CN109213731A - Multi-key word cipher text retrieval method in cloud environment based on iterative cryptographic - Google Patents

Multi-key word cipher text retrieval method in cloud environment based on iterative cryptographic Download PDF

Info

Publication number
CN109213731A
CN109213731A CN201810860176.2A CN201810860176A CN109213731A CN 109213731 A CN109213731 A CN 109213731A CN 201810860176 A CN201810860176 A CN 201810860176A CN 109213731 A CN109213731 A CN 109213731A
Authority
CN
China
Prior art keywords
file
server
array
keyword
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810860176.2A
Other languages
Chinese (zh)
Other versions
CN109213731B (en
Inventor
崔杰
孙越
仲红
许艳
田苗苗
应作斌
陈志立
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Qingxin Technology Co.,Ltd.
Original Assignee
Anhui University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui University filed Critical Anhui University
Priority to CN201810860176.2A priority Critical patent/CN109213731B/en
Publication of CN109213731A publication Critical patent/CN109213731A/en
Application granted granted Critical
Publication of CN109213731B publication Critical patent/CN109213731B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords

Abstract

The present invention discloses the multi-key word cipher text retrieval method based on iterative cryptographic in a kind of cloud environment, including system initialization, establish index, encrypted indexes and file, data uploads, inquiry request generations, server search, data return, user's transmission update request of data.The present invention is based on iterative cryptographic modes to realize quick lookup, independent of inverted index structure, it equally can achieve identical effect, in search process, after server receives request, according to file label iteration ciphertext, decryption is iterated using symmetric encipherment algorithm, corresponding file label can be obtained, Bloom filter is then searched according to file label, to return to the file for the condition that meets to user.Because having used the skill of iterative cryptographic, simultaneously, the requirement of forward secrecy is reached not revealing relationship between keyword and file label.

Description

Multi-key word cipher text retrieval method in cloud environment based on iterative cryptographic
Technical field
The invention belongs to cloud environment encryption technologies, and in particular to the multi-key word based on iterative cryptographic is close in a kind of cloud environment Literary search method.
Background technique
Can search for encryption is a kind of important search technique, can protect secure user data and privacy in cloud storage. With the rapid development of cloud computing, user starts Data Migration to cloud server avoiding cumbersome local data pipe with this It manages and obtains more convenient and fast service.In order to guarantee data security and privacy of user, data be usually with ciphertext storage beyond the clouds In server, but user will encounter the problem how to be searched in ciphertext.It can search for encryption to develop in recent years A kind of cryptographic primitive for supporting user to carry out keyword lookup in ciphertext, it can save a large amount of network and meter for user The computing resource calculated expense, and make full use of cloud server huge carries out the keyword in ciphertext and searches.
Forward secrecy refers to be leaked out for the long term keys for generating session key, use when communicating before not will cause Session key leakage, would not also reveal pervious Content of communciation.In general, meeting under the public key environment of forward secrecy Scheme, public key is fixed, and key is then as the time is updated.This renewal process is unidirectional, therefore is also just protected It has demonstrate,proved and has taken current key, be that can not recover pervious key, to ensure that forward secrecy.
The research that can search for encryption to forward secrecy is supported is begun to focus on now with many scholars.Early in 2005, Chang and Mitzenmacher et al., which is put forward for the first time, supports the dynamic of forward secrecy to can search for encipherment scheme, and side before The problem of case is compared to concern is different, is more of practical significance, but searches plain low efficiency.Several years up to date, the problem was by a large amount of The concern of scholar, proposes many schemes, there is very big promotion in performance.2014, the scheme that Stefanov et al. is proposed existed It is promoted in efficiency, promotes search time to pressure linear time complexity from linear.During their interactive refreshing, Client obtains a large amount of data from server, runs on the sort algorithm of forgetting.In addition, the data in database are deleted It is legal, but only modifies in search process, when the data of deletion are more than half, the authors suggested that re-encrypted Database.2015, Yavuz and Guajardo et al. proposed a new structure, the data structure based on matrix, square The cross and row of battle array respectively represent keyword and file identification, there are two Hash table, one be used as inverted index one be used as it is preceding to Index, inverted index are used to search for forward index for more new data, however the cross and row of their scheme matrixes are determining in advance , therefore, the program, which can be regarded as the symmetrical of static state, can search for encrypting.2016, Sophos is proposed to be replaced based on thresholding Scheme, their scheme has a good performance in calculating and communication, but their displacement be based on public key encryption algorithm, Very high computing cost is needed, there are also their schemes not to support parallel computation, because thresholding displacement needs successive iteration.Also The program only supports increase and search operation, does not support to delete.Therefore, the dynamic characteristic of Sophos is by running two examples Come what is provided, one is used to add, another is for deleting.Query processing process, server meter are being scanned for keyword w It calculates and returns to the difference in two examples between document identifier corresponding with w.These factors reduce server storage and search The practicability of rope operation.2017, Kee and Minkyu et al. proposed the data structure of Shuangzi allusion quotation, and a dictionary is to arrange Indexing a dictionary is forward index, except that be relevant between the two dictionaries not being independent.The structure is fine Realize data dynamic update.Above scheme all only focuses on single keyword search, does not support multiple key to search for.2018 Year, Minxin Du and Qian Wang et al. proposes a kind of new index structure, probability inverted index coding structure, branch The search for holding multiple key conceals the information of keyword well in search and renewal process, has reached and do not leaked key Relationship between word and file, but low efficiency will traverse entire database.
In conclusion existing inverted index is keyword and file label set pair, such as a keyword correspondence is more A file (wi,(id1,id2…idt)) or keyword-file to (wi,id1),(wi,id2)…(wi,idt), it is required to Server is sent to after the two index encryptions, when access next time, server is according to keyword wiCiphertext find it is corresponding Array decrypts the array and obtains corresponding file label, then finds corresponding Bloom filter according to file label to sentence Whether disconnected is the file to be looked for.
Summary of the invention
Goal of the invention: it is an object of the invention to solve the deficiencies in the prior art, base in a kind of cloud environment is provided In the multi-key word cipher text retrieval method of iterative cryptographic, search efficiency of the invention is high, is needed based on can get using iterative cryptographic The file identification to be searched for does not need to establish inverted index, saves the cost for establishing inverted index.
Technical solution: the multi-key word cipher text retrieval method in a kind of cloud environment of the invention based on iterative cryptographic, including Following steps:
(1) data owner's processing locality
(1.1) system initialization: selection security parameter λ, matrix M1With vector S ∈ { 0,1 }m;Using SKE.Gen(1λ) it is that key method of formation generates key, sk1、sk2←SKE.Gen(1λ);
(1.2) index is established:
(1.2.1) extracts keyword from file set dSelect r hash function; hj∈[1,r]={ hj|j∈[1,r],hj:{0,1}*→{0,1}l};
(1.2.2) initialize array Cnt, T, D and Bloom filter BF;(Cnt array recording key is in different files The number of middle appearance, that is, have recorded the number of its iteration in an iterative process, and the corresponding file label of array T recording key changes For encrypted ciphertext, array D has recorded file status, if has deleted);
(1.2.3) is to each keyword wi∈ W is iterated encryption respectively;I ∈ [1, n], n indicate that keyword is always a Number;
(1.2.4) array T records the ciphertext T [w after each keyword and its corresponding iterative cryptographici,ei];
(1.3) encrypted indexes and file;To each Bloom filter, if S [i]=0, I ' [i]=I " [i]=BF [i];If S [i]=1,It calculatesI″};To every One file encryption ci=E (idi,k);
Wherein, S [i] is split vector for dividing Bloom filter BF [i];I ' [i] and I " [i] is Bloom filter BF [i] transformed vector is used for encrypting;
(1.4) data upload, and array D, Bloom filter BF and ciphertext set c are uploaded to server by user;
(2) user searches for data:
(2.1) inquiry request generates;
(2.2) server search;
(2.3) data return;
(3) user, which sends, updates request of data.
Further, to each keyword in the step (1)It is iterated the process of encryption are as follows:
(A) from d (wi) in extract a file label id every times
(B) array Cnt [w is searchedi], if Cnt [wi]=0, e0={ 0,1 }λ
(C)Cnt[wi]=Cnt [wi]+1;
(D)es=Enc (es-1||ids,sk1);Herein, e represents the ciphertext of iteration, the value range of s be [1, | d (wi) |], | d (wi) | it indicates to include keyword wiThe total number of files of file set;
(E)D[ids]=F (ids||1,sk2), when flag=1 indicates that file exists, when flag=0 indicates that file has been deleted It removes;
(F)BF[ids] [t]=1, t ∈ { h1(wi),h2(wi),…,hr(wi)}。
Further, the detailed process that inquiry request generates in the step (2.1) are as follows:
Key word of the inquiry isA keyword is selected firstUser searches array Cnt and T, obtains m=Cnt [wi] andEstablish key word of the inquiryBloom filter bfq;It sendsTo service Device.
Further, in the step (2.2) server search detailed process:
Server receivesAfterwards, according to the number of iterations m andDecryption is iterated to calculate;ei-1|| ids=Enc (ei,sk1), a primary acquisition one file label id and ciphertext e is decrypted, file label is used to and bfqIn calculating Product, ciphertext e are used to be decrypted next time;It computes repeatedly m times, obtains m file label altogether.
Further, in the step (2.3) data return process are as follows: server calculation document label B F [id] with bfqInner product, record qualified file label id;The corresponding ciphertext c of file label id is returned to user.
Further, the process of the step (3) are as follows:
Increase file dg, to each keyword wi∈D(dg), calculate corresponding iteration label ei, calculate Bloom filter BF[dg], update local array Cnt and T, D [dg]=F (idg||1,sk2), send token={ BF [dg],cg,D[dg],add} To server, server update Bloom filter BF and array D, c are added in ciphertext C;Delete file dg, calculate D [dg]=F (idg||0,sk2) send token={ g, D [dg], del } give server, server update array D and the corresponding grand mistake of cloth of deletion Filter BF [dg], delete ciphertext cg
The utility model has the advantages that
Present invention iterative cryptographic technology, wiCorresponding All Files label (id1,id2…idt) successively iteration is carried out, Finally obtain a ciphertext e.When search, user is wiCorresponding ciphertext e is sent to server, as long as server is successively decrypted It can be obtained by all file labels t times, search corresponding qualified file further according to tag access Bloom filter.This Technology of the invention based on iterative cryptographic can achieve same effect in the case where not having to building inverted index, tie index Structure is more succinct, under the premise of protecting privacy, has reached efficient search effect.
Detailed description of the invention
Fig. 1 can search for Encryption Architecture schematic diagram to be in the prior art;
Fig. 2 is overall flow figure of the invention;
Fig. 3 is the specific flow chart of data owner's processing locality in the present invention;
Fig. 4 is the specific flow chart that user searches for data in the present invention;
Fig. 5 is that user sends the specific flow chart for updating request of data in the present invention;
Fig. 6 is experimental comparison figure in the present embodiment.
Specific embodiment
Technical solution of the present invention is described in detail below, but protection scope of the present invention is not limited to the implementation Example.
As shown in Figure 1, the prior art can search in Encryption Architecture, user extracts corresponding close according to file set first Key word set, then according to keyword establish search index, in local cipher file and index, later the ciphertext of file and plus Index after close is uploaded to cloud server.When user wants to search some file, search voucher is established according to search key, It is then sent to Cloud Server, after server receives inquiry request, search index returns to corresponding ciphertext.Such prior art The problems of be: file injection attacks, when file is updated or is repeatedly inquired the same keyword, meeting It is contacted between leakage keyword and file.
As shown in Fig. 2, the multi-key word cipher text retrieval method in a kind of cloud environment of the invention based on iterative cryptographic, successively The following steps are included:
(1) data owner local initialization process: system initialization establishes index, encrypted indexes and file and data It uploads;
(2) user searches for data: inquiry request generates, server search and data return;
(3) user, which sends, updates request of data.
Fig. 3 is the specific flow chart of step (1) in the present invention;
(1) system initialization process the following steps are included:
1) security parameter a λ, SKE, Gen (1 is selectedλ) it is key schedule, choose matrix M1With Vector S ∈ { 0,1 }m
2) key, sk are generated1、sk2←SKE.Gen(1λ)。
(2) index establishment process the following steps are included:
1) keyword is extracted from file set dSelect r hash function;hj∈[1,r]= {hj|j∈[1,r],hj:{0,1}*→{0,1}l};
2) initialize array Cnt, T and D, Bloom filter BF;(Cnt array recording key goes out in different files Existing number, that is, have recorded the number of its iteration in an iterative process, and the corresponding file label iteration of array T recording key adds Ciphertext after close, array D have recorded file status, if having deleted.)
To each keyword
(A) from d (wi) in extract a file label id every times
(B) array Cnt [w is searchedi], if Cnt [wi]=0, e0={ 0,1 }λ
(C)Cnt[wi]=Cnt [wi]+1;
(D)es=Enc (es-1||ids,sk1);Herein, e represents the ciphertext of iteration, the value range of s be [1, | d (wi) |], | d (wi) | it indicates to include keyword wiThe total number of files of file set;
(E)D[ids]=F (ids||1,sk2), when flag=1 indicates that file exists, when flag=0 indicates that file has been deleted It removes;
(F)BF[ids] [t]=1, t ∈ { h1(wi),h2(wi),…,hr(wi)}。
(3) encrypted indexes and file processes the following steps are included:
To each Bloom filter, if S [i]=0, I ' [i]=I " [i]=BF [i];If S [i]=1,It calculatesTo each file encryption ci=E (idi,k)。
(4) data upload process the following steps are included:
1) array D, Bloom filter BF and ciphertext set c are uploaded to server by user.
Fig. 4 is the specific flow chart of step (2) in the present invention;
(1) inquiry request generating process the following steps are included:
Key word of the inquiry isA keyword is selected firstUser searches array Cnt and T, obtains m=Cnt [wi] andEstablish key word of the inquiryBloom filter bfq;It sendsTo server.
(2) server search process the following steps are included:
Server receivesAfterwards, according to the number of iterations m andDecryption is iterated to calculate;ei-1|| ids=Enc (ei,sk1), a primary acquisition one file label id and ciphertext e is decrypted, file label is used to and bfqIn calculating Product, ciphertext e are used to be decrypted next time;It computes repeatedly m times, obtains m file label altogether.
(3) data return course the following steps are included:
1) server calculation document label B F [id] and bfqInner product, record qualified file label id;
2) the corresponding ciphertext c of file label id is returned to user.
Fig. 5 is the specific flow chart of step (3) in the present invention;
Data procedures are updated the following steps are included: increasing file dg, to each keyword wi∈D(dg), it calculates corresponding Iteration label ei, calculate Bloom filter BF [dg], update local array Cnt and T, D [dg]=F (idg||1,sk2), it sends Token={ BF [dg],cg,D[dg], add } give server, server update Bloom filter BF and array D, cgIt is added to close In literary C;Delete file dg, calculate D [dg]=F (idg||0,sk2) send token={ g, D [dg], del } give server, service Device updates array D and deletes corresponding Bloom filter BF [dg], delete ciphertext cg
Embodiment:
The present embodiment is with Request For Comments (RFC document), as test file collection.It is had chosen in experiment 5000 files screen 5000 keywords and are tested.Programming language is java, and machine is configured to Windows7 system, Intel Core i5 (3.2GHZ, 8GB RAM).Pseudo-random function and symmetric encipherment algorithm all use aes algorithm in scheme.
As shown in fig. 6, option b EIS- I, BEIS- II are linearly related with file set size, because Cloud Server executes Primary search needs to be traversed for all file index vectors, so the complexity of its search is θ (#d).IEDSE of the present invention is used Identical effect also may be implemented in the case where not needing inverted index in the searching skill of iterative cryptographic, and search is answered Miscellaneous degree is θ (#d (w)), and search efficiency has promotion.Furthermore the present invention is realized very well between hiding keyword and file label Relationship, weigh between privacy and efficiency.
The present invention is apparently higher than BEIS scheme on search efficiency, because BEIS scheme needs to be traversed for entire text in search Part index vector.
Secret protection explanation of the invention:
In view of the content that Cloud Server is got, the file set respectively encrypted, the index and multiple queries of encryption Trapdoor.Safety analysis is carried out respectively to these three aspects below.
(1) privacy of file set.In the present invention, the file set being stored in Cloud Server passes through AES encryption algorithm for encryption, The privacy of file set can be protected.In addition, symmetric key is that data owner by safe channel is shared with data consumer, And it is both believable, it ensure that the safety of key.(symmetric encipherment algorithm is used when the plaintext of encryption file, index Encryption uses iterative cryptographic).
(2) privacy is indexed.The present invention before the index of Cloud Server is only used to Bloom filter, in addition to letting out for file label Except dew, server not can know that any information of keyword, can be avoided server and attacks to the statistics of keyword and file pair It hits, has effectively resisted file injection attacks.
(3) trapdoor is inquired.Search index vector uses the kNN method encryption of safety, can guarantee the machine for inquiring thresholding Close property.

Claims (6)

1. the multi-key word cipher text retrieval method in a kind of cloud environment based on iterative cryptographic, it is characterised in that: the following steps are included:
(1) data owner's processing locality
(1.1) system initialization: selection security parameter λ, matrix M1With vector S ∈ { 0,1 }m;SKE.Gen(1λ) For key method of formation, key sk is generated1、sk2←SKE.Gen(1λ);
(1.2) index is established:
(1.2.1) extracts keyword from file set dSelect r hash function;hJ ∈ [1, r]= {hj| j ∈ [1, r], hj: { 0,1 }*→ { 0,1 }l};
(1.2.2) initialize array Cnt, T, D and Bloom filter BF;Wherein, Cnt array recording key is in different files The number of middle appearance, the ciphertext after the corresponding file label iterative cryptographic of array T recording key, array D record file status;
(1.2.3) is to each keywordIt is iterated encryption respectively;I ∈ [1, n], n indicate keyword total number;
(1.2.4) array T records the ciphertext T [w after each keyword and its corresponding iterative cryptographici, ei];
(1.3) encrypted indexes and file;To each Bloom filter, if S [i]=0, I ' [i]=I " [i]=BF [i];Such as FruitIt calculates To each file Encrypt ci=E (idi, k);
Wherein, S [i] is split vector for dividing Bloom filter BF [i];I ' [i] and I " [i] is Bloom filter BF [i] Transformed vector is used for encrypting;
(1.4) data upload, and array D, Bloom filter BF and ciphertext set c are uploaded to server by user;
(2) user searches for data:
(2.1) inquiry request generates;
(2.2) server search;
(2.3) data return;
(3) user, which sends, updates request of data.
2. the multi-key word cipher text retrieval method in cloud environment according to claim 1 based on iterative cryptographic, feature exist In: to each keyword in the step (1)It is iterated the process of encryption are as follows:
(A) from d (wi) in extract a file label id every times
(B) array Cnt [w is searchedi], if Cnt [wi]=0, e0={ 0,1 }λ
(C)Cnt[wi]=Cnt [wi]+1;
(D)es=Enc (es-1||ids, sk1);Herein, e represents the ciphertext of iteration, the value range of s be [1, | d (wi) |], | d (wi) | it indicates to include keyword wiThe total number of files of file set;
(E)D[ids]=F (ids| | 1, sk2), when flag=1 indicates that file exists, when flag=0 indicates that file has been deleted;
(F)BF[ids] [t]=1, t ∈ { h1(wi), h2(wi) ..., hr(wi)}。
3. the multi-key word cipher text retrieval method in cloud environment according to claim 1 based on iterative cryptographic, feature exist In: the detailed process that inquiry request generates in the step (2.1) are as follows:
Key word of the inquiry isA keyword is selected firstUser searches array Cnt and T, obtains m=Cnt [wi] WithEstablish key word of the inquiryBloom filter bfq;It sendsTo server.
4. the multi-key word cipher text retrieval method in cloud environment according to claim 1 based on iterative cryptographic, feature exist In: the detailed process of server search in the step (2.2):
Server receivesAfterwards, according to the number of iterations m andDecryption is iterated to calculate;ei-1||ids= Enc(ei, sk1), a primary acquisition one file label id and ciphertext e is decrypted, file label is used to and bfqInner product is calculated, it is close Literary e is used to be decrypted next time;It computes repeatedly m times, obtains m file label altogether.
5. the multi-key word cipher text retrieval method in cloud environment according to claim 1 based on iterative cryptographic, feature exist In: the process that data return in the step (2.3) are as follows: server calculation document label B F [id] and bfqInner product, record symbol The file label id of conjunction condition;The corresponding ciphertext c of file label id is returned to user.
6. the multi-key word cipher text retrieval method in cloud environment according to claim 1 based on iterative cryptographic, feature exist In: user sends the process of update request of data in the step (3) are as follows:
Increase file dg, to each keyword wi∈D(dg), calculate corresponding iteration labelCalculate Bloom filter BF [dg], update local array Cnt and T, D [dg]=F (idg| | 1, sk2), send token={ BF [dg], cg, D [dg], add } it gives Server, server update Bloom filter BF and array D, cgIt is added in ciphertext C;Delete file dg, calculate D [dg]=F (idg| | 0, sk2) send token={ g, D [dg], del } give server, server update array D and the corresponding grand mistake of cloth of deletion Filter BF [dg], delete ciphertext cg
CN201810860176.2A 2018-08-01 2018-08-01 Multi-keyword ciphertext retrieval method based on iterative encryption in cloud environment Active CN109213731B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810860176.2A CN109213731B (en) 2018-08-01 2018-08-01 Multi-keyword ciphertext retrieval method based on iterative encryption in cloud environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810860176.2A CN109213731B (en) 2018-08-01 2018-08-01 Multi-keyword ciphertext retrieval method based on iterative encryption in cloud environment

Publications (2)

Publication Number Publication Date
CN109213731A true CN109213731A (en) 2019-01-15
CN109213731B CN109213731B (en) 2021-05-14

Family

ID=64990417

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810860176.2A Active CN109213731B (en) 2018-08-01 2018-08-01 Multi-keyword ciphertext retrieval method based on iterative encryption in cloud environment

Country Status (1)

Country Link
CN (1) CN109213731B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109933618A (en) * 2019-03-08 2019-06-25 西安电子科技大学 A kind of novel encryption data digging system
CN111767364A (en) * 2019-03-26 2020-10-13 钉钉控股(开曼)有限公司 Data processing method, device and equipment
CN111797425A (en) * 2019-04-02 2020-10-20 Sap欧洲公司 Secure database with dictionary coding
CN113132085A (en) * 2021-04-14 2021-07-16 上海同态信息科技有限责任公司 Ciphertext query method based on searchable encryption

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9141658B1 (en) * 2007-09-28 2015-09-22 Emc Corporation Data classification and management for risk mitigation
CN106599719A (en) * 2016-12-12 2017-04-26 西安电子科技大学 Ciphertext retrieval method supporting efficient key management
CN107220343A (en) * 2017-05-26 2017-09-29 福州大学 Chinese multi-key word Fuzzy Sorting cipher text searching method based on local sensitivity Hash
WO2018059142A1 (en) * 2016-09-27 2018-04-05 腾讯科技(深圳)有限公司 Information sending method and apparatus, and storage medium
CN107948146A (en) * 2017-11-20 2018-04-20 武汉科技大学 A kind of connection keyword retrieval method based on encryption attribute in mixed cloud

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9141658B1 (en) * 2007-09-28 2015-09-22 Emc Corporation Data classification and management for risk mitigation
WO2018059142A1 (en) * 2016-09-27 2018-04-05 腾讯科技(深圳)有限公司 Information sending method and apparatus, and storage medium
CN106599719A (en) * 2016-12-12 2017-04-26 西安电子科技大学 Ciphertext retrieval method supporting efficient key management
CN107220343A (en) * 2017-05-26 2017-09-29 福州大学 Chinese multi-key word Fuzzy Sorting cipher text searching method based on local sensitivity Hash
CN107948146A (en) * 2017-11-20 2018-04-20 武汉科技大学 A kind of connection keyword retrieval method based on encryption attribute in mixed cloud

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109933618A (en) * 2019-03-08 2019-06-25 西安电子科技大学 A kind of novel encryption data digging system
CN111767364A (en) * 2019-03-26 2020-10-13 钉钉控股(开曼)有限公司 Data processing method, device and equipment
CN111767364B (en) * 2019-03-26 2023-12-29 钉钉控股(开曼)有限公司 Data processing method, device and equipment
CN111797425A (en) * 2019-04-02 2020-10-20 Sap欧洲公司 Secure database with dictionary coding
CN111797425B (en) * 2019-04-02 2024-04-19 Sap欧洲公司 Secure database using dictionary coding
CN113132085A (en) * 2021-04-14 2021-07-16 上海同态信息科技有限责任公司 Ciphertext query method based on searchable encryption

Also Published As

Publication number Publication date
CN109213731B (en) 2021-05-14

Similar Documents

Publication Publication Date Title
CN112800088B (en) Database ciphertext retrieval system and method based on bidirectional security index
CN104765848B (en) What support result efficiently sorted in mixing cloud storage symmetrically can search for encryption method
US9275250B2 (en) Searchable encryption processing system
CN106612320B (en) A kind of De-weight method of encryption data in cloud storage
CN109213731A (en) Multi-key word cipher text retrieval method in cloud environment based on iterative cryptographic
CN106326360A (en) Fuzzy multi-keyword retrieval method of encrypted data in cloud environment
CN108256031B (en) Multi-source encrypted image retrieval method supporting privacy protection
EP3058678A1 (en) System and method for dynamic, non-interactive, and parallelizable searchable symmetric encryption
CN102024054A (en) Ciphertext cloud-storage oriented document retrieval method and system
CN109471964A (en) A kind of fuzzy multi-key word based on synset can search for encryption method
CN106599719A (en) Ciphertext retrieval method supporting efficient key management
CN108400970A (en) Set of metadata of similar data message locking encryption De-weight method, cloud storage system in cloud environment
Rizomiliotis et al. ORAM based forward privacy preserving dynamic searchable symmetric encryption schemes
CN111026788A (en) Homomorphic encryption-based multi-keyword ciphertext sorting and retrieving method in hybrid cloud
CN103970889A (en) Security cloud disc for Chinese and English keyword fuzzy search
CN108416037A (en) Centric keyword cipher text searching method based on two-stage index in cloud environment
CN106874379B (en) Ciphertext cloud storage-oriented multi-dimensional interval retrieval method and system
CN108549701A (en) Cloud environment encrypts outsourcing data semantic extended search method and system
CN110737912A (en) thesis duplicate checking method based on homomorphic encryption
CN110928980A (en) Ciphertext data storage and retrieval method for mobile cloud computing
CN106789007B (en) Network information examination method and system based on ciphertext retrieval
Sun et al. Research of data security model in cloud computing platform for SMEs
Handa et al. An efficient approach for secure information retrieval on cloud
CN109165226B (en) Searchable encryption method for ciphertext large data set
Nepolean et al. Privacy preserving ranked keyword search over encrypted cloud data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230719

Address after: 606, Building 8, Nan'an Ruizhi, No. 99, Shengtai Road, Jiangning District, Nanjing, Jiangsu Province, 210000

Patentee after: Jiangsu Qingxin Technology Co.,Ltd.

Address before: 230000 No. 111 Kowloon Road, Hefei Economic Development Zone, Anhui

Patentee before: ANHUI University