CN104993931B - The encryption searching method of multi-user in a kind of cloud storage - Google Patents
The encryption searching method of multi-user in a kind of cloud storage Download PDFInfo
- Publication number
- CN104993931B CN104993931B CN201510305932.1A CN201510305932A CN104993931B CN 104993931 B CN104993931 B CN 104993931B CN 201510305932 A CN201510305932 A CN 201510305932A CN 104993931 B CN104993931 B CN 104993931B
- Authority
- CN
- China
- Prior art keywords
- user
- data
- private clound
- credible
- search
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The present invention discloses the encryption searching method of multi-user in cloud storage a kind of:Initial phase is realized and secret key material is distributed to one group of authorized user from credible private clound;Data upload the stage, and phase data owner user is encrypted data and keyword by using Encryption Algorithm, and encrypted data are dealt into credible private clound.Credible private clound will be in data packet storage to public cloud after secondary encryption is carried out to it;Data search stage, data send searching request, generation trapdoor inquiry using user.After credible private clound receives trapdoor, first check for the legitimacy that user searches for identity, by it is rear using matching algorithm to search for encryption data in public cloud.After searching for successfully, matched search data to be decrypted are returned to credible private clound.Credible private clound is decrypted to returning to data consumer user after the pre- decryption processing of data progress.The present invention ensures that user can not only upload the data of oneself, can also search for the data of other users upload.
Description
Technical field
The present invention relates to the encryption searching methods of multi-user in cloud storage a kind of, belong to cloud computing security technology area.
Background technology
From online mailing system email, to the online album-service of Facebook, more and more cloud storage is going into general
Lead to public life.With the continuous development of cloud computing technology, cloud storage is widely used in service, subtracts such as backup or outer bag data
Few operation cost, such as Amazon Storage Service, Baidu's cloud.However, these remote servers cannot be trusted completely,
Because administrator or hacker, which may access server completely with root authority, can simultaneously operate clear data.Therefore, it is
Safely sensitive data is stored on incredible server, which must be encrypted, this pass through hide it is all about
Clear data information reduces safety and privacy risk.Although the safety of data and complete can be ensured by storing encrypted data
Whole property, but reduce the availability of data:Encrypted data can not support the function of search.
One simplest solution is:All data in cloud storage are downloaded, is decrypted locally, then searches for institute
The clear data of expected result.For most of applications, this method will be unpractical.In order to solve to be stored in cloud
In data security and functionality and search high efficiency between contradiction, it is proposed that " can search for encryption technology " this scheme.
Another method allows server ciphertext data, operates in inquiry server end, and only send its result and return to user.This allows
Server study clear data is queried, so that encrypted so useful.On the contrary, it is to need to support in server end
The function of search of maximum possible, but ciphertext data is not understood, and therefore, the smallest possible with data confidentiality is lost.Here it is
So-called search encryption (SE).
The single user that early stage proposes can search for encryption and be only applicable to the data that user search oneself is stored on cloud, search behaviour
Make to be completed by a user.With the development of cloud computing, there is an urgent need to realize that multi-user shares for cloud storage data.When multi-purpose
Under family encryption search environment, if using the method for sharing secret key, if some user has cancelled search permission, but due to
Decryption secret key is distributed to revocation user, once revocation user reveals the decryption secret key, whole system can be caused serious
It destroys.Therefore, the management of secret key will become a stubborn problem.
Invention content
Goal of the invention:In order to overcome the deficiencies in the prior art, the present invention provides multi-user in a kind of cloud storage
Searching method is encrypted, access control is capable of providing and encryption is searched for, meet and be stored in public cloud (pulic cloud
Server, PCS) on encryption data function of search, and realize the dynamic management of user group, sharing secret key than multi-user adds
Close method is more efficient.
Technical solution:To achieve the above object, the technical solution adopted by the present invention is:
1st, in a kind of cloud storage multi-user encryption searching method, it is characterised in that:Including such as next stage:
1) initial phase:Private clound credible first carries out initialization generation secret key material, and credible private clound is by secret key material
Material is divided into private key and public key;Credible private clound exports user's secret key and calculates its user at random assists secret key;Specially:It is false
If TPC creates a q rank cyclic groups G according to generator g;H is the hash function of a safety, and f is a pseudo-random function fs
(), s are its fsThe secret key of (), h=gR, wherein R ∈It is defined as the set of { 0,1 ... q-1 };Random selection onePrivate key SK=(a, x, s), by private key SK=(a, x, s) keep it is privately owned, while by public key PK=(G, g, q,
H,f,h,gaha) open;Calculate a1*a2=a (modq), can obtain a1And a2, it is random to calculate onexc1=x-
xu1, then TPC is by user's secret key (xu1,s,a1) user is sent to, while store user and assist secret key (u, xc1,a2) hair is can
Believe in private clound;
2) data upload the stage:User uploads the outsourcing after encryption and stores data into public cloud, specially:
User carries out first time encryption using EIGamal Encryption Algorithm to the keyword for needing to store data and data beyond the clouds;
Then user by it is described carry out for the first time it is encrypted after data and keyword be sent to credible private clound;The credible private clound
First to user carry out authenticating user identification, user authentication by the rear credible private clound to carried out for the first time it is encrypted after
Data and the keywords of data carry out secondary encryption;Then credible private clound by the data after secondary encryption with
And the keyword of data is uploaded in public cloud;
3) the data search stage:User generates searching request, when the credible private clound receives the data of user's transmission
After the searching request of keyword, the search permission of credible private clound certification user first, if certification success, calculates user
Search secret key M1=(gh)-rWith the search secret key M of credible private clound2=(gaha)r;Then user is secret by the search of user
Key M1And the user's secret key received in the initial phase calculates the search trapdoor of the keyword of search data:Wherein:σw′=fs(w′);
Then the search trapdoor of the keyword of the data is sent in the credible private clound by user;Credible private clound
After receiving search trapdoor Tu (w '), the user stored in private clound credible in initial phase is assisted secret key by credible private clound
(u,xc1,a2) it is sent to the user of search;User assists secret key to recalculate data search trapdoor according to the user received:Then Query Value H=(T × M of credible privately owned cloud computing search trapdoor2) and by the Query Value H=(T
×M2) be sent in public cloud, it is inquired by secondary encrypted data described using matching algorithm in public cloud;Such as
Identical with the Query Value of described search trapdoor in data present in public cloud described in fruit, then the public cloud is by related data
It is sent to the credible private clound;The credible private clound receive public cloud transmission related data after first to related data into
The pre- decryption processing of row, then credible private clound the data after pre- decryption are returned to the use of the transmission keyword search request again
Family, user are decrypted using personal secret key, finally obtain the data for thinking inquiry.
Advantageous effect:The encryption searching method of multi-user in a kind of cloud storage provided by the invention:
The present invention proposes Multi-user search encryption method, introduces credible private clound (a trusted private
Cloud, TPC) realize secret key management.This method is capable of providing access control and encryption is searched for, and meets and is stored in public cloud
The function of search of encryption data on (pulic cloud server, PCS), and the dynamic management of user group is realized, than more
User shares the more efficient effect of the encrypted method of secret key.The present invention carries out secret key management and user management using credible private clound,
Protect the Information Security of cloud storage.The present invention uses credible privately owned cloud management secret key material, and public cloud can not be asked according to search
It asks and obtains user's secret key, so the present invention meets the required Information Security requirement of encryption search, by broadcasting multi-user
It searches for encipherment scheme and encrypts search plan algorithm comparison with credible private clound, the present invention has the characteristics that more efficient.
Description of the drawings
The network model that it is invention that Fig. 1, which is,;
Fig. 2 is the definition graph that data upload the stage;
Fig. 3 is the key step in data search stage;
Fig. 4 is starting stage definition graph;
Fig. 5 uploads stage key step for data.
Specific embodiment
The present invention is further described below in conjunction with the accompanying drawings.
The present invention proposes Multi-user search encryption method, introduces credible private clound (a trusted private
Cloud, TPC) realize secret key management.This method is capable of providing access control and encryption is searched for, and meets and is stored in public cloud
The function of search of encryption data on (pulic cloud server, PCS), and the dynamic management of user group is realized, than more
User shares the more efficient effect of the encrypted method of secret key.
The main thought of this method is that encryption search is divided into three steps.The first step, initial phase, by credible privately owned
Cloud TPC completes the generation and distribution of secret key material.Second step, data owner, that is, user and TPC complete data and data are closed
Encrypted data and its keyword are sent on public cloud PCS by the encryption of keyword, user.Specially user by using
The secret key material logarithm of initial phase TPC distributions is according to this and its keyword carries out first time encryption, and the number after encryption
According to this and its keyword is sent to TPC;PCS is arrived in storage after TPC carries out encryption data secondary encryption.Third walks, and TPC is received
The searching request that user sends, PCS return to encryption data, and the encryption data that TPC receives PCS returns is first decrypted in advance, finally
User is decrypted to obtain data using the personal secret key of oneself, completes the data search stage.Specially:User first generates search
The trapdoor request of keyword, is sent to TPC.After TPC receives searching request, first check the user of search whether in authorized user's group
In, i.e., authentication is carried out to user;Then authorized user's search trapdoor value is calculated to be sent on PCS.PCS is on storage cloud
Data item carries out matching search, and returns to corresponding data to be decrypted to TPC.TPC solves the data that public cloud returns in advance
Request user is returned after close processing.User is decrypted to obtain oneself desired clear data with the secret key material of oneself.Invention
Network model it is as shown in Figure 1.
The major architectural of the present invention is as follows:The generation and distribution of secret key material, data upload and the design of data search.Packet
The entity contained has credible private clound, public cloud and user (including data owner and data consumer).Comprising algorithm have it is secret
Key generating algorithm, data ciphering and deciphering algorithm and data searching algorithm.This method using credible private clound carry out secret key management and
User management protects the Information Security of cloud storage.
Invention defines three kinds of entities as shown in Figure 1:Credible private clound, public cloud and user.The stage being related to includes
Initial phase, data upload stage and data search phase.
The embodiment of the present invention includes three parts content, is specifically described below:
1) initial phase:Private clound credible first carries out initialization generation secret key material, and credible private clound is by secret key material
Material is divided into private key and public key;Credible private clound exports user's secret key and calculates its user at random assists secret key, then credible
User's secret key is sent to user by private clound, while user is stored in credible private clound and assists secret key;
Initial phase mainly completes the generation of secret key material, and private key is kept privately owned, public key is disclosed, for two below
A stage prepares.
2) data upload the stage:User uploads the outsourcing after encryption and stores data into public cloud, and outsourcing is deposited
Store up data such as to need to upload the document stored.Specially:User is using EIGamal Encryption Algorithm to needing to be stored in cloud
The data at end and the keyword of data carry out first time encryption;Then data of the user by the progress after encrypted for the first time
Credible private clound is sent to keyword;The credible private clound carries out authenticating user identification to user first, and authentication is
ID based on user;User authentication by the rear credible private clound to carried out for the first time it is encrypted after data and data
Keyword carry out secondary encryption;Then credible private clound is by the data and the keyword of data after secondary encryption
It uploads in public cloud;
3) the data search stage:User is secret by the user that the credible private clound received in initial phase is distributed
Key calculates the search trapdoor of the keyword of search data:Wherein:M1=(gh)-rFor data search
The search secret key of phase user, σw′=fs(w '), TPC create a q rank cyclic groups G according to generator g;H is a safety
Hash function, f are a pseudo-random function fs(), s are its fsThe secret key of (), h=gR, whereinBe defined as 0,
1 ... q-1 } set;Random selection onePrivate key SK=(a, x, s) protects private key SK=(a, x, s)
Hold it is privately owned, while by public key PK=(G, g, q, H, f, h, gaha) open;Calculate a1*a2=a (modq), can obtain a1And a2,
It is random to calculate onexc1=x-xu1, then TPC is by user's secret key (xu1,s,a1) user is sent to, it stores simultaneously
User assists secret key (u, xc1,a2) send out in credible private clound;
Then the search trapdoor of the keyword of the data is sent in the credible private clound by user;When described credible
After private clound receives the searching request of the keyword of the data of user's transmission, the search of credible private clound certification user first
Permission if certification success, calculates the search secret key M of credible private clound2=(gaha)r;Wherein
Credible private clound receives M2Afterwards, credible private clound is auxiliary by the user stored in private clound credible in initial phase
Secret key is helped to be sent to the user of search;User assists secret key to calculate data search trapdoor according to the user received:
Then Query Value H=(T × M of credible privately owned cloud computing search trapdoor2) and by the Query Value H=(T × M2) hair
It is sent in public cloud, is inquired by secondary encrypted data described using matching algorithm in public cloud;It is if described
Identical with the Query Value of described search trapdoor in data present in public cloud, then related data is sent to institute by the public cloud
State credible private clound;The credible private clound first decrypts related data after receiving the related data of public cloud transmission in advance
Processing, encrypted data are carried out user after decrypting in advance by pre- decryption processing can be decrypted using oneself secret key, not decrypted in advance
Step user can not decrypt.Then the data after pre- decryption are returned to the transmission keyword search request by credible private clound again
User, user decrypted using personal secret key, finally obtains the data for thinking inquiry.
The dynamic management of user is not only realized by using credible private clound, while also avoids public cloud and participates in encryption
Process reduces the risk of leaking data.
For ease of the understanding to the embodiment of the present invention, the embodiment of the present invention will be illustrated below.
Embodiment one
Secret key initialization generation and distribution are completed in the present embodiment design.Secret key distribution purpose be:User possesses respective
Secret key material, the secret key of credible private cloud storage oneself and the auxiliary secret key of user.It is represented using table:
Step | Content |
100 | TPC carries out initialization generation secret key material |
102 | TPC discloses public key, and corresponding secret key remains privately owned |
104 | TPC calculates user's secret key and user assists secret key |
106 | User's secret key is sent to user by TPC, while is stored user and assisted secret key |
Step in embodiment one is described as follows:
Step 100:TPC initialization generation secret key materials.TPC creates a q rank cyclic groups G according to generator g;H is one
A safe hash function, f are a pseudo-random function fs(), s are its fsThe secret key of (), h=gR, wherein It is fixed
Justice is the set of { 0,1 ... q-1 };
Step 102:Random selection onePrivate key SK=(a, x, s) protects private key SK=(a, x, s)
Hold it is privately owned, while by public key PK=(G, g, q, H, f, h, gaha) open;
Above step may be summarized to be system initialization, export public key and private key.
Step 104:TPC is that the first user u ∈ U, U gathers for multi-user, random to calculate onexc1=x-
xu1, random value a in step 102 is resolved into a1And a2, that is, calculate a1*a2=a (modq) can obtain an a1With an a2。
Calculate a1*a2=a (modq), can obtain a1And a2, then TPC is by user's secret key (xu1,s,a1) user is sent to, it deposits simultaneously
It stores up user and assists secret key (u, xc1,a2) send out in credible private clound;
Step 106:TPC is by (xu1,s,a1) the first user u is sent to as private key for user, while stores (u, xc1,a2) hair
As the auxiliary secret key of user in credible private clound, convenient for being stored in a table (UClist), in the future encryption, solution
Close and inquiry.
Step 104 and 106 may be summarized to be as user's distribution secret key material, completion initial phase.Above step is secret
The realization of key generating algorithm.
Embodiment two
The present embodiment design completes data and uploads the stage.The purpose in the stage is:User is needed the data uploaded and pass
Keyword is stored in after being encrypted in public cloud.Data encryption upload is divided into user encryption and TPC encryptions upload.Including but
It is not limited to following steps (being represented using table):
Step | Content |
108 | User U is firstly the need of the keyword of encryption data and data |
110 | The keyword of encrypted data and data is sent to TPC processing by user |
112 | For user through TPC certifications after, TPC carries out encryption again |
114 | Encrypted data are uploaded public cloud by TPC |
The flow that data upload the stage is illustrated in fig. 2 shown below.
Step in embodiment two is described as follows:
Step 108:The data d and the keyword of data d that needs upload is encrypted in first user u.
Step 110:First user u by encrypted data item d '={ E (d), I (d.w) } be sent to credible private clound into
Row is handled in next step.
Above step is data encryption algorithm process.
Step 114:TPC have carried out encrypted data item d '={ E (d), u twice1, I ' (d.w) } and it uploads to store and arrive
In public cloud.
Above step is summarised as data upload process.Step 108 and 110 is summarised as user's pre-encrypt stage.Step 112 and
114 be that encryption data uploads the stage to TPC again.
Embodiment three
The data search stage is completed in the present embodiment design.The purpose in the stage is:User proposes searching request, TPC to TPC
Searching request is handled, and the trapdoor Query Value of search is sent in public cloud and is scanned for, last TPC returns to user
Interested data.Including but not limited to following steps (being represented using table):
Step | Content |
116 | User proposes searching request to TPC, then distributes search material after TPC certification users |
118 | User generates search trapdoor, is sent to TPC |
120 | TPC takes out the auxiliary secret key of user, calculates trapdoor Query Value |
122 | Trapdoor Query Value with data item in public cloud is matched, returns to the data matched to TPC |
124 | TPC is sent to second user u after handling first the data retrieved2 |
126 | User passes through secret key material ciphertext data |
The figure that illustrates in data search stage is illustrated in fig. 3 shown below.
Step in embodiment three is described as follows:
Step 116:Second user u2Searching request, the first certification second user u of TPC are proposed to TPC2, certification is by rear, meter
Calculate M1=(gh)-r, M2=(gaha)r, M1,M2Respectively as the search secret key of data search phase user and searching for credible private clound
Rope secret key.TPC is by M1It is distributed to second user u2, M2It is stored in credible private clound.
Step 118:Second user u2Receive M1Later, it calculatesWherein σw′
=fs(w′).Tu (w ') is sent to TPC.
Step 122:And by H=(T × M2) result of calculation upload public cloud, with public cloud on each data item carry out
It compares, if there is Data Matching is arrived in comparison, then proves its data needed for user, and using returned data (d '={ E
(d),u1, I ' (d.w) }) return to TPC.
Step 124:TPC first determines whether data (d '={ E (d), the u returned1, I ' (d.w) }) the owner whether be
One user u and the user of inquiry are second user u2If meeting above-mentioned condition, it is calculatedThe auxiliary secret key that wherein ψ is decrypted in advance for TPC, xc1For the auxiliary secret key of the first user u,For second user
u2Auxiliary secret key.According in data itemIt calculates It is complete
Into the pre- decrypting processes of TPC, whereinRepresent second user u2User's secret key.Finally by the data item after pre- decryptionReturn to second user u2。
Step 126:Second user u2Pass through calculatingObtain ciphertext data.
Above entire step summary is data retrieval process, is the realization process of data search algorithm.Wherein, step 116
With 118 summarize be generated for user inquiry the trapdoor stage, step 120 and 122 for TPC public cloud search for data, step 124 and
126 be the TPC pre- ciphertext datas returned and user's ciphertext data stage, while step 124 and 126 is also data deciphering algorithm
Realization process.
The above is only the preferred embodiment of the present invention, it should be pointed out that:For the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications also should
It is considered as protection scope of the present invention.
Claims (1)
1. a kind of encryption searching method of multi-user in cloud storage, it is characterised in that:Including such as next stage:
1) initial phase:Private clound credible first carries out initialization generation secret key material, and credible private clound divides secret key material
For private key and public key;Credible private clound exports user's secret key and calculates its user at random assists secret key;Specially:It assuming that can
Believe that private clound creates a q rank cyclic groups G according to generator g;H is the hash function of a safety, and f is a pseudo-random function
fs(), s are its fsThe secret key of (), h=gR, wherein It is defined as the set of { 0,1 ... q-1 };Random selection onePrivate key SK=(a, x, s), by private key SK=(a, x, s) keep it is privately owned, while by public key PK=(G, g, q,
H,f,h,gaha) open;Calculate a1*a2=a (modq), can obtain a1And a2, it is random to calculate onexc1=x-
xu1, then credible private clound TPC is by user's secret key (xu1,s,a1) user is sent to, while store user and assist secret key (u, xc1,
a2) send out in credible private clound;
2) data upload the stage:User uploads the outsourcing after encryption and stores data into public cloud, specially:User
First time encryption is carried out to the keyword for needing to store data and data beyond the clouds using EIGamal Encryption Algorithm;Then
User by it is described carry out for the first time it is encrypted after data and keyword be sent to credible private clound;The credible private clound is first
To user carry out authenticating user identification, user authentication by the rear credible private clound to carried out for the first time it is encrypted after number
According to this and the keyword of data carries out secondary encryption;Then credible private clound is by the data and number after secondary encryption
According to keyword upload in public cloud;
3) the data search stage:User generates searching request, when the credible private clound receives the key of the data of user's transmission
After the searching request of word, the search permission of credible private clound certification user first, if certification success, calculates searching for user
Rope secret key M1=(gh)-rWith the search secret key M of credible private clound2=(gaha)r, whereinThen user passes through user's
Search for secret key M1And the user's secret key received in the initial phase calculates the search trapdoor of the keyword of search data:Wherein:σw′=fs(w′);W ' is the keyword for searching for data;
Then the search trapdoor of the keyword of the data is sent in the credible private clound by user;Credible private clound receives
To after search trapdoor Tu (w '), credible private clound by the user stored in private clound credible in initial phase assist secret key (u,
xc1,a2) it is sent to the user of search;User assists secret key to recalculate data search trapdoor according to the user received:Then Query Value H=(T × M of credible privately owned cloud computing search trapdoor2) and by the Query Value H=(T ×
M2) be sent in public cloud, it is inquired by secondary encrypted data described using matching algorithm in public cloud;If
Identical with the Query Value of described search trapdoor in data present in the public cloud, then the public cloud sends related data
To the credible private clound;The credible private clound first carries out in advance related data after receiving the related data of public cloud transmission
Decryption processing, then credible private clound the data after pre- decryption are returned to the user of the transmission keyword search request again,
User is decrypted using personal secret key, finally obtains the data for thinking inquiry.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510305932.1A CN104993931B (en) | 2015-06-05 | 2015-06-05 | The encryption searching method of multi-user in a kind of cloud storage |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510305932.1A CN104993931B (en) | 2015-06-05 | 2015-06-05 | The encryption searching method of multi-user in a kind of cloud storage |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104993931A CN104993931A (en) | 2015-10-21 |
CN104993931B true CN104993931B (en) | 2018-06-15 |
Family
ID=54305688
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510305932.1A Active CN104993931B (en) | 2015-06-05 | 2015-06-05 | The encryption searching method of multi-user in a kind of cloud storage |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104993931B (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105429994B (en) * | 2015-12-10 | 2018-08-28 | 黄信开 | A kind of smart mobile phone time slot scrambling based on distributed cloud storage |
CN106407822B (en) * | 2016-09-14 | 2019-06-18 | 华南理工大学 | A kind of keyword, multi-key word can search for encryption method and system |
CN106803784B (en) * | 2017-03-30 | 2020-11-27 | 福州大学 | Lattice-based multi-user fuzzy searchable encryption method in secure multimedia cloud storage |
CN110059055B (en) * | 2019-03-28 | 2022-04-29 | 深圳紫晶存储科技有限公司 | File storage and reading method and device based on distributed private cloud |
CN110336837B (en) * | 2019-08-06 | 2020-10-09 | 福州大学 | Practical cloud privacy protection outsourcing computing system and computing method thereof |
CN111556495B (en) * | 2020-03-19 | 2022-04-05 | 西安电子科技大学 | Multi-user searchable encryption method and encryption system in Internet of vehicles environment |
CN112257096B (en) * | 2020-11-23 | 2022-09-27 | 中电万维信息技术有限责任公司 | Searching method for cloud storage ciphertext encrypted data |
CN112636902B (en) * | 2020-12-28 | 2023-05-09 | 杭州趣链科技有限公司 | Encrypted mail filtering method based on discrete logarithm |
CN114372251B (en) * | 2021-12-01 | 2023-07-07 | 深圳市银之杰科技股份有限公司 | Credit data security and privacy protection method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103095733A (en) * | 2013-03-04 | 2013-05-08 | 淮阴工学院 | Keyword cipher text retrieval method for cloud storage |
CN103281377A (en) * | 2013-05-31 | 2013-09-04 | 北京鹏宇成软件技术有限公司 | Cryptograph data storage and searching method for cloud |
CN103607278A (en) * | 2013-11-08 | 2014-02-26 | 江苏科技大学 | Safe data cloud storage method |
-
2015
- 2015-06-05 CN CN201510305932.1A patent/CN104993931B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103095733A (en) * | 2013-03-04 | 2013-05-08 | 淮阴工学院 | Keyword cipher text retrieval method for cloud storage |
CN103281377A (en) * | 2013-05-31 | 2013-09-04 | 北京鹏宇成软件技术有限公司 | Cryptograph data storage and searching method for cloud |
CN103607278A (en) * | 2013-11-08 | 2014-02-26 | 江苏科技大学 | Safe data cloud storage method |
Non-Patent Citations (1)
Title |
---|
私有云安全存储技术的研究与实现;钱进进;《中国优秀硕士学位论文全文数据库》;20131015;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN104993931A (en) | 2015-10-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104993931B (en) | The encryption searching method of multi-user in a kind of cloud storage | |
CN111835500B (en) | Searchable encryption data secure sharing method based on homomorphic encryption and block chain | |
CN103731432B (en) | Multi-user supported searchable encryption method | |
CN108494768B (en) | Ciphertext searching method and system supporting access control | |
CN108418681B (en) | Attribute-based ciphertext retrieval system and method supporting proxy re-encryption | |
CN104021157B (en) | Keyword in cloud storage based on Bilinear map can search for encryption method | |
CN108768951B (en) | Data encryption and retrieval method for protecting file privacy in cloud environment | |
CN108881195A (en) | Data safety sharing method and device based on cloud environment | |
CN104158827B (en) | Ciphertext data sharing method, device, inquiry server and upload data client | |
CN105323061B (en) | It is a kind of can keyword search outsourcing key generate and decryption attribute based system and decryption method | |
CN107222483A (en) | A kind of method of the electronic document network memory management of many access levels | |
CN105024802B (en) | Multi-user's multi-key word based on Bilinear map can search for encryption method in cloud storage | |
CN103780607B (en) | The method of the data de-duplication based on different rights | |
CN105320896A (en) | Cloud storage encryption and ciphertext retrieval methods and systems | |
CN108632385B (en) | Time sequence-based cloud storage privacy protection method for multi-branch tree data index structure | |
CN107547530A (en) | On-line/off-line keyword search methodology and its cloud computing application system based on attribute under mobile cloud environment | |
CN107528848B (en) | Sensitive data secure sharing and self-destruction method of cloud storage system | |
CN106326666A (en) | Health record information management service system | |
CN105721146A (en) | Big data sharing method for cloud storage based on SMC | |
CN114640458A (en) | Fine-grained multi-user secure searchable encryption method in cloud-edge collaborative environment | |
CN116611083A (en) | Medical data sharing method and system | |
Roy et al. | A Hybrid Security Framework to Preserve Multilevel Security on Public Cloud Networks | |
Yan et al. | Secure and efficient big data deduplication in fog computing | |
CN116663046A (en) | Private data sharing and retrieving method, system and equipment based on blockchain | |
WO2019178792A1 (en) | Ciphertext search method and system supporting access control |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |