CN109582818A - It is a kind of based on can search for encryption song library cloud search method - Google Patents
It is a kind of based on can search for encryption song library cloud search method Download PDFInfo
- Publication number
- CN109582818A CN109582818A CN201811319580.5A CN201811319580A CN109582818A CN 109582818 A CN109582818 A CN 109582818A CN 201811319580 A CN201811319580 A CN 201811319580A CN 109582818 A CN109582818 A CN 109582818A
- Authority
- CN
- China
- Prior art keywords
- song
- vector
- user
- party
- trusted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 239000013598 vector Substances 0.000 claims abstract description 123
- 239000011159 matrix material Substances 0.000 claims description 14
- 239000000284 extract Substances 0.000 claims description 5
- 230000002441 reversible effect Effects 0.000 claims description 5
- 238000010276 construction Methods 0.000 claims description 4
- 238000012856 packing Methods 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 description 5
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Corresponding user's table and song retrieval table are safeguarded comprising steps of data owner encrypts each song files based on the song library cloud search method that can search for encryption the invention discloses a kind of, are sent to trusted third party's management;The keyword for extracting each song files constitutes keyword dictionary and generates the index vector of each song files;Song files and index vector are encrypted using Encryption Algorithm, corresponding encryption file is generated and is sent to song library Cloud Server;User input query keyword is simultaneously sent to trusted third party and generates corresponding query vector, and encryption is sent to song library Cloud Server;Song library Cloud Server calculates the similarity of query vector index vector corresponding with song files, and the song files of preset quantity are sent to trusted third party;The song files that all song library Cloud Servers are sent are decrypted using decipherment algorithm by trusted third party, and send the song files of decryption to user;The present invention can carry out quick-searching to song and ensure the information security of song.
Description
Technical Field
The invention belongs to the cross technical field of music library management, cloud computing and applied cryptography, and aims to solve the problems of song encryption and effective retrieval of a music library cloud server, in particular to a music library cloud retrieval method based on searchable encryption.
Background
With the development of music industry, the enthusiasm created by more and more independent musicians is promoted, so that the number of song files is increasingly huge, and the pressure of music companies for processing the files is increased day by day. For such a huge data set, music companies often choose to store the song information on a cloud server, but honest and curious cloud servers are not snooping the song data at all times. Therefore, companies often perform encryption before storing the song information, thereby ensuring the privacy and security of data.
Although the encryption technology can ensure the privacy and the security of the song information, the retrieval process is not easy as that of plaintext retrieval, and if all the song information is downloaded and decrypted for retrieval, the local storage resources and bandwidth resources are definitely wasted. In order to solve the problem, a searchable encryption technology can be adopted to carry out ciphertext retrieval on the song information in the song library cloud server, and only the specific song information is downloaded and decrypted, so that the waste of resources can be greatly reduced.
At present, the retrieval technology in the music library cloud server is not clear, and the rapid retrieval of the specified songs can not be realized while the security of the song information in the music library cloud server is ensured.
Disclosure of Invention
The invention mainly aims to provide a song library cloud retrieval method based on searchable encryption, aiming at the problem that in the prior art, the rapid retrieval of a specified song cannot be realized while the security of song information is ensured in the retrieval of a song library and a server, and the specific technical scheme is as follows:
a method for searchable encryption based music library cloud retrieval, the method comprising the steps of:
s1, system construction and initialization: packing the information of each song into a song file, forming a song library system based on the data contained in the song file, initializing the parameters of the song library system by a data owner, generating a key, a user table and a song retrieval table, and sending the key, the user table and the song retrieval table to a trusted third party for management;
s2, constructing an index vector: a data owner extracts corresponding keywords for each song file, a keyword dictionary is formed by the keywords, and an index vector corresponding to each song file is generated based on the keywords;
s3, file encryption: encrypting each song file by adopting a specified encryption algorithm to generate a corresponding encrypted file, and sending the encrypted file to a music library cloud server;
s4, generating a user query vector: a user inputs a query keyword and sends the query keyword to a trusted third party, the trusted third party judges whether the user corresponding to the input query keyword is legal or not, if the user is legal, a corresponding query vector is generated based on the query keyword, and the query vector is encrypted and transmitted to a file library cloud server; otherwise, rejecting the query requirement of the user;
s5, retrieving songs based on the query vector: responding to the query vector, the song library cloud server calculates the similarity between the query vector and the index vector corresponding to each song through an inner product algorithm, and sends a preset number of song files to a trusted third party;
s6, decrypting song files: and the trusted third party decrypts all the song files sent by all the song library cloud servers by adopting a specified decryption algorithm and sends the decrypted song files to the corresponding users.
Further, the method further comprises the steps of:
s7, sorting and decrypting the songs: and the trusted third party maintains a song retrieval table containing song identifications, song retrieval times and retrieval user identifications for all the decrypted song files by adopting a specified sorting algorithm.
Further, step S1 includes: the data owner randomly generates an n + 1-dimensional vector S ═ S1,S2,...,Sn+1And a reversible matrix of six (N +1) × (N +1) dimensions { N }1,N2,N3,N4,M1,M2And according to the vector S and the invertible matrix N1,N2,N3,N4,M1,M2Generating key SK ═ S, N1,N2,N3,N4,M1,M2}; wherein n represents the number of the keywords.
Further, step S2 specifically includes:
s21, the data owner extracts n keywords to generate a keyword dictionary C ═ { C ═ C1,C2,...,Cn};
S22, setting m song files, and forming F ═ F from m song files1,F2,...,FmF ═ F }, construction of F ═ F1,F2,...,FmThe corresponding index vector D ═ D1,D2,...,Dm};
S23, use CjRepresenting the jth keyword in the dictionary by DiIndex vector representing ith song file, if DiThe song file represented contains CjThen D isi[j]1, otherwise, Di[j]=0。
Further, step S3 further includes the data owner using the key SK ═ { S, N ═ S, N1,N2,N3,N4,M1,M2Encrypting the index vector D ═ D1,D2,...,DmGenerating an encryption index vector
Data owner expands n-dimensional vector Di into n + 1-dimensional vectorAnd based on the vector S and the vectorRandomly splitting two n + 1-dimensional vectorsAndwherein, the splitting method comprises the following steps: if S [ i ]]When the value is equal to 0, thenOtherwiseAndis any random number; data owner will vectorAndusing a specified invertible matrix M1And M2Encryption forms an encrypted index vectorData owner based on the encrypted index vectorThe song file is encrypted using a specified encryption algorithm.
Further, step S4 specifically includes:
s41, the trusted third party generates a corresponding n-dimensional query vector Q according to the keywords sent by the user, wherein if the query vector Q contains the keywords CiThen Q [ i ]]1, otherwise Q [ i]=0;
S42, the trusted third party firstly expands the n-dimensional query vector Q into n +1 dimensionsThen using the vector S willSplit into two random vectorsAndwherein if S [ i ]]When 1, then orderOtherwise, if S [ i ]]When it is equal to 0, then orderWhereinAndis any random number;
s43 reversible matrix designated by random splittingAndto obtain
S44, the trusted third party willAndusing invertible matrices M1And M2Encrypting the query vector Q as
Further, the step S5 specifically includes the steps of: the music library cloud server passes through a formula
Computing encrypted query vectorsWith all of said encrypted index vectors
Further, the method further comprises a user adding stage: and the user forms registration information through registration and sends the registration information to the trusted third party, and the trusted third party adds the user corresponding to the registration information to the user table.
Further, the method also comprises a song updating stage: and deleting and adding song files in the song library cloud server by the data owner.
Furthermore, each user is correspondingly provided with a unique UserID; and each song file is correspondingly provided with a unique SongID.
Compared with the prior art, the invention has the beneficial effects that: by utilizing the characteristic that ciphertext retrieval can be carried out by utilizing a searchable encryption technology, a database of songs cloud retrieval scheme based on searchable encryption is provided, ciphertext retrieval can be directly carried out, and no additional information is disclosed to a database of songs cloud server; by utilizing the characteristic of asymmetric inner product order-preserving encryption, in an Euclidean space, the relative distance between data points can be calculated by the asymmetric inner product order-preserving encryption, so that the first k song files with the highest similarity can be retrieved in a ciphertext state and finally returned to a user, and the retrieval of the appointed song files in a song library cloud server is realized; meanwhile, the encryption matrix of the trapdoor is randomly decomposed, so that ciphertexts obtained by encrypting the same plaintext are different, the attack of keyword guessing can be resisted, and an attacker cannot obtain any useful information from the corresponding ciphertexts even if selecting the same plaintext for attack every time, thereby ensuring the safety of data; and the invention realizes the dynamic management of the user and song information, stores a user table and a song search table in the credible third party, respectively uses the ID of the user and the ID of the song as the unique identification of the user and the song, the credible third party only provides the search service for the authorized user, and optimizes and sorts the search result according to the song search table, and the result returned to the user is more accurate and obvious.
Drawings
Fig. 1 is a flowchart illustrating a song library cloud retrieval method based on searchable encryption according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of the user table according to an embodiment of the invention;
fig. 3 is a representation of the song retrieval according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention.
Referring to fig. 1, 2 and 3, in an embodiment of the present invention, a music library cloud retrieval method based on searchable encryption is provided, and in particular, the present invention assumes that company a wants to set all song files F ═ { F ═ F of the company1,F2,...,FmAnd encrypting and then putting the encrypted data into a kokura cloud server for retrieval by users of the company. non-A company user Bob wants to be atSearching for some songs in the song library cloud server specifically comprises the following steps:
s1, initializing the system, wherein since all songs belong to company A, the invention does not describe in detail how company A packs the songs into song files, and the process of packing the songs into song files is not the main technical scheme of the invention, and the invention does not describe in detail herein; after forming song files, A, initializing a system, forming a key, a user table and a song retrieval table corresponding to each song file, and sending the key, the user table and the song retrieval table to a trusted third party for management; s2, constructing an index vector: a data owner extracts corresponding and unique keywords for each song file, and a keyword dictionary is formed by the keywords and an index vector of each keyword is generated; s3, file encryption: encrypting each song file by adopting a specified encryption algorithm to generate a corresponding encrypted file, and sending the encrypted file to a music library cloud server; s4, generating a user query vector: the method comprises the steps that a user inputs a query keyword and sends the query keyword to a trusted third party, the trusted third party judges whether the user corresponding to the input query keyword is legal or not, if the user is legal, a corresponding query vector is generated based on the query keyword, and the query vector is encrypted and transmitted to a curved base cloud server; otherwise, rejecting the query requirement of the user; s5, retrieving songs based on the query vector: responding to the query vector, the song library cloud server calculates the similarity between the query vector and the index vector corresponding to each song, and sends a preset number of song files to a trusted third party; s6, decrypting song files: and the trusted third party decrypts all the song files sent by all the song library cloud servers by adopting a specified decryption algorithm and sends the decrypted song files to the corresponding users.
In a specific embodiment, the user table is used for saving all users, and A manages the users through the user table; specifically, the user generates a unique UserId corresponding to the user in a registration mode, and the UserId is used as a unique identifier of the user, so that the safety of user information is improved; similarly, in order to improve the security of the song information, A compares all song files with the keywords and the index vector corresponding to each song to generate a SongId and generate a song retrieval table so as to improve the security of the song information; moreover, the method of the invention can realize the retrieval function of the song file by generating the UserId which is only corresponding to the user and the SongId which is only corresponding to the song; in the registration process of the user, the user needs to send own registration information to the trusted third party, and the trusted third party adds the user into a user table; specifically, referring to fig. 2, if Bob does not register at first, Bob sends its registration information to the trusted third party after registration, and the trusted third party adds Bob as a new user to the user table; and if Bob fails to successfully send own registration information to the trusted third party in the registration process, the registration information can be sent to A, and then the registration information is sent to the trusted third party by the A, so that the registration function is realized and the user list is entered, and the song can be conveniently retrieved in the song library cloud server.
In addition, in order to enable a user to search songs more accurately and quickly in the song library cloud server, when the user decrypts song files and acquires related song information, a trusted third party maintains a song search table containing song identifications, song search times and user id of a search user for all the decrypted song files by using a specified sorting algorithm, specifically referring to fig. 3, assuming that the trusted third party receives 659 th, 3 rd, 1 st, 50 th and 4023 th song files in the song library cloud server, and decrypts the song files by using a decryption key, it can be seen that Bob has user id 777 in the 1 st song, and the 1 st song has a large number of search times, so the 1 st song is arranged in front and returned; and the 3 rd song is not searched, so the 3 rd song should be ranked at the last, the other three songs are ranked in turn according to the searched times, and the sequence of the songs in the finally obtained song search table is the 1 st song, … rd and 3 rd songs.
In the embodiment of the present invention, the specific process of system initialization is as follows:
first, a vector S of N +1 dimensions and a reversible matrix { N) of six (N +1) × (N +1) dimensions are randomly generated from A1,N2,N3,N4,M1,M2And according to the vector S and the invertible matrix N1,N2,N3,N4,M1,M2Generating key SK ═ S, N1,N2,N3,N4,M1,M2}; wherein n represents the number of keywords; then generating a user table, wherein each user generates a unique UserId identifier so as to facilitate the subsequent management of the user and sends the user table to a trusted third party; and finally, generating a song retrieval table to enable each song to correspond to one SongId, facilitating the retrieval of the songs, and sending the song retrieval table to a trusted third party for management.
In the embodiment of the present invention, the specific process of constructing the index vector is as follows:
extracting n key words from A to all song files to generate key word dictionary C ═ { C ═ C1,C2,...,Cn}; and construct all song files F ═ F1,F2,...,FmThe corresponding index vector D ═ D1,D2,...,Dm}; wherein, C is usedjRepresenting the jth keyword in the dictionary. By DiIndex vector representing ith song file, if DiThe song file represented contains CjThen D isi[j]1, otherwise, Di[j]0; here, the index vector of the first song is taken as D1=(01001…10111)。
In the embodiment of the present invention, the specific process of encrypting the song is as follows:
first, a uses the key SK ═ S, N1,N2,N3,N4,M1,M2D-D encryption index vector1,D2,...,DmGenerating an encryption index vectorThen A will n-dimensional vector DiExpanded as an n +1 dimensional vectorThen using the vector S to convert the vectorRandomly splitting two n + 1-dimensional vectorsAndwherein, the splitting method comprises the following steps: if S [ i ]]When the value is equal to 0, thenIf S [ i ]]1, thenWherein,andis an arbitrary random number; finally A will vectorAndusing a specified invertible matrix M1And M2Encryption forms an encrypted index vectorA is based on the amount of re-encrypted indexThe song file is encrypted using a specified encryption algorithm.
In the embodiment of the present invention, the specific process of generating the query vector is as follows:
firstly, a user inputs a song to be queried on a query-able website or software designated by A through equipment such as a mobile phone, an IPAD and the like, and inputs a query keyword, wherein the query keyword is sent to a trusted third party managing song file information of A, and the trusted third party can generate a corresponding n-dimensional query vector Q according to the keyword sent by the user after receiving the query keyword input by the user because each song may have similar or similar keywords; specifically, assume that the query keyword entered by the client is CiIf the query vector Q contains the keyword CiThen Q [ i ]]1, otherwise Q [ i]0; taking Bob wants to query the first song as an example, it can be known that the query vector generated at this time is Q ═ (00001 … 01000); subsequently, the trusted third party uses the key SK ═ { S, N1,N2,N3,N4,M1,M2Generating an encrypted query vectorSpecifically, the trusted third party first expands the n-dimensional query vector Q into an n + 1-dimensional vectorThen reuse the vector S and the vectorSplit into two random vectorsAndwhen splitting, if S [ i ]]1, thenIf S [ i ]]When the value is equal to 0, thenThen through the invertible matrixAndby random splitting to obtain Finally, the trusted third party combines the two random vectorsAndusing invertible matrices M1And M2Encrypting the query vector Q to obtain an encrypted query vectorAnd will encrypt the query vectorSending the data to a music library cloud server for retrieval operation; and the method of the present invention generates an encrypted query vector by using the query vector QThe security of song inquiry is promoted.
In the embodiment of the present invention, the specific process of song retrieval is as follows:
receiving the encrypted search vector at the song library and the serverThereafter, an encrypted query vector is computedAnd encrypting the index vectorDegree of similarity ofTo measure the similarity of phasesHigher and encrypted index vectorsThe corresponding song is sent to the credible third party, specifically, the invention passes the formula
Computing encrypted query vectorsAnd encrypting the index vectorDegree of similarity ofIt can be seen that the final similarity calculation is represented by the index vector D and the query vector Q, i.e., for D1The final calculated similarity was (01001 … 10111) and Q (00001 … 01000)The index vector D of each song file may be obtained by using the same query vector Q, for example, the index vector D of the song file corresponding to five songs is obtained, that is, the song library cloud server may send the song corresponding to the five songs with the highest similarityThe song file is sent to a trusted third party; certainly, the invention is not limited and fixed for the music library cloud server to send several songs, and the program setting can be carried out on how many songs can be obtained specifically according to the actual situation.
In the invention, after a trusted third party receives five songs sent by a song library cloud server, the encryption key SK { S, N } of each song file can be utilized1,N2,N3,N4,M1,M2And decrypting the song file by using the corresponding decryption key to obtain decrypted song information data which can be used by the user.
The invention can also carry out the update of the songs according to the actual requirements, and specifically comprises deleting and adding the song files in the song library cloud server so as to adapt to the changing market and different user requirements; referring to fig. 3, when a song z is added, firstly, the data owner a constructs an index vector of the z, and the index vector is encrypted and then sent to the song library cloud server together with the encrypted song description file and the encrypted song information file; meanwhile, z is added to the song search table, the number of times of searching for the newly added song is required to be 0, and the UserId column is required to be null; when a song is deleted, the data owner A only needs to search the corresponding song in the song library cloud server, delete the file and delete the entry of the song in the song search table; in practical situations, after the number of song files is increased to a certain number, the data owner a recalculates the index vector of each song, and updates the index vectors of all songs in the song library cloud server after encryption, so as to more conveniently and quickly retrieve the songs.
In the actual operation, the invention can also delete the user, which specifically comprises the following steps: if the displacement identifier UserId of the Bob is 77777, finding an entry corresponding to the Bob in the user table according to the UserId of the Bob, and deleting the entry; meanwhile, the user can also actively log off the identity information of the user, namely the user deletes the user himself; assuming that Bob wants to delete himself and does not keep his registration information in the user table, Bob sends a deletion request to the trusted third party, and the trusted third party responds to the deletion request from Bob, finds a specified entry in the user table according to Bob's UserId 777 and deletes the specified entry.
Compared with the prior art, the invention has the beneficial effects that: by utilizing the characteristic that ciphertext retrieval can be carried out by utilizing a searchable encryption technology, a database of songs cloud retrieval scheme based on searchable encryption is provided, ciphertext retrieval can be directly carried out, and no additional information is disclosed to a database of songs cloud server; by utilizing the characteristic of asymmetric inner product order-preserving encryption, in an Euclidean space, the relative distance between data points can be calculated by the asymmetric inner product order-preserving encryption, so that the first k song files with the highest similarity can be retrieved in a ciphertext state and finally returned to a user, and the retrieval of the appointed song files in a song library cloud server is realized; meanwhile, the encryption matrix of the trapdoor is randomly decomposed, so that ciphertexts obtained by encrypting the same plaintext are different, the attack of keyword guessing can be resisted, and an attacker cannot obtain any useful information from the corresponding ciphertexts even if selecting the same plaintext for attack every time, thereby ensuring the safety of data; and the invention realizes the dynamic management of the user and song information, stores a user table and a song search table in the credible third party, respectively uses the ID of the user and the ID of the song as the unique identification of the user and the song, the credible third party only provides the search service for the authorized user, and optimizes and sorts the search result according to the song search table, and the result returned to the user is more accurate and obvious.
Although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments described in the foregoing detailed description, or equivalent changes may be made in some of the features of the embodiments described above. All equivalent structures made by using the contents of the specification and the attached drawings of the invention can be directly or indirectly applied to other related technical fields, and are also within the protection scope of the patent of the invention.
Claims (10)
1. A method for searching a music library cloud based on searchable encryption is characterized by comprising the following steps:
s1, system construction and initialization: packing the information of each song into a song file, forming a song library system based on the data contained in the song file, initializing the parameters of the song library system by a data owner, generating a key, a user table and a song retrieval table, and sending the key, the user table and the song retrieval table to a trusted third party for management;
s2, constructing an index vector: a data owner extracts corresponding keywords for each song file, a keyword dictionary is formed by the keywords, and an index vector corresponding to each song file is generated based on the keywords;
s3, file encryption: encrypting each song file by adopting a specified encryption algorithm to generate a corresponding encrypted file, and sending the encrypted file to a music library cloud server;
s4, generating a user query vector: a user inputs a query keyword and sends the query keyword to a trusted third party, the trusted third party judges whether the user corresponding to the input query keyword is legal or not, if the user is legal, a corresponding query vector is generated based on the query keyword, and the query vector is encrypted and transmitted to a file library cloud server; otherwise, rejecting the query requirement of the user;
s5, retrieving songs based on the query vector: responding to the query vector, the song library cloud server calculates the similarity between the query vector and the index vector corresponding to each song through an inner product algorithm, and sends a preset number of song files to a trusted third party;
s6, decrypting song files: and the trusted third party decrypts all the song files sent by all the song library cloud servers by adopting a specified decryption algorithm and sends the decrypted song files to the corresponding users.
2. The searchable encryption based music library cloud retrieval method according to claim 1, further comprising the steps of:
s7, sorting and decrypting the songs: and the trusted third party maintains a song retrieval table containing song identifications, song retrieval times and retrieval user identifications for all the decrypted song files by adopting a specified sorting algorithm.
3. The method for searching the music library cloud based on the searchable encryption according to claim 1, wherein step S1 includes: the data owner randomly generates an n + 1-dimensional vector S ═ S1,S2,...,Sn+1And a reversible matrix of six (N +1) × (N +1) dimensions { N }1,N2,N3,N4,M1,M2And according to the vector S and the invertible matrix N1,N2,N3,N4,M1,M2Generating key SK ═ S, N1,N2,N3,N4,M1,M2}; wherein n represents the number of the keywords.
4. The music library cloud retrieval method based on searchable encryption according to claim 3, wherein step S2 specifically includes:
s21, the data owner extracts n keywords to generate a keyword dictionary C ═ { C ═ C1,C2,...,Cn};
S22, setting m song files, and forming F ═ F from m song files1,F2,...,FmF ═ F }, construction of F ═ F1,F2,...,FmThe corresponding index vector D ═ D1,D2,...,Dm};
S23, use CjRepresenting the jth keyword in the dictionary by DiIndex vector representing ith song file, if DiThe song file represented contains CjThen D isi[j]1, otherwise, Di[j]=0。
5. The method of claim 4, wherein step S3 further comprises the data owner using the key SK { S, N ═ S, N }1,N2,N3,N4,M1,M2Encrypting the index vector D ═ D1,D2,...,DmGenerating an encryption index vector
The data owner will vector D n-dimensionallyiExpanded as an n +1 dimensional vectorAnd based on the vector S and the vectorRandomly splitting two n + 1-dimensional vectorsAndwherein, the splitting method comprises the following steps: if S [ i ]]When the value is equal to 0, thenOtherwise Andis any random number; data owner will vectorAndusing a specified invertible matrix M1And M2Encryption forms an encrypted index vectorData owner based on the encrypted index vectorThe song file is encrypted using a specified encryption algorithm.
6. The music library cloud retrieval method based on searchable encryption according to claim 5, wherein step S4 specifically includes:
s41, the trusted third party generates a corresponding n-dimensional query vector Q according to the keywords sent by the user, wherein if the query vector Q contains the keywords CiThen Q [ i ]]1, otherwise Q [ i]=0;
S42, the trusted third party firstly expands the n-dimensional query vector Q into n +1 dimensionsThen using the vector S willSplit into two random vectorsAndwherein if S [ i ]]When 1, then orderOtherwise, if S [ i ]]When it is equal to 0, then orderWhereinAndis any random number;
s43 reversible matrix designated by random splittingAndto obtain
S44, the trusted third party willAndusing invertible matrices M1And M2Encrypting the query vector Q as
7. The method for searching the music library cloud based on the searchable encryption according to claim 6, wherein the step S5 specifically includes the steps of: the music library cloud server passes through a formula
Computing encrypted query vectorsWith all of said encrypted index vectorsDegree of similarity of
8. The method for searching the kokusai cloud based on the searchable encryption according to any one of claims 1 to 7, wherein the method further comprises a user adding stage of: and the user forms registration information through registration and sends the registration information to the trusted third party, and the trusted third party adds the user corresponding to the registration information to the user table.
9. The searchable encryption based song library cloud retrieval method according to claim 8, further comprising a song update phase: and deleting and adding song files in the song library cloud server by the data owner.
10. The method for searching the music library cloud based on the searchable encryption according to claim 8, wherein each user is correspondingly provided with a unique user id; and each song file is correspondingly provided with a unique SongID.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811319580.5A CN109582818B (en) | 2018-11-07 | 2018-11-07 | Music library cloud retrieval method based on searchable encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811319580.5A CN109582818B (en) | 2018-11-07 | 2018-11-07 | Music library cloud retrieval method based on searchable encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109582818A true CN109582818A (en) | 2019-04-05 |
CN109582818B CN109582818B (en) | 2020-03-27 |
Family
ID=65921673
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811319580.5A Active CN109582818B (en) | 2018-11-07 | 2018-11-07 | Music library cloud retrieval method based on searchable encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109582818B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114691759A (en) * | 2022-06-01 | 2022-07-01 | 平安科技(深圳)有限公司 | Data query statistical method, device, computer equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040062390A1 (en) * | 2002-09-30 | 2004-04-01 | Micron Technology, Inc. | Public key cryptography using matrices |
JP2006080658A (en) * | 2004-09-07 | 2006-03-23 | Mitsubishi Electric Information Systems Corp | Content multi-stage encryption system and content multi-stage encryption program |
CN106326360A (en) * | 2016-08-10 | 2017-01-11 | 武汉科技大学 | Fuzzy multi-keyword retrieval method of encrypted data in cloud environment |
CN107704768A (en) * | 2017-09-14 | 2018-02-16 | 上海海事大学 | A kind of multiple key classification safety search method of ciphertext |
CN108228849A (en) * | 2018-01-10 | 2018-06-29 | 浙江理工大学 | Ciphertext sorted search method based on classification packet index in cloud network |
CN108712366A (en) * | 2018-03-27 | 2018-10-26 | 西安电子科技大学 | That morphology meaning of a word fuzzy search is supported in cloud environment can search for encryption method and system |
-
2018
- 2018-11-07 CN CN201811319580.5A patent/CN109582818B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040062390A1 (en) * | 2002-09-30 | 2004-04-01 | Micron Technology, Inc. | Public key cryptography using matrices |
JP2006080658A (en) * | 2004-09-07 | 2006-03-23 | Mitsubishi Electric Information Systems Corp | Content multi-stage encryption system and content multi-stage encryption program |
CN106326360A (en) * | 2016-08-10 | 2017-01-11 | 武汉科技大学 | Fuzzy multi-keyword retrieval method of encrypted data in cloud environment |
CN107704768A (en) * | 2017-09-14 | 2018-02-16 | 上海海事大学 | A kind of multiple key classification safety search method of ciphertext |
CN108228849A (en) * | 2018-01-10 | 2018-06-29 | 浙江理工大学 | Ciphertext sorted search method based on classification packet index in cloud network |
CN108712366A (en) * | 2018-03-27 | 2018-10-26 | 西安电子科技大学 | That morphology meaning of a word fuzzy search is supported in cloud environment can search for encryption method and system |
Non-Patent Citations (1)
Title |
---|
NING CAO 等: "《Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data》", 《30TH IEEE ANNUAL CONFERENCE ON COMPUTER COMMUNICATIONS(INFOCOM)》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114691759A (en) * | 2022-06-01 | 2022-07-01 | 平安科技(深圳)有限公司 | Data query statistical method, device, computer equipment and storage medium |
CN114691759B (en) * | 2022-06-01 | 2022-09-06 | 平安科技(深圳)有限公司 | Data query statistical method, device, computer equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109582818B (en) | 2020-03-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11537626B2 (en) | Full-text fuzzy search method for similar-form Chinese characters in ciphertext domain | |
Miao et al. | Hybrid keyword-field search with efficient key management for industrial internet of things | |
CN107948146B (en) | Connection keyword retrieval method based on attribute encryption in hybrid cloud | |
CN112800088A (en) | Database ciphertext retrieval system and method based on bidirectional security index | |
CN109992995B (en) | Searchable encryption method supporting location protection and privacy inquiry | |
CN105681280A (en) | Searchable encryption method based on Chinese in cloud environment | |
CN103955537A (en) | Method and system for designing searchable encrypted cloud disc with fuzzy semantics | |
US9946720B1 (en) | Searching data files using a key map | |
CN114884650A (en) | Searchable encryption method based on safe inverted index | |
CN107294701B (en) | Multidimensional ciphertext interval query device and method with efficient key management | |
CN105897419B (en) | A kind of multi-user's dynamic keyword word can search for encryption method | |
Kabir et al. | A dynamic searchable encryption scheme for secure cloud server operation reserving multi-keyword ranked search | |
Wang et al. | An efficient and privacy-preserving range query over encrypted cloud data | |
US20240015014A1 (en) | Dynamic and verifiable searchable encryption method and system based on updatable encryption and blockchain | |
CN109582818B (en) | Music library cloud retrieval method based on searchable encryption | |
CN106874379B (en) | Ciphertext cloud storage-oriented multi-dimensional interval retrieval method and system | |
CN108319670A (en) | The dynamic ranking searching method that can verify that based on cloud computing | |
CN114528370A (en) | Dynamic multi-keyword fuzzy ordering searching method and system | |
Handa et al. | An efficient approach for secure information retrieval on cloud | |
Raghavendra et al. | DRSMS: Domain and range specific multi-keyword search over encrypted cloud data | |
CN111026754B (en) | Safe and efficient circular range data uploading and querying method, corresponding storage medium and electronic device | |
CN113158245A (en) | Method, system, equipment and readable storage medium for searching document | |
Kamini et al. | Encrypted multi-keyword ranked search supporting gram based search technique | |
CN118643055B (en) | Privacy protection dynamic space keyword query method and device under multi-attribute cost constraint, electronic equipment and storage medium | |
Chen et al. | Efficient verifiable multi-user searchable symmetric encryption for encrypted data in the cloud |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |