CN108595633A - The safe retrieving method of heat transfer agent Virtual Service in Internet of Things - Google Patents
The safe retrieving method of heat transfer agent Virtual Service in Internet of Things Download PDFInfo
- Publication number
- CN108595633A CN108595633A CN201810376068.8A CN201810376068A CN108595633A CN 108595633 A CN108595633 A CN 108595633A CN 201810376068 A CN201810376068 A CN 201810376068A CN 108595633 A CN108595633 A CN 108595633A
- Authority
- CN
- China
- Prior art keywords
- keyword
- cloud server
- asterisk wildcard
- fuzzy
- heat transfer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Computer And Data Communications (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a kind of safe retrieving methods of heat transfer agent Virtual Service in Internet of Things, including:(1) the fuzzy set developing algorithm towards keyword asterisk wildcard;(2) searching algorithm based on asterisk wildcard fuzzy keyword, it is characterised in that:Sensing node is responsible for the perception of heat transfer agent, transmission in this method, it is responsible for the reception and transmission of heat transfer agent in base station, local domain manager be responsible for the reception of heat transfer agent, storage, transmission, keyword asterisk wildcard fuzzy set structure, Cloud Server is responsible for reception, storage, the certification of user and mandate, the retrieval based on asterisk wildcard fuzzy keyword, feedback of heat transfer agent etc., and user is responsible for the determination of search key w, the calculating of structure, threshold function T (w) of keyword w asterisk wildcard fuzzy sets, transmission and receives feedback result etc..
Description
Technical field
The invention belongs to the security application fields of heat transfer agent Virtual Service in Internet of Things, and the purpose is to the biographies in Internet of Things
A kind of safe retrieving method is provided to the user during sense information Virtual Service, its is made safe and effective to be provided for users
Service, it is related to the structure of the fuzzy set towards keyword asterisk wildcard and two kinds of processes of retrieval based on asterisk wildcard fuzzy keyword.
For this purpose, construct a kind of fuzzy set developing algorithm towards keyword asterisk wildcard respectively and a kind of being based on asterisk wildcard fuzzy keyword
Searching algorithm.
Background technology
With the fast development of technology of Internet of things, various information sensing device (Sensor Network, radio-frequency recognition system, infrared senses
Answer device, laser scanning etc.) unprecedented development has also been obtained, the data information of induction increases by geometric progression.Increasingly
More sensed datas needs in a secure manner into the transmission of row information, storage, exchange, to realize the intelligence of Internet of Things
Identification, positioning, tracking, monitoring and management, and safe and effective service can be provided to the user.And cloud computing technology is
A large amount of heat transfer agents provide the effective storage of one kind, exchange and service mode in Internet of Things.It can be in Internet of Things by its people
Real-time processing, transmission and the exchange of heat transfer agent are realized in net, and can obtain real-time virtual information service.Pass through cloud computing
Technology, induction information in Internet of Things can break through and obstacle spatially provide corresponding service to the user.Therefore, cloud
Calculate and technology of Internet of things combination will can promote information communication and information Perception technology development, make heat transfer agent and its
The relevant technologies obtain a new revolution, and the effect to become more and more important is played in military, politics, economic, often life.
Although cloud computing and the combination of technology of Internet of things can promote the development of information communication and information Perception technology,
It is, since heat transfer agent has the characteristics that dynamic, diversity, opening, interconnectivity in Internet of Things, it is easy to illegally be used
The various attacks at family.In this situation, in order to safeguard safety of heat transfer agent during transmission, storage and service
Property, people are usually using some encrypted methods.Although these encryption methods can effective protection data resource transmission, storage
With the safety during service, but be also faced with two aspect the problem of:(1) how in the encryption information of substantial amounts
It is a very difficult problem effectively to retrieve the data information needed for user;(2) how substantial amounts encryption information
In identify the problem of data information retrieved is not tampered with and forges.The main reason for generating both of these problems is data
Become ciphertext after resource encryption, user can not determine oneself required information according to ciphertext, can not also be determined according to ciphertext
Whether the information received is tampered and forges.In this situation, how retrieval efficiently and quickly is carried out just to encryption data
Seem particularly significant.
And the safe retrieving method of heat transfer agent Virtual Service is regarding to the issue above and contradiction, existing following in Internet of Things
In the mode of the safe transmission of information, secure storage and secure exchange, build first a kind of fuzzy towards keyword asterisk wildcard
Collect developing algorithm.On this basis, a kind of searching algorithm based on asterisk wildcard fuzzy keyword is constructed.Present invention research is in object
Belong to the work in more forward position in the safe retrieval field of networking heat transfer agent service, nothing times is the security maintenance to Internet of Things
Or all there is certain theory significance and practical value to the security application of Internet of Things.
Invention content
Presence in view of the above problems, problem of the present invention is that:In Internet of Things, construct a kind of logical towards keyword
Fuzzy set developing algorithm with symbol, the searching algorithm based on asterisk wildcard fuzzy keyword, to ensure heat transfer agent in Internet of Things
Safety encryption, safe retrieval and the secure decryption of Virtual Service realize safe transmission, the storage kimonos of heat transfer agent Virtual Service
Business.
To solve the above-mentioned problems, fixed first in the fuzzy set developing algorithm towards keyword asterisk wildcard of the present invention
The justice threshold function of editing distance and keyword.Wherein editing distance is defined as follows:Editing distance d=ed (w1,w2) indicate
It is two different character string w1And w2Minimum transition number, i.e., by one of character string w1It is converted into another character string
w2The minimum number of required conversion.The threshold function of keyword is defined as follows:Threshold function T (wi)=f (sk, wi), indicate for
An any given character wi, a kind of respective function for being made up of a fixed one-way function f () and its key sk
Relationship.On this basis, insertion is defined to key character and replaces two kinds of operating methods:(1) it is inserted into:I.e. in the pass to be converted
An arbitrary single character is inserted into any position of key word (character string);(2) it replaces:Replaced with any one single character
Want some character in hand over word string;Finally, it is w to describe key characteri, editing distance is the fuzzy set of the asterisk wildcard of d
Construction method.
To solve the above-mentioned problems, it in the searching algorithm based on asterisk wildcard fuzzy keyword of the present invention, is primarily based on
The architecture of heat transfer agent Virtual Service in Internet of Things builds the safety of a heat transfer agent Virtual Service based on Internet of Things
Retrieval flow.In the safe retrieval flow of this heat transfer agent Virtual Service, sensing node is responsible for the perception of heat transfer agent, is passed
Defeated, the reception and transmission of heat transfer agent are responsible in base station, and local domain manager is responsible for the reception of heat transfer agent, storage, transmission, key
The structure of word asterisk wildcard fuzzy set, Cloud Server are responsible for reception, storage, the certification of user and the mandate of heat transfer agent, based on logical
With symbol fuzzy keyword retrieval, feedback etc., user be responsible for the determination of search key w, keyword w asterisk wildcard fuzzy sets structure
It builds, the calculating of threshold function T (w), transmission and receive feedback result etc..Its safe retrieval flow is described as follows:(1) numerous sensings
Device node is transferred to local domain manager by the heat transfer agent that wireless sensor network is incuded in a secure manner;
(2) local domain manager will determine the required set of keywords retrieved in heat transfer agent after receiving heat transfer agent, and determine and close
Key word concentrates the file belonging to each keyword, each keyword;(3) local domain manager is calculated towards keyword wildcard
The fuzzy set of symbol;(4) local domain manager builds corresponding multichannel tree and index according to the fuzzy set of keyword asterisk wildcard;(5)
The file and heat transfer agent that local domain manager transmits required for key pair are encrypted;(6) local domain manager will be corresponding
Multichannel tree, index and encryption information Cloud Server is transmitted to by a kind of safe mode respectively;(7) Cloud Server connects
Whether after receiving multichannel tree, index and the encryption information that local domain manager is sent, being stored and being sought accordingly has conjunction
The retrieval request of method user;(8) if user needs to retrieve, it is firstly the need of the character and editing distance for determining retrieval.Then,
Calculate fuzzy set and its threshold function towards keyword asterisk wildcard.On this basis, in a secure manner to cloud service
Device sends retrieval request and sends the threshold function for calculating gained to Cloud Server;(9) Cloud Server is in the Shen for receiving user
Please after, it is authenticated.Then refuse to retrieve if it is disabled user;If it is validated user, then the door that user is passed is received
Limit function is simultaneously retrieved according to the multichannel tree of preservation, index and encryption information;(9) after retrieving, Cloud Server will be corresponding
Retrieval result and encryption information be transferred to user.
To solve the above-mentioned problems, it in the searching algorithm based on asterisk wildcard fuzzy keyword of the present invention, builds first
Key character wiOne index, then, for keyword wiFuzzy set S (the w of asterisk wildcardi, d) in each character wi' point
Its threshold function T (w are not calculatedi')=f (sk, wi') (explanation:Here sk is shared close by local domain manager and validated user
Key, f (x) are a threshold function).Based on the threshold function value T (w for calculating gainedi'), build corresponding concordance list.It is basic herein
On, the heat transfer agent of each sensor and its identity information are encrypted local domain manager, then by concordance list and encryption
Information be transferred to Cloud Server in a secure manner.Cloud Server after receiving concordance list and encrypted information,
It will be stored according to certain memory module.And validated user is for search key w, it is necessary first to log in cloud service
Device and the certification through Cloud Server and mandate.After the certification of Cloud Server and mandate, user starts to calculate the door of keyword w
T (w) is then transferred to Cloud Server by limit function T (w) with a kind of safe mode.Cloud Server is in the search for receiving T (w)
After request, starts to compare concordance list and return to the heat transfer agent and its identity information of all possible sensor.
In short, the safe retrieving method of heat transfer agent Virtual Service has the following advantages and its effect in Internet of Things:
1, the developing algorithm of the new fuzzy set towards keyword asterisk wildcard is used
This developing algorithm has fully considered that sensor node processes ability and storage capacity are limited in wireless sensor network
The structure of fuzzy set towards keyword asterisk wildcard is placed on local domain manager, had both facilitated local domain manager in this way by feature
The structure for facilitating the fuzzy set of keyword asterisk wildcard again to the management of local wireless sensing network, reduces base station and sensor section
Session complexity between point, also reduces the information communication amount between base station and sensor node.Improve keyword wildcard
The structure efficiency of the fuzzy set of symbol, also improves the recall precision based on asterisk wildcard fuzzy keyword indirectly.
2, the new searching algorithm based on asterisk wildcard fuzzy keyword is used
This searching algorithm by extracting keyword, builds an index of key character first.Then, structure is corresponding more
Lu Shu.On this basis, using depth first searching method, keyword asterisk wildcard fuzzy set is retrieved.Pass through these calculations
On the one hand method can make the document ordering being retrieved more reasonable, on the other hand can make effectiveness of retrieval higher, reduce inspection
The complexity of rope.Meanwhile in the mapping relations of structure index, having used editing distance and identity attribute, in this way when there is sensing
When device node is dynamically added and exits, this search method is capable of the addition of dynamic supporting node and is exited.
3, fuzzy query is supported
In the safe retrieving method of the heat transfer agent Virtual Service of Internet of Things, in the new mould towards keyword asterisk wildcard
It pastes the developing algorithm collected and all employs the asterisk wildcard of keyword in the new searching algorithm based on asterisk wildcard fuzzy keyword.This
Sample, even if user occurs input error when inputting search key, safe retrieving method still has very strong fault tolerance,
It can be according to the most similar correct retrieval result of keyword query of user search.
4, good adaptability and versatility
In the safe retrieving method of the heat transfer agent Virtual Service of Internet of Things, by the heat transfer agent of sensor node and its
Identity information is combined, and authentication is carried out to it by local domain manager, and carry out wildcard to the keyword of heat transfer agent
The fuzzy set of symbol is built.On this basis, heat transfer agent is encrypted to and is transferred to Cloud Server, the keyword of structure is led to
The index of fuzzy set and structure with symbol, multichannel tree are also transmitted to Cloud Server.By the extremely powerful operation of Cloud Server and
Retrieval capability retrieves it, has been suitble to the overall architecture of heat transfer agent Virtual Service in Internet of Things, has good adaptation
Property and versatility.
5, good security protection
In the safe retrieving method of the heat transfer agent Virtual Service of Internet of Things, in each transmission stage of heat transfer agent,
Encrypted pattern is all employed, therefore, it is possible to effectively prevent the attack of inner passage, there is good security protection.
Description of the drawings
Fig. 1 is the system assumption diagram of heat transfer agent Virtual Service in Internet of Things;
Fig. 2 is the safe retrieval flow chart of heat transfer agent Virtual Service in Internet of Things;
Fig. 3 is the multichannel tree schematic diagram of the notation index based on a fuzzy keyword collection.
Specific implementation mode
The invention will be further described below in conjunction with the accompanying drawings.
From for the angle of the safe retrieving method of heat transfer agent Virtual Service, the present invention includes in Internet of Things:(1) a kind of
Fuzzy set developing algorithm towards keyword asterisk wildcard;(2) searching algorithm based on asterisk wildcard fuzzy keyword.In this sensing
In the safe retrieving method of information Virtual Service, manager of the local domain manager as local wireless sensing network is provided
Service be each assumed to believable, its transmission and receive and all follow SSL (Secure socket layer) or TLS
(Transport later security) agreement.
Algorithm 1:The developing algorithm of fuzzy set towards keyword asterisk wildcard
When building the developing algorithm of the fuzzy set towards keyword asterisk wildcard, editing distance d=ed (w are first defined1,w2)、
Threshold function T (wi)=f (sk, wi), be inserted into, replace, be defined as follows;
Define 1:Editing distance d=ed (w1,w2), expression is two different character string w1And w2Minimum transition time
Number, i.e., by one of character string w1It is converted into another character string w2The minimum number of required conversion.
Define 2:Threshold function T (wi)=f (sk, wi), it indicates for an any given character wi, solid by one
A kind of respective function relationship that fixed one-way function f () and its key sk is constituted.
Define 3:It is inserted into, indicates to be inserted into an arbitrary single word in any position of the keyword to be converted (character string)
Symbol.
Define 4:It replaces, indicates to replace some character wanted in hand over word string with any one single character.
The developing algorithm of fuzzy set towards keyword asterisk wildcard is described as follows:
The first step:Input key character w to be checkedi(i=1,2,3 ..., n) and editing distance d (d >=0);
Second step:Input fuzzy set S (wi, d) and=φ, k=1, j=1;
Third walks:Judge that d >=0 is noIf so, turning the 4th step;Otherwise, turn the 15th step;
4th step:S(wi, d) and=S (wi,d)∪{wi};
5th step:Judge k < | S (wi, d) | it is noIf it is not, turning the 12nd step;If so, turning the 6th step;
6th step:Judge j < | 2*S (wi, d) | it is noIf it is not, turning the 11st step;If so, turning the 7th step;
7th step:Judge whether j is odd number, if so, turning the 8th step;If it is not, turning the 9th step;
8th step:Fuzzy keyword fuzzyword=S (wi, d) and [k] (explanation:S(wi, d) and [k] expression fuzzy set S (wi,
D) k-th of key character in, similarly hereinafter), fuzzy keyword fuzzyword'sAsterisk wildcard * is plugged on position;
9th step:Fuzzy keyword fuzzyword=S (wi, d) and [k], in position [j/2] of fuzzy keyword fuzzyword
Set asterisk wildcard * in replacement;
Tenth step:J=j+1;
11st step:K=k+1;
12nd step:JudgeIf so, turning the 13rd step;If it is not, turning the 14th
Step;
13rd step:S(wi, d) and=S (wi,d)∪{fuzzyword};
14th step:D=d-1 turns third step;
15th step:Export all S (wi,d);
16th step:Terminate.
Algorithm 2:Searching algorithm based on asterisk wildcard fuzzy keyword
The basic thought of searching algorithm based on asterisk wildcard fuzzy keyword is exactly:It is primarily based on heat transfer agent in Internet of Things
The architecture (such as Fig. 1) of Virtual Service builds the safe retrieval flow of a heat transfer agent Virtual Service based on Internet of Things
(such as Fig. 2).In the safe retrieval flow of this heat transfer agent Virtual Service, sensing node is responsible for the perception of heat transfer agent, transmission,
The reception and transmission of heat transfer agent are responsible in base station, and local domain manager is responsible for the reception of heat transfer agent, storage, transmission, keyword
The structure of asterisk wildcard fuzzy set, Cloud Server are responsible for reception, storage, the certification of user and the mandate of heat transfer agent, are based on wildcard
Accord with fuzzy keyword retrieval, feedback etc., user be responsible for the determination of search key w, keyword w asterisk wildcard fuzzy sets structure
It builds, the calculating of threshold function T (w), transmission and receive feedback result etc..
The safe retrieval flow of heat transfer agent Virtual Service based on Internet of Things is described as follows:(1) numerous sensor nodes
Local domain manager is transferred to by the heat transfer agent that wireless sensor network is incuded in a secure manner;(2) local
Domain manager will determine the required set of keywords retrieved in heat transfer agent after receiving heat transfer agent, determine in set of keywords
File belonging to each keyword, each keyword;(3) local domain manager calculates fuzzy towards keyword asterisk wildcard
Collection;(4) local domain manager builds corresponding multichannel tree (explanation according to the fuzzy set of keyword asterisk wildcard:It is fuzzy based on one
The multichannel tree of the notation index of set of keywords is as shown in Figure 3) and index;(5) local domain manager transmits required for key pair
File and heat transfer agent be encrypted;(6) local domain manager passes through corresponding multichannel tree, index and encryption information respectively
A kind of safe mode is transmitted to Cloud Server;Multichannel tree that (7) cloud server is sent to local domain manager,
After index and encryption information, is stored accordingly and seek the retrieval request for whether having validated user;(8) if user needs
Retrieval, it is firstly the need of the character and editing distance for determining retrieval.Then, calculate fuzzy set towards keyword asterisk wildcard and its
Threshold function.On this basis, it sends retrieval request to Cloud Server in a secure manner and is sent to Cloud Server and count
Calculate the threshold function of gained;(9) Cloud Server is authenticated it after receiving the application of user.If it is disabled user
Then refuse to retrieve;If it is validated user, then receive the threshold function that user is passed and according to the multichannel tree of preservation, index and add
Confidential information is retrieved;(9) after retrieving, corresponding retrieval result and encryption information are transferred to legal application by Cloud Server
User.
In this algorithm, in order to improve search efficiency, it is based on symbol dictionary traversal of tree thought, builds a multichannel first
Tree is used for the limited fuzzy keyword collection S (w of storage elementi, d) and (w herei∈W).Then, allow all shared one it is public before
There are one common nodes for the threshold function for the character sewed.The root of multichannel tree is empty set, and from root node to leaf node, a door
The character of limit function can be restored by certain way of search.In this way, all fuzzy keywords in multichannel tree all may be used
To be restored by the way of search of depth-first.Assuming that Ω={ βi(i=1,2,3 ..., n) it is one group of predefined symbol
Number collection, and the quantity of distinct symbols is in this glossary of symbols | Ω |=2n.In this way, for each character βi∈ Ω (i=1,2,
3 ..., n) it can be represented by n bits.It is concentrated in a fuzzy keyword, all characters is carried out to be based on notation index
The multichannel tree process of integration is as shown in Figure 3:The algorithm description is as follows:
Searching algorithm based on asterisk wildcard fuzzy keyword is described as follows:
The first step:Local domain manager determines the required set of keywords W retrieved in wireless sensing information, and determines in W
Each keyword wjFile F belonging to (j=1,2,3 ..., n)j(j=1,2,3 ..., n), and these files are built into
File set C={ F1, F2, F3..., Fn};
Second step:Local domain manager key character w to be checked in Wj(j=1,2,3 ..., n) and editing distance d (d >=
0);
Third walks:Local domain manager calculates the fuzzy set S (w towards keyword asterisk wildcard according to algorithm 1j, d) (j=1,
2,3,...,n);
4th step:For each wi'∈S(wj, d), calculate its threshold function T (wi')=f (sk, wi') (explanation:This
In sk be local domain manager and validated user institute shared key, f (x) is a threshold function);
5th step:Based on the threshold function value T (w for calculating gainedi'), build corresponding character string table βi,1,βi,2,
βi,3,...,βi,l/n(explanation:Here l is that threshold function f (x) exports length);
6th step:T (the w calculated according to the 4th stepi') (i=1,2,3 ..., p, p=here | S (wj, d) |) and the 5th
The constructed character string table β of stepi,1,βi,2,βi,3,...,βi,l/n(i=1,2,3 ..., p), allow all shared one it is public before
The public node of threshold function for the character sewed simultaneously builds a multichannel tree G (W), and the root of wherein multichannel tree is empty set φ;
7th step:Local domain manager is with key sk to Fj(ID)||wjIt is encrypted to obtain Enc (sk, Fj(ID)||wj);
8th step:Local domain manager uses different safe transmission modes by multichannel tree G (W) and Enc (sk, Fj(ID)|
|wj) it is transferred to Cloud Server respectively;
9th step:Cloud Server is receiving multichannel tree G (W) and Enc (sk, Fj(ID)||wj), it is stored respectively;
Tenth step:If there is user needs to retrieve, it is necessary first to determine that user needs the character w retrieved and editing distance k.
Then, user calculates the fuzzy set S (w, k) towards keyword asterisk wildcard according to algorithm 1.On this basis, user is for each
A w' ∈ S (w, k) calculate its threshold function T (w')=f (sk, w') (explanation:Here sk is local domain manager and legal use
Family institute shared key, f (x) are a threshold function);If no user needs to retrieve, turn the 27th step;
Tenth step:User sends retrieval request to Cloud Server in a secure manner;
11st step:After cloud server is applied to user, its identity is authenticated.If it is validated user, then
Confirmation message is sent to user;If it is disabled user, then turn the 27th step;
12nd step:User after receiving the confirmation message that Cloud Server is sent, will in a secure manner to
Cloud Server sends all T (w')=f (sk, w'), w' ∈ S (w, k);
13rd step:After all T (w')=f (sk, w') that Cloud Server is sent in reception user, w' ∈ S (w, k), open
Begin to count the number that T (w') plants element | T (w') | and i=1 is assigned, ResultIDSet=φ;
14th step:Cloud Server judge i≤| T (w') | it is noIf so, going to the 15th step;If it is not, turning second
16 steps;
15th step:Cloud Server searches the present node in multichannel tree G (W), and sets present node to root node;
16th step:Cloud Server assigns j=1;
17th step:Cloud Server judges that j≤l/n is noIf so, going to the 18th step;If it is not, turning the 20th
Step;
18th step:In i-th of T (w'), it sets character β to βj;
19th step:Judge in all child's nodes of present node whether to include character βIf do not included, second is gone to
Ten steps;If including turning the 21st step;
20th step:Present node is arranged as child's node comprising character β in Cloud Server, and j=j+1;
21st step:Cloud Server judges whether present node is leaf nodeIf so, going to the 22nd step;Such as
Fruit is not to turn the 23rd step;
22nd step:The file identity information of present node is added in ResultIDSet by Cloud Server;
23rd step:Cloud Server judges i=| T (w') | it is noIf so, going to the 24th step;If it is not, turning
25th step;
24th step:Cloud Server returns to ResultIDSet
25th step:Cloud Server calculates i=i+1, goes to the 14th step;
26th step:Cloud Server preserves ResultIDSet, and sends retrieval result to legal retrieval user
ResultIDSet;
27th step:Terminate.
Claims (3)
1. the safe retrieving method of heat transfer agent Virtual Service in a kind of Internet of Things, including:(1) mould towards keyword asterisk wildcard
Paste collection developing algorithm;(2) searching algorithm based on asterisk wildcard fuzzy keyword, it is characterised in that:Sensing node is negative in this method
Perception, the transmission of heat transfer agent are blamed, the reception and transmission of heat transfer agent are responsible in base station, and local domain manager is responsible for heat transfer agent
It receives, storage, transmit, the structure of keyword asterisk wildcard fuzzy set, Cloud Server is responsible for the reception, storage, user of heat transfer agent
Certification and mandate, the retrieval based on asterisk wildcard fuzzy keyword, feedback etc., user is responsible for the determination of search key w, key
Calculating, transmission and reception feedback result of the structure, threshold function T (w) of word w asterisk wildcard fuzzy sets etc..
2. the safe retrieving method of heat transfer agent Virtual Service in Internet of Things as described in claim 1, it is characterised in that:It is described
The developing algorithm of fuzzy set towards keyword asterisk wildcard uses following steps:
When building the developing algorithm of the fuzzy set towards keyword asterisk wildcard, editing distance d=ed (w are first defined1,w2), thresholding
Function T (wi)=f (sk, wi), be inserted into, replace, be defined as follows;
Define 1:Editing distance d=ed (w1,w2), expression is two different character string w1And w2Minimum transition number, i.e.,
By one of character string w1It is converted into another character string w2The minimum number of required conversion.
Define 2:Threshold function T (wi)=f (sk, wi), it indicates for an any given character wi, fixed by one
A kind of respective function relationship that one-way function f () and its key sk is constituted.
Define 3:It is inserted into, indicates to be inserted into an arbitrary single character in any position of the keyword to be converted (character string).
Define 4:It replaces, indicates to replace some character wanted in hand over word string with any one single character.
The developing algorithm of fuzzy set towards keyword asterisk wildcard is described as follows:
The first step:Input key character w to be checkedi(i=1,2,3 ..., n) and editing distance d (d >=0);
Second step:Input fuzzy set S (wi, d) and=φ, k=1, j=1;
Third walks:D >=0 is judged, if so, turning the 4th step;Otherwise, turn the 15th step;
4th step:S(wi, d) and=S (wi,d)∪{wi};
5th step:Judge k < | S (wi, d) |, if it is not, turning the 12nd step;If so, turning the 6th step;
6th step:Judge j < | 2*S (wi, d) |, if it is not, turning the 11st step;If so, turning the 7th step;
7th step:Judge whether j is odd number, if so, turning the 8th step;If it is not, turning the 9th step;
8th step:Fuzzy keyword fuzzyword=S (wi, d) and [k] (explanation:S(wi, d) and [k] expression fuzzy set S (wi, d) in
K-th of key character, similarly hereinafter), fuzzy keyword fuzzyword'sAsterisk wildcard * is plugged on position;
9th step:Fuzzy keyword fuzzyword=S (wi, d) and [k], on position [j/2] of fuzzy keyword fuzzyword
Asterisk wildcard * in replacement;
Tenth step:J=j+1;
11st step:K=k+1;
12nd step:JudgeIf so, turning the 13rd step;If it is not, turning the 14th step;
13rd step:S(wi, d) and=S (wi,d)∪{fuzzyword};
14th step:D=d-1 turns third step;
15th step:Export all S (wi,d);
16th step:Terminate.
3. the safe retrieving method of heat transfer agent Virtual Service in Internet of Things as claimed in claim 2, it is characterised in that:It is based on
The searching algorithm of asterisk wildcard fuzzy keyword includes the following steps:
The first step:Local domain manager determines the required set of keywords W retrieved in wireless sensing information, and determines each in W
A keyword wjFile F belonging to (j=1,2,3 ..., n)j(j=1,2,3 ..., n), and these files are built into file
Collect C={ F1, F2, F3..., Fn};
Second step:Local domain manager key character w to be checked in Wj(j=1,2,3 ..., n) and editing distance d (d >=0);
Third walks:Local domain manager is calculated according to the developing algorithm of the fuzzy set towards keyword asterisk wildcard towards key
Fuzzy set S (the w of word asterisk wildcardj, d) (j=1,2,3 ..., n);
4th step:For each wi'∈S(wj, d), calculate its threshold function T (wi')=f (sk, wi'), inner sk is local domain
Manager and validated user institute shared key, f (x) are a threshold function;
5th step:Based on the threshold function value T (w for calculating gainedi'), build corresponding character string table βi,1,βi,2,βi,3,...,
βi,l/n, inner l is that threshold function f (x) exports length;
6th step:T (the w calculated according to the 4th stepi'), i=1,2,3 ..., p, p=here | S (wj, d) | and the 5th step institute
The character string table β of structurei,1,βi,2,βi,3,...,βi,l/n, i=1,2,3 ..., p allow all shared common prefix
The public node of threshold function of character simultaneously builds a multichannel tree G (W), and the root of wherein multichannel tree is empty set φ;
7th step:Local domain manager is with key sk to Fj(ID)||wjIt is encrypted to obtain Enc (sk, Fj(ID)||wj);
8th step:Local domain manager uses different safe transmission modes by multichannel tree G (W) and Enc (sk, Fj(ID)||wj)
It is transferred to Cloud Server respectively;
9th step:Cloud Server is receiving multichannel tree G (W) and Enc (sk, Fj(ID)||wj), it is stored respectively;
Tenth step:If there is user needs to retrieve, it is necessary first to determine that user needs the character w retrieved and editing distance k.So
Afterwards, user calculates the fuzzy set towards keyword asterisk wildcard according to the developing algorithm of the fuzzy set towards keyword asterisk wildcard
S(w,k);On this basis, user calculates its threshold function T (w')=f (sk, w'), here for each w' ∈ S (w, k)
Sk is local domain manager and validated user institute shared key, and f (x) is a threshold function;If no user needs to retrieve,
Turn the 27th step;
Tenth step:User sends retrieval request to Cloud Server in a secure manner;
11st step:After cloud server is applied to user, its identity is authenticated.If it is validated user, then to
Family sends confirmation message;If it is disabled user, then turn the 27th step;
12nd step:User will take to cloud in a secure manner after receiving the confirmation message that Cloud Server is sent
Business device sends all T (w')=f (sk, w'), w' ∈ S (w, k);
13rd step:After all T (w')=f (sk, w') that Cloud Server is sent in reception user, w' ∈ S (w, k), start to unite
Meter T (w') plants the number of element | T (w') | and i=1 is assigned, ResultIDSet=φ;
14th step:Cloud Server judge i≤| T (w') |, if so, going to the 15th step;If it is not, turning the 26th
Step;
15th step:Cloud Server searches the present node in multichannel tree G (W), and sets present node to root node;
16th step:Cloud Server assigns j=1;
17th step:Cloud Server judges j≤l/n, if so, going to the 18th step;If it is not, turning the 20th step;
18th step:In i-th of T (w'), it sets character β to βj;
19th step:Judge in all child's nodes of present node whether comprising character β to go to the 20th step if do not included;
If including turning the 21st step;
20th step:Present node is arranged as child's node comprising character β in Cloud Server, and j=j+1;
21st step:Cloud Server judges whether present node is leaf node, if so, going to the 22nd step;If no
It is to turn the 23rd step;
22nd step:The file identity information of present node is added in ResultIDSet by Cloud Server;
23rd step:Cloud Server judges i=| T (w') |, if so, going to the 24th step;If it is not, turning the 20th
Five steps;
24th step:Cloud Server returns to ResultIDSet;
25th step:Cloud Server calculates i=i+1, goes to the 14th step;
26th step:Cloud Server preserves ResultIDSet, and sends retrieval result to legal retrieval user
ResultIDSet;
27th step:Terminate.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810376068.8A CN108595633A (en) | 2018-04-24 | 2018-04-24 | The safe retrieving method of heat transfer agent Virtual Service in Internet of Things |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810376068.8A CN108595633A (en) | 2018-04-24 | 2018-04-24 | The safe retrieving method of heat transfer agent Virtual Service in Internet of Things |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108595633A true CN108595633A (en) | 2018-09-28 |
Family
ID=63609292
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810376068.8A Pending CN108595633A (en) | 2018-04-24 | 2018-04-24 | The safe retrieving method of heat transfer agent Virtual Service in Internet of Things |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108595633A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120072457A1 (en) * | 2008-04-10 | 2012-03-22 | Abo Enterprises, Llc | Fuzzy keyword searching |
CN102880617A (en) * | 2011-07-15 | 2013-01-16 | 无锡物联网产业研究院 | Internet-of-things entity searching method and system |
CN102938767A (en) * | 2012-11-13 | 2013-02-20 | 西安电子科技大学 | Efficient verified fuzzy key word searching method based on cloud data subcontract system |
CN105007161A (en) * | 2015-06-12 | 2015-10-28 | 电子科技大学 | Fuzzy keyword public key searchable encryption scheme achieving unrecognizable trap door |
-
2018
- 2018-04-24 CN CN201810376068.8A patent/CN108595633A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120072457A1 (en) * | 2008-04-10 | 2012-03-22 | Abo Enterprises, Llc | Fuzzy keyword searching |
CN102880617A (en) * | 2011-07-15 | 2013-01-16 | 无锡物联网产业研究院 | Internet-of-things entity searching method and system |
CN102938767A (en) * | 2012-11-13 | 2013-02-20 | 西安电子科技大学 | Efficient verified fuzzy key word searching method based on cloud data subcontract system |
CN105007161A (en) * | 2015-06-12 | 2015-10-28 | 电子科技大学 | Fuzzy keyword public key searchable encryption scheme achieving unrecognizable trap door |
Non-Patent Citations (2)
Title |
---|
YUNFA LI等: ""A Multi-attribute Keyword Retrieval Mechanism for Encrypted Cloud Data"", 《INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS》 * |
段崇聪: ""云计算环境下基于模糊关键字的密文搜索研究"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104765848B (en) | What support result efficiently sorted in mixing cloud storage symmetrically can search for encryption method | |
CN101436208B (en) | Ciphertext database privacy protection enquiring method | |
CN102598007B (en) | Effective detection fingerprints the system and method for data and information | |
CN108449309B (en) | A kind of mixed type can search for encryption method and system | |
CN110326253A (en) | For carrying out the method and system of fuzzy keyword searching to encryption data | |
Wenyin et al. | Phishing Web page detection | |
Zhang et al. | Privacy Risk in Anonymized Heterogeneous Information Networks. | |
WO2023019762A1 (en) | Storage and similarity retrieval methods and apparatuses for encrypted document, device, and medium | |
CN109739945A (en) | A kind of multi-key word ciphertext ordering searching method based on hybrid index | |
Wang et al. | De-anonymizing social networks user via profile similarity | |
Kalidoss et al. | Data anonymisation of vertically partitioned data using map reduce techniques on cloud | |
Liang et al. | FECC: DNS tunnel detection model based on CNN and clustering | |
Li et al. | DVPPIR: privacy-preserving image retrieval based on DCNN and VHE | |
Gheisari et al. | PPDMIT: A lightweight architecture for privacy-preserving data aggregation in the Internet of Things | |
Liu et al. | Spatial‐Temporal Feature with Dual‐Attention Mechanism for Encrypted Malicious Traffic Detection | |
CN107085584A (en) | A kind of cloud document management method, system and service end based on content | |
Zheng et al. | An efficient multikeyword fuzzy ciphertext retrieval scheme based on distributed transmission for Internet of Things | |
Wang et al. | Label specificity attack: Change your label as I want | |
Sun et al. | Secure keyword-based ranked semantic search over encrypted cloud data | |
CN108595633A (en) | The safe retrieving method of heat transfer agent Virtual Service in Internet of Things | |
CN108319659B (en) | Social contact discovery method based on encrypted image quick search | |
EP4020887B1 (en) | Method and apparatus for detecting anomalies of a dns traffic | |
Laguduva et al. | Machine learning attacks and countermeasures for PUF-based IoT edge node security | |
Wu et al. | Identification of attack on data packets using rough set approach to secure end to end communication | |
Handa et al. | An efficient approach for secure information retrieval on cloud |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180928 |