user;User authentication by the rear credible private clound to carried out for the first time it is encrypted after data and data Keyword carry out secondary encryption;Then credible private clound is by the data and the keyword of data after secondary encryption It uploads in public cloud;
3) the data search stage:User is secret by the user that the credible private clound received in initial phase is distributed Key calculates the search trapdoor of the keyword of search data:Wherein:M1=(gh)-rFor data search The search secret key of phase user, σw′=fs(w '), TPC create a q rank cyclic groups G according to generator g;H is a safety Hash function, f are a pseudo-random function fs(), s are its fsThe secret key of (), h=gR, whereinBe defined as 0, 1 ... q-1 } set;Random selection onePrivate key SK=(a, x, s) protects private key SK=(a, x, s) Hold it is privately owned, while by public key PK=(G, g, q, H, f, h, gaha) open;Calculate a1*a2=a (modq), can obtain a1And a2, It is random to calculate onexc1=x-xu1, then TPC is by user's secret key (xu1,s,a1) user is sent to, it stores simultaneously User assists secret key (u, xc1,a2) send out in credible private clound;
Then the search trapdoor of the keyword of the data is sent in the credible private clound by user;When described credible After private clound receives the searching request of the keyword of the data of user's transmission, the search of credible private clound certification user first Permission if certification success, calculates the search secret key M of credible private clound2=(gaha)r;Wherein
Credible private clound receives M2Afterwards, credible private clound is auxiliary by the user stored in private clound credible in initial phase Secret key is helped to be sent to the user of search;User assists secret key to calculate data search trapdoor according to the user received:
Then Query Value H=(T × M of credible privately owned cloud computing search trapdoor2) and by the Query Value H=(T × M2) hair It is sent in public cloud, is inquired by secondary encrypted data described using matching algorithm in public cloud;It is if described Identical with the Query Value of described search trapdoor in data present in public cloud, then related data is sent to institute by the public cloud State credible private clound;The credible private clound first decrypts related data after receiving the related data of public cloud transmission in advance Processing, encrypted data are carried out user after decrypting in advance by pre- decryption processing can be decrypted using oneself secret key, not decrypted in advance Step user can not decrypt.Then the data after pre- decryption are returned to the transmission keyword search request by credible private clound again User, user decrypted using personal secret key, finally obtains the data for thinking inquiry.
The dynamic management of user is not only realized by using credible private clound, while also avoids public cloud and participates in encryption Process reduces the risk of leaking data.
For ease of the understanding to the embodiment of the present invention, the embodiment of the present invention will be illustrated below.
Embodiment one
Secret key initialization generation and distribution are completed in the present embodiment design.Secret key distribution purpose be:User possesses respective Secret key material, the secret key of credible private cloud storage oneself and the auxiliary secret key of user.It is represented using table:
Step Content
100 TPC carries out initialization generation secret key material
102 TPC discloses public key, and corresponding secret key remains privately owned
104 TPC calculates user's secret key and user assists secret key
106 User's secret key is sent to user by TPC, while is stored user and assisted secret key
Step in embodiment one is described as follows:
Step 100:TPC initialization generation secret key materials.TPC creates a q rank cyclic groups G according to generator g;H is one A safe hash function, f are a pseudo-random function fs(), s are its fsThe secret key of (), h=gR, wherein It is fixed Justice is the set of { 0,1 ... q-1 };
Step 102:Random selection onePrivate key SK=(a, x, s) protects private key SK=(a, x, s) Hold it is privately owned, while by public key PK=(G, g, q, H, f, h, gaha) open;
Above step may be summarized to be system initialization, export public key and private key.
Step 104:TPC is that the first user u ∈ U, U gathers for multi-user, random to calculate onexc1=x- xu1, random value a in step 102 is resolved into a1And a2, that is, calculate a1*a2=a (modq) can obtain an a1With an a2。 Calculate a1*a2=a (modq), can obtain a1And a2, then TPC is by user's secret key (xu1,s,a1) user is sent to, it deposits simultaneously It stores up user and assists secret key (u, xc1,a2) send out in credible private clound;
Step 106:TPC is by (xu1,s,a1) the first user u is sent to as private key for user, while stores (u, xc1,a2) hair As the auxiliary secret key of user in credible private clound, convenient for being stored in a table (UClist), in the future encryption, solution Close and inquiry.
Step 104 and 106 may be summarized to be as user's distribution secret key material, completion initial phase.Above step is secret The realization of key generating algorithm.
Embodiment two
The present embodiment design completes data and uploads the stage.The purpose in the stage is:User is needed the data uploaded and pass Keyword is stored in after being encrypted in public cloud.Data encryption upload is divided into user encryption and TPC encryptions upload.Including but It is not limited to following steps (being represented using table):
Step Content
108 User U is firstly the need of the keyword of encryption data and data
110 The keyword of encrypted data and data is sent to TPC processing by user
112 For user through TPC certifications after, TPC carries out encryption again
114 Encrypted data are uploaded public cloud by TPC
The flow that data upload the stage is illustrated in fig. 2 shown below.
Step in embodiment two is described as follows:
Step 108:The data d and the keyword of data d that needs upload is encrypted in first user u.
Step 110:First user u by encrypted data item d '={ E (d), I (d.w) } be sent to credible private clound into Row is handled in next step.
Above step is data encryption algorithm process.
Step 114:TPC have carried out encrypted data item d '={ E (d), u twice1, I ' (d.w) } and it uploads to store and arrive In public cloud.
Above step is summarised as data upload process.Step 108 and 110 is summarised as user's pre-encrypt stage.Step 112 and 114 be that encryption data uploads the stage to TPC again.
Embodiment three
The data search stage is completed in the present embodiment design.The purpose in the stage is:User proposes searching request, TPC to TPC Searching request is handled, and the trapdoor Query Value of search is sent in public cloud and is scanned for, last TPC returns to user Interested data.Including but not limited to following steps (being represented using table):
Step Content
116 User proposes searching request to TPC, then distributes search material after TPC certification users
118 User generates search trapdoor, is sent to TPC
120 TPC takes out the auxiliary secret key of user, calculates trapdoor Query Value
122 Trapdoor Query Value with data item in public cloud is matched, returns to the data matched to TPC
124 TPC is sent to second user u after handling first the data retrieved2
126 User passes through secret key material ciphertext data
The figure that illustrates in data search stage is illustrated in fig. 3 shown below.
Step in embodiment three is described as follows:
Step 116:Second user u2Searching request, the first certification second user u of TPC are proposed to TPC2, certification is by rear, meter Calculate M1=(gh)-r, M2=(gaha)r, M1,M2Respectively as the search secret key of data search phase user and searching for credible private clound Rope secret key.TPC is by M1It is distributed to second user u2, M2It is stored in credible private clound.
Step 118:Second user u2Receive M1Later, it calculatesWherein σw′ =fs(w′).Tu (w ') is sent to TPC.
Step 122:And by H=(T × M2) result of calculation upload public cloud, with public cloud on each data item carry out It compares, if there is Data Matching is arrived in comparison, then proves its data needed for user, and using returned data (d '={ E (d),u1, I ' (d.w) }) return to TPC.
Step 124:TPC first determines whether data (d '={ E (d), the u returned1, I ' (d.w) }) the owner whether be One user u and the user of inquiry are second user u2If meeting above-mentioned condition, it is calculatedThe auxiliary secret key that wherein ψ is decrypted in advance for TPC, xc1For the auxiliary secret key of the first user u,For second user u2Auxiliary secret key.According in data itemIt calculates It is complete Into the pre- decrypting processes of TPC, whereinRepresent second user u2User's secret key.Finally by the data item after pre- decryptionReturn to second user u2
Step 126:Second user u2Pass through calculatingObtain ciphertext data.
Above entire step summary is data retrieval process, is the realization process of data search algorithm.Wherein, step 116 With 118 summarize be generated for user inquiry the trapdoor stage, step 120 and 122 for TPC public cloud search for data, step 124 and 126 be the TPC pre- ciphertext datas returned and user's ciphertext data stage, while step 124 and 126 is also data deciphering algorithm Realization process.
The above is only the preferred embodiment of the present invention, it should be pointed out that:For the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications also should It is considered as protection scope of the present invention.

Claims (1)

1. a kind of encryption searching method of multi-user in cloud storage, it is characterised in that:Including such as next stage:
1) initial phase:Private clound credible first carries out initialization generation secret key material, and credible private clound divides secret key material For private key and public key;Credible private clound exports user's secret key and calculates its user at random assists secret key;Specially:It assuming that can Believe that private clound creates a q rank cyclic groups G according to generator g;H is the hash function of a safety, and f is a pseudo-random function fs(), s are its fsThe secret key of (), h=gR, wherein It is defined as the set of { 0,1 ... q-1 };Random selection onePrivate key SK=(a, x, s), by private key SK=(a, x, s) keep it is privately owned, while by public key PK=(G, g, q, H,f,h,gaha) open;Calculate a1*a2=a (modq), can obtain a1And a2, it is random to calculate onexc1=x- xu1, then credible private clound TPC is by user's secret key (xu1,s,a1) user is sent to, while store user and assist secret key (u, xc1, a2) send out in credible private clound;
2) data upload the stage:User uploads the outsourcing after encryption and stores data into public cloud, specially:User First time encryption is carried out to the keyword for needing to store data and data beyond the clouds using EIGamal Encryption Algorithm;Then User by it is described carry out for the first time it is encrypted after data and keyword be sent to credible private clound;The credible private clound is first To user carry out authenticating user identification, user authentication by the rear credible private clound to carried out for the first time it is encrypted after number According to this and the keyword of data carries out secondary encryption;Then credible private clound is by the data and number after secondary encryption According to keyword upload in public cloud;
3) the data search stage:User generates searching request, when the credible private clound receives the key of the data of user's transmission After the searching request of word, the search permission of credible private clound certification user first, if certification success, calculates searching for user Rope secret key M1=(gh)-rWith the search secret key M of credible private clound2=(gaha)r, whereinThen user passes through user's Search for secret key M1And the user's secret key received in the initial phase calculates the search trapdoor of the keyword of search data:Wherein:σw′=fs(w′);W ' is the keyword for searching for data;
Then the search trapdoor of the keyword of the data is sent in the credible private clound by user;Credible private clound receives To after search trapdoor Tu (w '), credible private clound by the user stored in private clound credible in initial phase assist secret key (u, xc1,a2) it is sent to the user of search;User assists secret key to recalculate data search trapdoor according to the user received:Then Query Value H=(T × M of credible privately owned cloud computing search trapdoor2) and by the Query Value H=(T × M2) be sent in public cloud, it is inquired by secondary encrypted data described using matching algorithm in public cloud;If Identical with the Query Value of described search trapdoor in data present in the public cloud, then the public cloud sends related data To the credible private clound;The credible private clound first carries out in advance related data after receiving the related data of public cloud transmission Decryption processing, then credible private clound the data after pre- decryption are returned to the user of the transmission keyword search request again, User is decrypted using personal secret key, finally obtains the data for thinking inquiry.
CN201510305932.1A 2015-06-05 2015-06-05 The encryption searching method of multi-user in a kind of cloud storage Active CN104993931B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510305932.1A CN104993931B (en) 2015-06-05 2015-06-05 The encryption searching method of multi-user in a kind of cloud storage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510305932.1A CN104993931B (en) 2015-06-05 2015-06-05 The encryption searching method of multi-user in a kind of cloud storage

Publications (2)

Publication Number Publication Date
CN104993931A CN104993931A (en) 2015-10-21
CN104993931B true CN104993931B (en) 2018-06-15

Family

ID=54305688

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510305932.1A Active CN104993931B (en) 2015-06-05 2015-06-05 The encryption searching method of multi-user in a kind of cloud storage

Country Status (1)

Country Link
CN (1) CN104993931B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105429994B (en) * 2015-12-10 2018-08-28 黄信开 A kind of smart mobile phone time slot scrambling based on distributed cloud storage
CN106407822B (en) * 2016-09-14 2019-06-18 华南理工大学 A kind of keyword, multi-key word can search for encryption method and system
CN106803784B (en) * 2017-03-30 2020-11-27 福州大学 Lattice-based multi-user fuzzy searchable encryption method in secure multimedia cloud storage
CN110059055B (en) * 2019-03-28 2022-04-29 深圳紫晶存储科技有限公司 File storage and reading method and device based on distributed private cloud
CN110336837B (en) * 2019-08-06 2020-10-09 福州大学 Practical cloud privacy protection outsourcing computing system and computing method thereof
CN111556495B (en) * 2020-03-19 2022-04-05 西安电子科技大学 Multi-user searchable encryption method and encryption system in Internet of vehicles environment
CN112257096B (en) * 2020-11-23 2022-09-27 中电万维信息技术有限责任公司 Searching method for cloud storage ciphertext encrypted data
CN112636902B (en) * 2020-12-28 2023-05-09 杭州趣链科技有限公司 Encrypted mail filtering method based on discrete logarithm
CN114372251B (en) * 2021-12-01 2023-07-07 深圳市银之杰科技股份有限公司 Credit data security and privacy protection method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103095733A (en) * 2013-03-04 2013-05-08 淮阴工学院 Keyword cipher text retrieval method for cloud storage
CN103281377A (en) * 2013-05-31 2013-09-04 北京鹏宇成软件技术有限公司 Cryptograph data storage and searching method for cloud
CN103607278A (en) * 2013-11-08 2014-02-26 江苏科技大学 Safe data cloud storage method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103095733A (en) * 2013-03-04 2013-05-08 淮阴工学院 Keyword cipher text retrieval method for cloud storage
CN103281377A (en) * 2013-05-31 2013-09-04 北京鹏宇成软件技术有限公司 Cryptograph data storage and searching method for cloud
CN103607278A (en) * 2013-11-08 2014-02-26 江苏科技大学 Safe data cloud storage method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
私有云安全存储技术的研究与实现;钱进进;《中国优秀硕士学位论文全文数据库》;20131015;全文 *

Also Published As

Publication number Publication date
CN104993931A (en) 2015-10-21

Similar Documents

Publication Publication Date Title
CN104993931B (en) The encryption searching method of multi-user in a kind of cloud storage
CN111835500B (en) Searchable encryption data secure sharing method based on homomorphic encryption and block chain
CN103731432B (en) Multi-user supported searchable encryption method
CN108494768B (en) Ciphertext searching method and system supporting access control
CN108418681B (en) Attribute-based ciphertext retrieval system and method supporting proxy re-encryption
CN104021157B (en) Keyword in cloud storage based on Bilinear map can search for encryption method
CN108768951B (en) Data encryption and retrieval method for protecting file privacy in cloud environment
CN108881195A (en) Data safety sharing method and device based on cloud environment
CN104158827B (en) Ciphertext data sharing method, device, inquiry server and upload data client
CN105323061B (en) It is a kind of can keyword search outsourcing key generate and decryption attribute based system and decryption method
CN107222483A (en) A kind of method of the electronic document network memory management of many access levels
CN105024802B (en) Multi-user's multi-key word based on Bilinear map can search for encryption method in cloud storage
CN103780607B (en) The method of the data de-duplication based on different rights
CN105320896A (en) Cloud storage encryption and ciphertext retrieval methods and systems
CN108632385B (en) Time sequence-based cloud storage privacy protection method for multi-branch tree data index structure
CN107547530A (en) On-line/off-line keyword search methodology and its cloud computing application system based on attribute under mobile cloud environment
CN107528848B (en) Sensitive data secure sharing and self-destruction method of cloud storage system
CN106326666A (en) Health record information management service system
CN105721146A (en) Big data sharing method for cloud storage based on SMC
CN114640458A (en) Fine-grained multi-user secure searchable encryption method in cloud-edge collaborative environment
CN116611083A (en) Medical data sharing method and system
Roy et al. A Hybrid Security Framework to Preserve Multilevel Security on Public Cloud Networks
Yan et al. Secure and efficient big data deduplication in fog computing
CN116663046A (en) Private data sharing and retrieving method, system and equipment based on blockchain
WO2019178792A1 (en) Ciphertext search method and system supporting access control

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant