CN108595633A - The safe retrieving method of heat transfer agent Virtual Service in Internet of Things - Google Patents

The safe retrieving method of heat transfer agent Virtual Service in Internet of Things Download PDF

Info

Publication number
CN108595633A
CN108595633A CN201810376068.8A CN201810376068A CN108595633A CN 108595633 A CN108595633 A CN 108595633A CN 201810376068 A CN201810376068 A CN 201810376068A CN 108595633 A CN108595633 A CN 108595633A
Authority
CN
China
Prior art keywords
keyword
cloud server
asterisk wildcard
fuzzy
heat transfer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810376068.8A
Other languages
Chinese (zh)
Inventor
李运发
张旻
涂逸飞
郝苗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Dianzi University
Original Assignee
Hangzhou Dianzi University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Dianzi University filed Critical Hangzhou Dianzi University
Priority to CN201810376068.8A priority Critical patent/CN108595633A/en
Publication of CN108595633A publication Critical patent/CN108595633A/en
Pending legal-status Critical Current

Links

Landscapes

  • Computer And Data Communications (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a kind of safe retrieving methods of heat transfer agent Virtual Service in Internet of Things, including:(1) the fuzzy set developing algorithm towards keyword asterisk wildcard;(2) searching algorithm based on asterisk wildcard fuzzy keyword, it is characterised in that:Sensing node is responsible for the perception of heat transfer agent, transmission in this method, it is responsible for the reception and transmission of heat transfer agent in base station, local domain manager be responsible for the reception of heat transfer agent, storage, transmission, keyword asterisk wildcard fuzzy set structure, Cloud Server is responsible for reception, storage, the certification of user and mandate, the retrieval based on asterisk wildcard fuzzy keyword, feedback of heat transfer agent etc., and user is responsible for the determination of search key w, the calculating of structure, threshold function T (w) of keyword w asterisk wildcard fuzzy sets, transmission and receives feedback result etc..

Description

The safe retrieving method of heat transfer agent Virtual Service in Internet of Things
Technical field
The invention belongs to the security application fields of heat transfer agent Virtual Service in Internet of Things, and the purpose is to the biographies in Internet of Things A kind of safe retrieving method is provided to the user during sense information Virtual Service, its is made safe and effective to be provided for users Service, it is related to the structure of the fuzzy set towards keyword asterisk wildcard and two kinds of processes of retrieval based on asterisk wildcard fuzzy keyword. For this purpose, construct a kind of fuzzy set developing algorithm towards keyword asterisk wildcard respectively and a kind of being based on asterisk wildcard fuzzy keyword Searching algorithm.
Background technology
With the fast development of technology of Internet of things, various information sensing device (Sensor Network, radio-frequency recognition system, infrared senses Answer device, laser scanning etc.) unprecedented development has also been obtained, the data information of induction increases by geometric progression.Increasingly More sensed datas needs in a secure manner into the transmission of row information, storage, exchange, to realize the intelligence of Internet of Things Identification, positioning, tracking, monitoring and management, and safe and effective service can be provided to the user.And cloud computing technology is A large amount of heat transfer agents provide the effective storage of one kind, exchange and service mode in Internet of Things.It can be in Internet of Things by its people Real-time processing, transmission and the exchange of heat transfer agent are realized in net, and can obtain real-time virtual information service.Pass through cloud computing Technology, induction information in Internet of Things can break through and obstacle spatially provide corresponding service to the user.Therefore, cloud Calculate and technology of Internet of things combination will can promote information communication and information Perception technology development, make heat transfer agent and its The relevant technologies obtain a new revolution, and the effect to become more and more important is played in military, politics, economic, often life.
Although cloud computing and the combination of technology of Internet of things can promote the development of information communication and information Perception technology, It is, since heat transfer agent has the characteristics that dynamic, diversity, opening, interconnectivity in Internet of Things, it is easy to illegally be used The various attacks at family.In this situation, in order to safeguard safety of heat transfer agent during transmission, storage and service Property, people are usually using some encrypted methods.Although these encryption methods can effective protection data resource transmission, storage With the safety during service, but be also faced with two aspect the problem of:(1) how in the encryption information of substantial amounts It is a very difficult problem effectively to retrieve the data information needed for user;(2) how substantial amounts encryption information In identify the problem of data information retrieved is not tampered with and forges.The main reason for generating both of these problems is data Become ciphertext after resource encryption, user can not determine oneself required information according to ciphertext, can not also be determined according to ciphertext Whether the information received is tampered and forges.In this situation, how retrieval efficiently and quickly is carried out just to encryption data Seem particularly significant.
And the safe retrieving method of heat transfer agent Virtual Service is regarding to the issue above and contradiction, existing following in Internet of Things In the mode of the safe transmission of information, secure storage and secure exchange, build first a kind of fuzzy towards keyword asterisk wildcard Collect developing algorithm.On this basis, a kind of searching algorithm based on asterisk wildcard fuzzy keyword is constructed.Present invention research is in object Belong to the work in more forward position in the safe retrieval field of networking heat transfer agent service, nothing times is the security maintenance to Internet of Things Or all there is certain theory significance and practical value to the security application of Internet of Things.
Invention content
Presence in view of the above problems, problem of the present invention is that:In Internet of Things, construct a kind of logical towards keyword Fuzzy set developing algorithm with symbol, the searching algorithm based on asterisk wildcard fuzzy keyword, to ensure heat transfer agent in Internet of Things Safety encryption, safe retrieval and the secure decryption of Virtual Service realize safe transmission, the storage kimonos of heat transfer agent Virtual Service Business.
To solve the above-mentioned problems, fixed first in the fuzzy set developing algorithm towards keyword asterisk wildcard of the present invention The justice threshold function of editing distance and keyword.Wherein editing distance is defined as follows:Editing distance d=ed (w1,w2) indicate It is two different character string w1And w2Minimum transition number, i.e., by one of character string w1It is converted into another character string w2The minimum number of required conversion.The threshold function of keyword is defined as follows:Threshold function T (wi)=f (sk, wi), indicate for An any given character wi, a kind of respective function for being made up of a fixed one-way function f () and its key sk Relationship.On this basis, insertion is defined to key character and replaces two kinds of operating methods:(1) it is inserted into:I.e. in the pass to be converted An arbitrary single character is inserted into any position of key word (character string);(2) it replaces:Replaced with any one single character Want some character in hand over word string;Finally, it is w to describe key characteri, editing distance is the fuzzy set of the asterisk wildcard of d Construction method.
To solve the above-mentioned problems, it in the searching algorithm based on asterisk wildcard fuzzy keyword of the present invention, is primarily based on The architecture of heat transfer agent Virtual Service in Internet of Things builds the safety of a heat transfer agent Virtual Service based on Internet of Things Retrieval flow.In the safe retrieval flow of this heat transfer agent Virtual Service, sensing node is responsible for the perception of heat transfer agent, is passed Defeated, the reception and transmission of heat transfer agent are responsible in base station, and local domain manager is responsible for the reception of heat transfer agent, storage, transmission, key The structure of word asterisk wildcard fuzzy set, Cloud Server are responsible for reception, storage, the certification of user and the mandate of heat transfer agent, based on logical With symbol fuzzy keyword retrieval, feedback etc., user be responsible for the determination of search key w, keyword w asterisk wildcard fuzzy sets structure It builds, the calculating of threshold function T (w), transmission and receive feedback result etc..Its safe retrieval flow is described as follows:(1) numerous sensings Device node is transferred to local domain manager by the heat transfer agent that wireless sensor network is incuded in a secure manner; (2) local domain manager will determine the required set of keywords retrieved in heat transfer agent after receiving heat transfer agent, and determine and close Key word concentrates the file belonging to each keyword, each keyword;(3) local domain manager is calculated towards keyword wildcard The fuzzy set of symbol;(4) local domain manager builds corresponding multichannel tree and index according to the fuzzy set of keyword asterisk wildcard;(5) The file and heat transfer agent that local domain manager transmits required for key pair are encrypted;(6) local domain manager will be corresponding Multichannel tree, index and encryption information Cloud Server is transmitted to by a kind of safe mode respectively;(7) Cloud Server connects Whether after receiving multichannel tree, index and the encryption information that local domain manager is sent, being stored and being sought accordingly has conjunction The retrieval request of method user;(8) if user needs to retrieve, it is firstly the need of the character and editing distance for determining retrieval.Then, Calculate fuzzy set and its threshold function towards keyword asterisk wildcard.On this basis, in a secure manner to cloud service Device sends retrieval request and sends the threshold function for calculating gained to Cloud Server;(9) Cloud Server is in the Shen for receiving user Please after, it is authenticated.Then refuse to retrieve if it is disabled user;If it is validated user, then the door that user is passed is received Limit function is simultaneously retrieved according to the multichannel tree of preservation, index and encryption information;(9) after retrieving, Cloud Server will be corresponding Retrieval result and encryption information be transferred to user.
To solve the above-mentioned problems, it in the searching algorithm based on asterisk wildcard fuzzy keyword of the present invention, builds first Key character wiOne index, then, for keyword wiFuzzy set S (the w of asterisk wildcardi, d) in each character wi' point Its threshold function T (w are not calculatedi')=f (sk, wi') (explanation:Here sk is shared close by local domain manager and validated user Key, f (x) are a threshold function).Based on the threshold function value T (w for calculating gainedi'), build corresponding concordance list.It is basic herein On, the heat transfer agent of each sensor and its identity information are encrypted local domain manager, then by concordance list and encryption Information be transferred to Cloud Server in a secure manner.Cloud Server after receiving concordance list and encrypted information, It will be stored according to certain memory module.And validated user is for search key w, it is necessary first to log in cloud service Device and the certification through Cloud Server and mandate.After the certification of Cloud Server and mandate, user starts to calculate the door of keyword w T (w) is then transferred to Cloud Server by limit function T (w) with a kind of safe mode.Cloud Server is in the search for receiving T (w) After request, starts to compare concordance list and return to the heat transfer agent and its identity information of all possible sensor.
In short, the safe retrieving method of heat transfer agent Virtual Service has the following advantages and its effect in Internet of Things:
1, the developing algorithm of the new fuzzy set towards keyword asterisk wildcard is used
This developing algorithm has fully considered that sensor node processes ability and storage capacity are limited in wireless sensor network The structure of fuzzy set towards keyword asterisk wildcard is placed on local domain manager, had both facilitated local domain manager in this way by feature The structure for facilitating the fuzzy set of keyword asterisk wildcard again to the management of local wireless sensing network, reduces base station and sensor section Session complexity between point, also reduces the information communication amount between base station and sensor node.Improve keyword wildcard The structure efficiency of the fuzzy set of symbol, also improves the recall precision based on asterisk wildcard fuzzy keyword indirectly.
2, the new searching algorithm based on asterisk wildcard fuzzy keyword is used
This searching algorithm by extracting keyword, builds an index of key character first.Then, structure is corresponding more Lu Shu.On this basis, using depth first searching method, keyword asterisk wildcard fuzzy set is retrieved.Pass through these calculations On the one hand method can make the document ordering being retrieved more reasonable, on the other hand can make effectiveness of retrieval higher, reduce inspection The complexity of rope.Meanwhile in the mapping relations of structure index, having used editing distance and identity attribute, in this way when there is sensing When device node is dynamically added and exits, this search method is capable of the addition of dynamic supporting node and is exited.
3, fuzzy query is supported
In the safe retrieving method of the heat transfer agent Virtual Service of Internet of Things, in the new mould towards keyword asterisk wildcard It pastes the developing algorithm collected and all employs the asterisk wildcard of keyword in the new searching algorithm based on asterisk wildcard fuzzy keyword.This Sample, even if user occurs input error when inputting search key, safe retrieving method still has very strong fault tolerance, It can be according to the most similar correct retrieval result of keyword query of user search.
4, good adaptability and versatility
In the safe retrieving method of the heat transfer agent Virtual Service of Internet of Things, by the heat transfer agent of sensor node and its Identity information is combined, and authentication is carried out to it by local domain manager, and carry out wildcard to the keyword of heat transfer agent The fuzzy set of symbol is built.On this basis, heat transfer agent is encrypted to and is transferred to Cloud Server, the keyword of structure is led to The index of fuzzy set and structure with symbol, multichannel tree are also transmitted to Cloud Server.By the extremely powerful operation of Cloud Server and Retrieval capability retrieves it, has been suitble to the overall architecture of heat transfer agent Virtual Service in Internet of Things, has good adaptation Property and versatility.
5, good security protection
In the safe retrieving method of the heat transfer agent Virtual Service of Internet of Things, in each transmission stage of heat transfer agent, Encrypted pattern is all employed, therefore, it is possible to effectively prevent the attack of inner passage, there is good security protection.
Description of the drawings
Fig. 1 is the system assumption diagram of heat transfer agent Virtual Service in Internet of Things;
Fig. 2 is the safe retrieval flow chart of heat transfer agent Virtual Service in Internet of Things;
Fig. 3 is the multichannel tree schematic diagram of the notation index based on a fuzzy keyword collection.
Specific implementation mode
The invention will be further described below in conjunction with the accompanying drawings.
From for the angle of the safe retrieving method of heat transfer agent Virtual Service, the present invention includes in Internet of Things:(1) a kind of Fuzzy set developing algorithm towards keyword asterisk wildcard;(2) searching algorithm based on asterisk wildcard fuzzy keyword.In this sensing In the safe retrieving method of information Virtual Service, manager of the local domain manager as local wireless sensing network is provided Service be each assumed to believable, its transmission and receive and all follow SSL (Secure socket layer) or TLS (Transport later security) agreement.
Algorithm 1:The developing algorithm of fuzzy set towards keyword asterisk wildcard
When building the developing algorithm of the fuzzy set towards keyword asterisk wildcard, editing distance d=ed (w are first defined1,w2)、 Threshold function T (wi)=f (sk, wi), be inserted into, replace, be defined as follows;
Define 1:Editing distance d=ed (w1,w2), expression is two different character string w1And w2Minimum transition time Number, i.e., by one of character string w1It is converted into another character string w2The minimum number of required conversion.
Define 2:Threshold function T (wi)=f (sk, wi), it indicates for an any given character wi, solid by one A kind of respective function relationship that fixed one-way function f () and its key sk is constituted.
Define 3:It is inserted into, indicates to be inserted into an arbitrary single word in any position of the keyword to be converted (character string) Symbol.
Define 4:It replaces, indicates to replace some character wanted in hand over word string with any one single character.
The developing algorithm of fuzzy set towards keyword asterisk wildcard is described as follows:
The first step:Input key character w to be checkedi(i=1,2,3 ..., n) and editing distance d (d >=0);
Second step:Input fuzzy set S (wi, d) and=φ, k=1, j=1;
Third walks:Judge that d >=0 is noIf so, turning the 4th step;Otherwise, turn the 15th step;
4th step:S(wi, d) and=S (wi,d)∪{wi};
5th step:Judge k < | S (wi, d) | it is noIf it is not, turning the 12nd step;If so, turning the 6th step;
6th step:Judge j < | 2*S (wi, d) | it is noIf it is not, turning the 11st step;If so, turning the 7th step;
7th step:Judge whether j is odd number, if so, turning the 8th step;If it is not, turning the 9th step;
8th step:Fuzzy keyword fuzzyword=S (wi, d) and [k] (explanation:S(wi, d) and [k] expression fuzzy set S (wi, D) k-th of key character in, similarly hereinafter), fuzzy keyword fuzzyword'sAsterisk wildcard * is plugged on position;
9th step:Fuzzy keyword fuzzyword=S (wi, d) and [k], in position [j/2] of fuzzy keyword fuzzyword Set asterisk wildcard * in replacement;
Tenth step:J=j+1;
11st step:K=k+1;
12nd step:JudgeIf so, turning the 13rd step;If it is not, turning the 14th Step;
13rd step:S(wi, d) and=S (wi,d)∪{fuzzyword};
14th step:D=d-1 turns third step;
15th step:Export all S (wi,d);
16th step:Terminate.
Algorithm 2:Searching algorithm based on asterisk wildcard fuzzy keyword
The basic thought of searching algorithm based on asterisk wildcard fuzzy keyword is exactly:It is primarily based on heat transfer agent in Internet of Things The architecture (such as Fig. 1) of Virtual Service builds the safe retrieval flow of a heat transfer agent Virtual Service based on Internet of Things (such as Fig. 2).In the safe retrieval flow of this heat transfer agent Virtual Service, sensing node is responsible for the perception of heat transfer agent, transmission, The reception and transmission of heat transfer agent are responsible in base station, and local domain manager is responsible for the reception of heat transfer agent, storage, transmission, keyword The structure of asterisk wildcard fuzzy set, Cloud Server are responsible for reception, storage, the certification of user and the mandate of heat transfer agent, are based on wildcard Accord with fuzzy keyword retrieval, feedback etc., user be responsible for the determination of search key w, keyword w asterisk wildcard fuzzy sets structure It builds, the calculating of threshold function T (w), transmission and receive feedback result etc..
The safe retrieval flow of heat transfer agent Virtual Service based on Internet of Things is described as follows:(1) numerous sensor nodes Local domain manager is transferred to by the heat transfer agent that wireless sensor network is incuded in a secure manner;(2) local Domain manager will determine the required set of keywords retrieved in heat transfer agent after receiving heat transfer agent, determine in set of keywords File belonging to each keyword, each keyword;(3) local domain manager calculates fuzzy towards keyword asterisk wildcard Collection;(4) local domain manager builds corresponding multichannel tree (explanation according to the fuzzy set of keyword asterisk wildcard:It is fuzzy based on one The multichannel tree of the notation index of set of keywords is as shown in Figure 3) and index;(5) local domain manager transmits required for key pair File and heat transfer agent be encrypted;(6) local domain manager passes through corresponding multichannel tree, index and encryption information respectively A kind of safe mode is transmitted to Cloud Server;Multichannel tree that (7) cloud server is sent to local domain manager, After index and encryption information, is stored accordingly and seek the retrieval request for whether having validated user;(8) if user needs Retrieval, it is firstly the need of the character and editing distance for determining retrieval.Then, calculate fuzzy set towards keyword asterisk wildcard and its Threshold function.On this basis, it sends retrieval request to Cloud Server in a secure manner and is sent to Cloud Server and count Calculate the threshold function of gained;(9) Cloud Server is authenticated it after receiving the application of user.If it is disabled user Then refuse to retrieve;If it is validated user, then receive the threshold function that user is passed and according to the multichannel tree of preservation, index and add Confidential information is retrieved;(9) after retrieving, corresponding retrieval result and encryption information are transferred to legal application by Cloud Server User.
In this algorithm, in order to improve search efficiency, it is based on symbol dictionary traversal of tree thought, builds a multichannel first Tree is used for the limited fuzzy keyword collection S (w of storage elementi, d) and (w herei∈W).Then, allow all shared one it is public before There are one common nodes for the threshold function for the character sewed.The root of multichannel tree is empty set, and from root node to leaf node, a door The character of limit function can be restored by certain way of search.In this way, all fuzzy keywords in multichannel tree all may be used To be restored by the way of search of depth-first.Assuming that Ω={ βi(i=1,2,3 ..., n) it is one group of predefined symbol Number collection, and the quantity of distinct symbols is in this glossary of symbols | Ω |=2n.In this way, for each character βi∈ Ω (i=1,2, 3 ..., n) it can be represented by n bits.It is concentrated in a fuzzy keyword, all characters is carried out to be based on notation index The multichannel tree process of integration is as shown in Figure 3:The algorithm description is as follows:
Searching algorithm based on asterisk wildcard fuzzy keyword is described as follows:
The first step:Local domain manager determines the required set of keywords W retrieved in wireless sensing information, and determines in W Each keyword wjFile F belonging to (j=1,2,3 ..., n)j(j=1,2,3 ..., n), and these files are built into File set C={ F1, F2, F3..., Fn};
Second step:Local domain manager key character w to be checked in Wj(j=1,2,3 ..., n) and editing distance d (d >= 0);
Third walks:Local domain manager calculates the fuzzy set S (w towards keyword asterisk wildcard according to algorithm 1j, d) (j=1, 2,3,...,n);
4th step:For each wi'∈S(wj, d), calculate its threshold function T (wi')=f (sk, wi') (explanation:This In sk be local domain manager and validated user institute shared key, f (x) is a threshold function);
5th step:Based on the threshold function value T (w for calculating gainedi'), build corresponding character string table βi,1i,2, βi,3,...,βi,l/n(explanation:Here l is that threshold function f (x) exports length);
6th step:T (the w calculated according to the 4th stepi') (i=1,2,3 ..., p, p=here | S (wj, d) |) and the 5th The constructed character string table β of stepi,1i,2i,3,...,βi,l/n(i=1,2,3 ..., p), allow all shared one it is public before The public node of threshold function for the character sewed simultaneously builds a multichannel tree G (W), and the root of wherein multichannel tree is empty set φ;
7th step:Local domain manager is with key sk to Fj(ID)||wjIt is encrypted to obtain Enc (sk, Fj(ID)||wj);
8th step:Local domain manager uses different safe transmission modes by multichannel tree G (W) and Enc (sk, Fj(ID)| |wj) it is transferred to Cloud Server respectively;
9th step:Cloud Server is receiving multichannel tree G (W) and Enc (sk, Fj(ID)||wj), it is stored respectively;
Tenth step:If there is user needs to retrieve, it is necessary first to determine that user needs the character w retrieved and editing distance k. Then, user calculates the fuzzy set S (w, k) towards keyword asterisk wildcard according to algorithm 1.On this basis, user is for each A w' ∈ S (w, k) calculate its threshold function T (w')=f (sk, w') (explanation:Here sk is local domain manager and legal use Family institute shared key, f (x) are a threshold function);If no user needs to retrieve, turn the 27th step;
Tenth step:User sends retrieval request to Cloud Server in a secure manner;
11st step:After cloud server is applied to user, its identity is authenticated.If it is validated user, then Confirmation message is sent to user;If it is disabled user, then turn the 27th step;
12nd step:User after receiving the confirmation message that Cloud Server is sent, will in a secure manner to Cloud Server sends all T (w')=f (sk, w'), w' ∈ S (w, k);
13rd step:After all T (w')=f (sk, w') that Cloud Server is sent in reception user, w' ∈ S (w, k), open Begin to count the number that T (w') plants element | T (w') | and i=1 is assigned, ResultIDSet=φ;
14th step:Cloud Server judge i≤| T (w') | it is noIf so, going to the 15th step;If it is not, turning second 16 steps;
15th step:Cloud Server searches the present node in multichannel tree G (W), and sets present node to root node;
16th step:Cloud Server assigns j=1;
17th step:Cloud Server judges that j≤l/n is noIf so, going to the 18th step;If it is not, turning the 20th Step;
18th step:In i-th of T (w'), it sets character β to βj
19th step:Judge in all child's nodes of present node whether to include character βIf do not included, second is gone to Ten steps;If including turning the 21st step;
20th step:Present node is arranged as child's node comprising character β in Cloud Server, and j=j+1;
21st step:Cloud Server judges whether present node is leaf nodeIf so, going to the 22nd step;Such as Fruit is not to turn the 23rd step;
22nd step:The file identity information of present node is added in ResultIDSet by Cloud Server;
23rd step:Cloud Server judges i=| T (w') | it is noIf so, going to the 24th step;If it is not, turning 25th step;
24th step:Cloud Server returns to ResultIDSet
25th step:Cloud Server calculates i=i+1, goes to the 14th step;
26th step:Cloud Server preserves ResultIDSet, and sends retrieval result to legal retrieval user ResultIDSet;
27th step:Terminate.

Claims (3)

1. the safe retrieving method of heat transfer agent Virtual Service in a kind of Internet of Things, including:(1) mould towards keyword asterisk wildcard Paste collection developing algorithm;(2) searching algorithm based on asterisk wildcard fuzzy keyword, it is characterised in that:Sensing node is negative in this method Perception, the transmission of heat transfer agent are blamed, the reception and transmission of heat transfer agent are responsible in base station, and local domain manager is responsible for heat transfer agent It receives, storage, transmit, the structure of keyword asterisk wildcard fuzzy set, Cloud Server is responsible for the reception, storage, user of heat transfer agent Certification and mandate, the retrieval based on asterisk wildcard fuzzy keyword, feedback etc., user is responsible for the determination of search key w, key Calculating, transmission and reception feedback result of the structure, threshold function T (w) of word w asterisk wildcard fuzzy sets etc..
2. the safe retrieving method of heat transfer agent Virtual Service in Internet of Things as described in claim 1, it is characterised in that:It is described The developing algorithm of fuzzy set towards keyword asterisk wildcard uses following steps:
When building the developing algorithm of the fuzzy set towards keyword asterisk wildcard, editing distance d=ed (w are first defined1,w2), thresholding Function T (wi)=f (sk, wi), be inserted into, replace, be defined as follows;
Define 1:Editing distance d=ed (w1,w2), expression is two different character string w1And w2Minimum transition number, i.e., By one of character string w1It is converted into another character string w2The minimum number of required conversion.
Define 2:Threshold function T (wi)=f (sk, wi), it indicates for an any given character wi, fixed by one A kind of respective function relationship that one-way function f () and its key sk is constituted.
Define 3:It is inserted into, indicates to be inserted into an arbitrary single character in any position of the keyword to be converted (character string).
Define 4:It replaces, indicates to replace some character wanted in hand over word string with any one single character.
The developing algorithm of fuzzy set towards keyword asterisk wildcard is described as follows:
The first step:Input key character w to be checkedi(i=1,2,3 ..., n) and editing distance d (d >=0);
Second step:Input fuzzy set S (wi, d) and=φ, k=1, j=1;
Third walks:D >=0 is judged, if so, turning the 4th step;Otherwise, turn the 15th step;
4th step:S(wi, d) and=S (wi,d)∪{wi};
5th step:Judge k < | S (wi, d) |, if it is not, turning the 12nd step;If so, turning the 6th step;
6th step:Judge j < | 2*S (wi, d) |, if it is not, turning the 11st step;If so, turning the 7th step;
7th step:Judge whether j is odd number, if so, turning the 8th step;If it is not, turning the 9th step;
8th step:Fuzzy keyword fuzzyword=S (wi, d) and [k] (explanation:S(wi, d) and [k] expression fuzzy set S (wi, d) in K-th of key character, similarly hereinafter), fuzzy keyword fuzzyword'sAsterisk wildcard * is plugged on position;
9th step:Fuzzy keyword fuzzyword=S (wi, d) and [k], on position [j/2] of fuzzy keyword fuzzyword Asterisk wildcard * in replacement;
Tenth step:J=j+1;
11st step:K=k+1;
12nd step:JudgeIf so, turning the 13rd step;If it is not, turning the 14th step;
13rd step:S(wi, d) and=S (wi,d)∪{fuzzyword};
14th step:D=d-1 turns third step;
15th step:Export all S (wi,d);
16th step:Terminate.
3. the safe retrieving method of heat transfer agent Virtual Service in Internet of Things as claimed in claim 2, it is characterised in that:It is based on The searching algorithm of asterisk wildcard fuzzy keyword includes the following steps:
The first step:Local domain manager determines the required set of keywords W retrieved in wireless sensing information, and determines each in W A keyword wjFile F belonging to (j=1,2,3 ..., n)j(j=1,2,3 ..., n), and these files are built into file Collect C={ F1, F2, F3..., Fn};
Second step:Local domain manager key character w to be checked in Wj(j=1,2,3 ..., n) and editing distance d (d >=0);
Third walks:Local domain manager is calculated according to the developing algorithm of the fuzzy set towards keyword asterisk wildcard towards key Fuzzy set S (the w of word asterisk wildcardj, d) (j=1,2,3 ..., n);
4th step:For each wi'∈S(wj, d), calculate its threshold function T (wi')=f (sk, wi'), inner sk is local domain Manager and validated user institute shared key, f (x) are a threshold function;
5th step:Based on the threshold function value T (w for calculating gainedi'), build corresponding character string table βi,1i,2i,3,..., βi,l/n, inner l is that threshold function f (x) exports length;
6th step:T (the w calculated according to the 4th stepi'), i=1,2,3 ..., p, p=here | S (wj, d) | and the 5th step institute The character string table β of structurei,1i,2i,3,...,βi,l/n, i=1,2,3 ..., p allow all shared common prefix The public node of threshold function of character simultaneously builds a multichannel tree G (W), and the root of wherein multichannel tree is empty set φ;
7th step:Local domain manager is with key sk to Fj(ID)||wjIt is encrypted to obtain Enc (sk, Fj(ID)||wj);
8th step:Local domain manager uses different safe transmission modes by multichannel tree G (W) and Enc (sk, Fj(ID)||wj) It is transferred to Cloud Server respectively;
9th step:Cloud Server is receiving multichannel tree G (W) and Enc (sk, Fj(ID)||wj), it is stored respectively;
Tenth step:If there is user needs to retrieve, it is necessary first to determine that user needs the character w retrieved and editing distance k.So Afterwards, user calculates the fuzzy set towards keyword asterisk wildcard according to the developing algorithm of the fuzzy set towards keyword asterisk wildcard S(w,k);On this basis, user calculates its threshold function T (w')=f (sk, w'), here for each w' ∈ S (w, k) Sk is local domain manager and validated user institute shared key, and f (x) is a threshold function;If no user needs to retrieve, Turn the 27th step;
Tenth step:User sends retrieval request to Cloud Server in a secure manner;
11st step:After cloud server is applied to user, its identity is authenticated.If it is validated user, then to Family sends confirmation message;If it is disabled user, then turn the 27th step;
12nd step:User will take to cloud in a secure manner after receiving the confirmation message that Cloud Server is sent Business device sends all T (w')=f (sk, w'), w' ∈ S (w, k);
13rd step:After all T (w')=f (sk, w') that Cloud Server is sent in reception user, w' ∈ S (w, k), start to unite Meter T (w') plants the number of element | T (w') | and i=1 is assigned, ResultIDSet=φ;
14th step:Cloud Server judge i≤| T (w') |, if so, going to the 15th step;If it is not, turning the 26th Step;
15th step:Cloud Server searches the present node in multichannel tree G (W), and sets present node to root node;
16th step:Cloud Server assigns j=1;
17th step:Cloud Server judges j≤l/n, if so, going to the 18th step;If it is not, turning the 20th step;
18th step:In i-th of T (w'), it sets character β to βj
19th step:Judge in all child's nodes of present node whether comprising character β to go to the 20th step if do not included; If including turning the 21st step;
20th step:Present node is arranged as child's node comprising character β in Cloud Server, and j=j+1;
21st step:Cloud Server judges whether present node is leaf node, if so, going to the 22nd step;If no It is to turn the 23rd step;
22nd step:The file identity information of present node is added in ResultIDSet by Cloud Server;
23rd step:Cloud Server judges i=| T (w') |, if so, going to the 24th step;If it is not, turning the 20th Five steps;
24th step:Cloud Server returns to ResultIDSet;
25th step:Cloud Server calculates i=i+1, goes to the 14th step;
26th step:Cloud Server preserves ResultIDSet, and sends retrieval result to legal retrieval user ResultIDSet;
27th step:Terminate.
CN201810376068.8A 2018-04-24 2018-04-24 The safe retrieving method of heat transfer agent Virtual Service in Internet of Things Pending CN108595633A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810376068.8A CN108595633A (en) 2018-04-24 2018-04-24 The safe retrieving method of heat transfer agent Virtual Service in Internet of Things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810376068.8A CN108595633A (en) 2018-04-24 2018-04-24 The safe retrieving method of heat transfer agent Virtual Service in Internet of Things

Publications (1)

Publication Number Publication Date
CN108595633A true CN108595633A (en) 2018-09-28

Family

ID=63609292

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810376068.8A Pending CN108595633A (en) 2018-04-24 2018-04-24 The safe retrieving method of heat transfer agent Virtual Service in Internet of Things

Country Status (1)

Country Link
CN (1) CN108595633A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120072457A1 (en) * 2008-04-10 2012-03-22 Abo Enterprises, Llc Fuzzy keyword searching
CN102880617A (en) * 2011-07-15 2013-01-16 无锡物联网产业研究院 Internet-of-things entity searching method and system
CN102938767A (en) * 2012-11-13 2013-02-20 西安电子科技大学 Efficient verified fuzzy key word searching method based on cloud data subcontract system
CN105007161A (en) * 2015-06-12 2015-10-28 电子科技大学 Fuzzy keyword public key searchable encryption scheme achieving unrecognizable trap door

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120072457A1 (en) * 2008-04-10 2012-03-22 Abo Enterprises, Llc Fuzzy keyword searching
CN102880617A (en) * 2011-07-15 2013-01-16 无锡物联网产业研究院 Internet-of-things entity searching method and system
CN102938767A (en) * 2012-11-13 2013-02-20 西安电子科技大学 Efficient verified fuzzy key word searching method based on cloud data subcontract system
CN105007161A (en) * 2015-06-12 2015-10-28 电子科技大学 Fuzzy keyword public key searchable encryption scheme achieving unrecognizable trap door

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
YUNFA LI等: ""A Multi-attribute Keyword Retrieval Mechanism for Encrypted Cloud Data"", 《INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS》 *
段崇聪: ""云计算环境下基于模糊关键字的密文搜索研究"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Similar Documents

Publication Publication Date Title
CN104765848B (en) What support result efficiently sorted in mixing cloud storage symmetrically can search for encryption method
CN101436208B (en) Ciphertext database privacy protection enquiring method
CN102598007B (en) Effective detection fingerprints the system and method for data and information
CN108449309B (en) A kind of mixed type can search for encryption method and system
CN110326253A (en) For carrying out the method and system of fuzzy keyword searching to encryption data
Wenyin et al. Phishing Web page detection
Zhang et al. Privacy Risk in Anonymized Heterogeneous Information Networks.
WO2023019762A1 (en) Storage and similarity retrieval methods and apparatuses for encrypted document, device, and medium
CN109739945A (en) A kind of multi-key word ciphertext ordering searching method based on hybrid index
Wang et al. De-anonymizing social networks user via profile similarity
Kalidoss et al. Data anonymisation of vertically partitioned data using map reduce techniques on cloud
Liang et al. FECC: DNS tunnel detection model based on CNN and clustering
Li et al. DVPPIR: privacy-preserving image retrieval based on DCNN and VHE
Gheisari et al. PPDMIT: A lightweight architecture for privacy-preserving data aggregation in the Internet of Things
Liu et al. Spatial‐Temporal Feature with Dual‐Attention Mechanism for Encrypted Malicious Traffic Detection
CN107085584A (en) A kind of cloud document management method, system and service end based on content
Zheng et al. An efficient multikeyword fuzzy ciphertext retrieval scheme based on distributed transmission for Internet of Things
Wang et al. Label specificity attack: Change your label as I want
Sun et al. Secure keyword-based ranked semantic search over encrypted cloud data
CN108595633A (en) The safe retrieving method of heat transfer agent Virtual Service in Internet of Things
CN108319659B (en) Social contact discovery method based on encrypted image quick search
EP4020887B1 (en) Method and apparatus for detecting anomalies of a dns traffic
Laguduva et al. Machine learning attacks and countermeasures for PUF-based IoT edge node security
Wu et al. Identification of attack on data packets using rough set approach to secure end to end communication
Handa et al. An efficient approach for secure information retrieval on cloud

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180928