CN104023051A - Multi-user multi-keyword searchable encryption method in cloud storage - Google Patents
Multi-user multi-keyword searchable encryption method in cloud storage Download PDFInfo
- Publication number
- CN104023051A CN104023051A CN201410219689.7A CN201410219689A CN104023051A CN 104023051 A CN104023051 A CN 104023051A CN 201410219689 A CN201410219689 A CN 201410219689A CN 104023051 A CN104023051 A CN 104023051A
- Authority
- CN
- China
- Prior art keywords
- prime
- user
- keyword
- cloud storage
- search
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 21
- 125000004122 cyclic group Chemical group 0.000 claims description 4
- 230000008520 organization Effects 0.000 description 8
- 238000004891 communication Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
Description
技术领域technical field
本发明属于信息安全技术领域,应用于云计算中数据安全存储服务过程中,具体涉及一种云存储中多用户多个关键词可搜索的加密方法。The invention belongs to the technical field of information security, is applied in the process of data security storage service in cloud computing, and specifically relates to an encryption method in which multiple users and multiple keywords can be searched in cloud storage.
背景技术Background technique
云计算作为一种新的计算模型,能够提供成本较低、可扩展的各种先进的计算服务,为了节省存储及管理数据的代价,企业和个人可以将数据外包到云存储服务器。云存储服务提供的数据具有可用性和可靠性等优势,但是其也有一个很明显的缺点,即数据不在用户的管理及控制之下,那么如何维护数据的机密性和完整性便成为用户迫切关注的问题。As a new computing model, cloud computing can provide various advanced computing services with low cost and scalability. In order to save the cost of storing and managing data, enterprises and individuals can outsource data to cloud storage servers. The data provided by the cloud storage service has the advantages of availability and reliability, but it also has an obvious disadvantage, that is, the data is not under the management and control of the user, so how to maintain the confidentiality and integrity of the data becomes an urgent concern of the user. question.
虽然企业相信云存储服务提供商(Cloud Storage Service Provider,CSSP)的可靠性、可用性、容错性等,但是人们无法确信CSSP不将托管的数据用于其他目的;同样对于个人用户而言,他们希望自己的数据只能由自己或指定的人访问而不能被CSSP访问。这将导致两方面的问题:一方面,从用户的角度看,他们无法找到让他们完全可信的CSSP来存储和管理他们的数据;另一方面从CSSP的角度看,在没有解决上述问题的情况下将会丢失大量的客户。因此,数据的机密性及完整性将阻碍云存储的推广及使用。Although enterprises believe in the reliability, availability, fault tolerance, etc. of Cloud Storage Service Providers (Cloud Storage Service Providers, CSSPs), people cannot be sure that CSSPs will not use hosted data for other purposes; Your own data can only be accessed by yourself or designated people and cannot be accessed by CSSP. This will lead to two problems: on the one hand, from the user's point of view, they cannot find a fully trusted CSSP to store and manage their data; on the other hand, from the point of view of CSSP, without solving the above problems In this case, a large number of customers will be lost. Therefore, the confidentiality and integrity of data will hinder the promotion and use of cloud storage.
鉴于以上的实际问题,云存储中数据必须在传输到CSSP之前,由用户自己加密,并且也只能由用户自己进行解密,这样将会减轻用户数据泄漏的危险。但这将引入一个新的问题,如用户需要包含某个关键字的文档,那么用户是否能很快的获得他们想要的数据并保证数据对CSSP的机密性?In view of the above practical problems, the data in cloud storage must be encrypted by the user before being transmitted to CSSP, and can only be decrypted by the user himself, which will reduce the risk of user data leakage. But this will introduce a new problem, if the user needs a document containing a certain keyword, can the user quickly obtain the data they want and ensure the confidentiality of the data to CSSP?
可搜索加密作为一种新的密码学技术,能够在加密的数据集合上进行搜索查询,具体方法是,先为文件集合生成索引集合,再使用可搜索加密对这些索引进行加密以隐藏索引内容,并且加密要满足如下性质:1)给定一个关键字(即索引)的令牌,可以获得包含该关键字的所有文件的指针;2)没有令牌,索引的内容是隐藏的;3)只有具有相关密钥的用户才能生成令牌;4)检索过程除了暴露了哪些文件共享某个关键字外,不会暴露任何有关文件和关键字的具体信息。可搜索加密的核心作用是为云存储服务提供:一是用户自己控制其数据;二是数据的安全性质可以通过密码学原理验证,而不是通过法律、物理设备来确定安全性。As a new cryptography technology, searchable encryption can perform search queries on encrypted data collections. The specific method is to generate index collections for file collections, and then use searchable encryption to encrypt these indexes to hide the index content. And the encryption must meet the following properties: 1) Given a token of a keyword (ie index), pointers to all files containing the keyword can be obtained; 2) Without tokens, the content of the index is hidden; 3) Only Only users with relevant keys can generate tokens; 4) The retrieval process will not reveal any specific information about files and keywords except which files share a certain keyword. The core role of searchable encryption is to provide cloud storage services: first, users themselves control their data; second, the security nature of data can be verified through cryptography principles, rather than legal and physical devices to determine security.
发明内容Contents of the invention
本发明的目的是提供一种云存储中多用户多个关键词可搜索的加密方法,解决了现有技术中的云存储数据加密后不能实现关键词检索的问题。The purpose of the present invention is to provide an encryption method in which multiple users and multiple keywords can be searched in cloud storage, which solves the problem in the prior art that keyword retrieval cannot be realized after cloud storage data is encrypted.
本发明采用的技术方案是,一种云存储中多用户多个关键词可搜索的加密方法,The technical solution adopted by the present invention is an encryption method in which multiple users and multiple keywords can be searched in cloud storage,
文件加密者为Ent,文档集合D=(D1,…,Dn),存储服务器为Serv,设文档Di的关键词列表为Wi=(wi,1,…,wi,m),1≤i≤n,n是即将存储的文件个数,m是文档Di中的关键词个数,wi,j为Di的第j个关键词字段的关键词,1≤j≤m,按照以下步骤实施:The file encryptor is Ent, the document set D=(D 1 ,…,D n ), the storage server is Serv, and the keyword list of document D i is W i =(w i,1 ,…,w i,m ) , 1≤i≤n, n is the number of files to be stored, m is the number of keywords in document D i , w i,j is the keyword of the jth keyword field of D i , 1≤j≤ m, follow the steps below:
步骤1、系统参数初始化Step 1. System parameter initialization
由用户管理机构UM输入安全参数k,输出阶为素数q的循环群G,g为G的生成元,并且G中的DDHP是困难的;The user management organization UM inputs the security parameter k, outputs a cyclic group G whose order is a prime number q, g is the generator of G, and DDHP in G is difficult;
随机选择作为UM的主密钥,记为kUM=x,计算h=gx;UM选择两个伪随机函数
步骤2、添加用户Step 2. Add users
由用户管理机构UM输入UM的主密钥kUM=x和用户身份uID∈U,输出uID的密钥和辅助密钥
步骤3、文件拥有者对文件加密和安全索引生成Step 3. The file owner encrypts the file and generates a security index
用户uID输入用户密钥加密密钥ek、随机种子s′、文档Di及其关键词列表Wi=(wi,1,…,wi,m),1≤i≤n,随机选择ri∈RZq,计算 和Ei=Encek(Di),对1≤j≤m,计算σi,j=f′(s′,wi,j),
令文件索引为Ii,1,…,Ii,m),记Ci=(Ei,Ii),将(uID,Ci)发送给云存贮服务器Serv进行存储;Let the file index be I i,1 ,...,I i,m ), record C i =(E i ,I i ), send (uI D ,C i ) to the cloud storage server Serv for storage;
步骤4、用户关于关键词搜索令牌的生成Step 4. Generation of user search tokens for keywords
用户uID输入s′、s″和要检索的关键词位置1≤l1,…,ld≤m及对应的关键词w1′,…,w′d,d是用户搜索的关键词个数,User u ID input s′, s″ and the keyword position to be retrieved 1≤l 1 ,…,l d ≤m and the corresponding keywords w 1 ′,…,w′ d , where d is the number of keywords searched by the user,
随机选择随机数按照下式计算:random number Calculate according to the following formula:
T2=t1,T3=f″(s″,t2),T 2 =t 1 , T 3 =f"(s",t 2 ),
将搜索令牌T=(uID,T1,T2,T3,l1,…,ld)发送给云存贮服务器Serv;Send the search token T=(u ID , T 1 , T 2 , T 3 , l 1 ,..., l d ) to the cloud storage server Serv;
步骤5、云存储服务器关于密文关键词的搜索Step 5, cloud storage server searches for ciphertext keywords
云存贮服务器Serv执行用于搜索加密文档,输入陷门T=(uID,T1,T2,T3,l1,…,ld)及密文Ci=(Ei,Ii),Serv初始化空集Ω,对每一个密文Ci=(Ei,Ii),1≤i≤n,中的Ii,判断下式是否成立:The cloud storage server Serv executes to search encrypted documents, input trapdoor T=(u ID ,T 1 ,T 2 ,T 3 ,l 1 ,…,l d ) and ciphertext C i =(E i ,I i ), Serv initializes the empty set Ω, and for each ciphertext C i =(E i ,I i ), 1≤i≤n, I i in it, judge whether the following formula holds true:
其中的
等号上的问号表示是否相等的意思,The question mark on the equal sign means whether they are equal or not.
若成立,则Ω=Ω∪{Ei};If established, then Ω=Ω∪{E i };
否则,该密文与关键词不匹配,继续搜索下一个关键词索引Ii+1,最后将搜索结果Ω发送给用户uID;Otherwise, the ciphertext does not match the keyword, continue to search for the next keyword index I i+1 , and finally send the search result Ω to user u ID ;
步骤6、用户关于密文的解密Step 6. The user decrypts the ciphertext
用户uID执行用来解密密文,输入对称密钥ek及接收到的Ω,对计算Di=Decek(Ei);The user u ID is used to decrypt the ciphertext, input the symmetric key ek and the received Ω, for Calculate D i = Dec ek (E i );
步骤7、撤销用户Step 7. Cancel user
用户管理机构UM执行用来撤销用户,输入用户身份uID,UM向云存贮服务器Serv发送撤销用户uID的命令,Serv执行操作即云存储服务器CSS删除用户uID注册项目即成。The user management agency UM executes to revoke the user, input the user identity u ID , UM sends a command to revoke the user u ID to the cloud storage server Serv, and the Serv executes the operation That is, the cloud storage server CSS deletes the user u ID registration item Serve.
本发明的有益效果是:The beneficial effects of the present invention are:
1)本发明采用授权用户和存储服务器先后对关键词加密的方式提出了一种可搜索多个关键词的加密方法,使得授权用户能够利用连接关键词的陷门搜索加密文档。通过本发明的方法,数据用户可以将自己的数据加密后,存放到云存储服务器,需要时候,可以通过关键词检索令牌检索到需要的密文数据,然后下载解密。同时,云存储服务器并不知道用户检索的关键词,确保用户的数据信息隐私性。通过与现有方案相比较,本发明方法在通信和计算代价,即搜索陷门大小、关键词加密和搜索的速度等方面的综合效率得到提高。1) The present invention proposes an encryption method that can search for multiple keywords by adopting the method of encrypting keywords successively by the authorized user and the storage server, so that the authorized user can use the trapdoor connecting the keywords to search for encrypted documents. Through the method of the present invention, data users can encrypt their data and store it in the cloud storage server. When necessary, they can retrieve the required ciphertext data through the keyword search token, and then download and decrypt it. At the same time, the cloud storage server does not know the keywords retrieved by the user, ensuring the privacy of the user's data information. Compared with the existing schemes, the comprehensive efficiency of the method in the present invention is improved in terms of communication and calculation cost, that is, search trapdoor size, keyword encryption and search speed.
2)本发明方案是适合多用户环境的,这里的多用户是指可以增加和撤销用户,用户增加可以通过算法Enroll(kUM,uID)实现,用户的撤销可以通过算法RevokeUser(uID)实现。2) The scheme of the present invention is suitable for a multi-user environment. The multi-user here refers to users that can be added and revoked. The increase of users can be realized through the algorithm Enroll(k UM , u ID ), and the revocation of users can be achieved through the algorithm RevokeUser(u ID ) accomplish.
具体实施方式Detailed ways
下面结合具体实施方式对本发明进行详细说明。The present invention will be described in detail below in combination with specific embodiments.
本发明云存储中多用户多个关键词可搜索的加密方法,按照以下步骤实施:The encryption method that multi-users and multiple keywords can search in the cloud storage of the present invention is implemented according to the following steps:
假设文件加密者Ent欲将文档集合D=(D1,…,Dn)加密后存储到存储服务器Serv中,设文档Di的关键词列表为Wi=(wi,1,…,wi,m),1≤i≤n,n是即将存储的文件个数,m是文档Di中的关键词个数,wi,j为Di的第j个关键词字段的关键词,1≤j≤m,构造的方案希望文档加密后可以实现关键词可搜索,实现安全保密的目标,算法包括七个多项式时间的算法,详细描述如下:Assume that the file encryptor Ent wants to encrypt the document collection D=(D 1 ,…,D n ) and store it in the storage server Serv. Let the keyword list of the document D i be W i =(w i,1 ,…,w i, m ), 1≤i≤n, n is the number of files to be stored, m is the number of keywords in the document D i , w i,j is the keyword of the jth keyword field of D i , 1≤j≤m, the constructed scheme hopes that after the document is encrypted, keywords can be searched to achieve the goal of security and confidentiality. The algorithm includes seven polynomial time algorithms, which are described in detail as follows:
步骤1、系统参数初始化,即步骤Init(1k)Step 1. System parameter initialization, that is, step Init(1 k )
该算法由用户管理机构UM执行用来初始化系统,输入安全参数k,输出阶为素数q的循环群G,g为G的生成元,并且G中的DDHP(判定性Diffie-Hellmen假设)是困难的;The algorithm is executed by the user management organization UM to initialize the system, input the security parameter k, output the cyclic group G whose order is a prime number q, g is the generator of G, and the DDHP (deterministic Diffie-Hellmen hypothesis) in G is difficult of;
随机选择作为UM的主密钥,记为kUM=x,计算h=gx;UM选择两个伪随机函数
步骤2、添加用户,即步骤Enroll(kUM,uID)Step 2. Add users, that is, step Enroll(k UM , u ID )
该算法由用户管理机构UM执行用来添加用户,输入UM的主密钥kUM=x和用户身份uID∈U(用户身份是唯一的,如用户的电子邮件地址),输出uID的密钥和辅助密钥
步骤3、文件拥有者对文件加密和安全索引生成,即步骤
用户uID执行的加密算法,输入用户密钥加密密钥ek、随机种子s′、文档Di及其关键词列表Wi=(wi,1,…,wi,m),1≤i≤n,随机选择ri∈RZq,计算
令文件索引为Ii,1,…Ii,m),记Ci=(Ei,Ii),将(uID,Ci)发送给云存贮服务器Serv进行存储。Let the file index be I i, 1 ,...I i, m ), write C i = (E i , I i ), and send (u ID , C i ) to the cloud storage server Serv for storage.
步骤4、用户关于关键词搜索令牌的生成,即步骤Step 4, the generation of the user's keyword search token, that is, the step
用户uID执行用来生成连接关键词的搜索令牌(搜索陷门),输入s′、s″和要检索的关键词位置1≤l1,…,ld≤m及对应的关键词w1′,…,w′d,d是用户搜The user u ID executes the search token (search trapdoor) used to generate the connection keyword, enter s′, s″ and the keyword positions to be retrieved 1≤l 1 ,…,l d ≤m and the corresponding keywords w 1 ′,…,w′ d , where d is the user search
索的关键词个数,随机选择随机数按照下式计算:The number of searched keywords, randomly select the random number Calculate according to the following formula:
T2=t1,T3=f″(s″,t2),T 2 =t 1 , T 3 =f"(s",t 2 ),
将搜索令牌(搜索陷门)T=(uID,T1,T2,T3,l1,…,ld)发送给云存贮服务器Serv。Send the search token (search trapdoor) T=(u ID , T 1 , T 2 , T 3 , l 1 , . . . , l d ) to the cloud storage server Serv.
步骤5、云存储服务器关于密文关键词的搜索,即步骤Search(T,Ci)Step 5, the cloud storage server searches for ciphertext keywords, that is, the step Search(T,C i )
云存贮服务器Serv执行用于搜索加密文档,输入陷门T=(uID,T1,T2,T3,l1,…,ld)及密文Ci=(Ei,Ii),Serv初始化空集Ω,对每一个密文Ci=(Ei,Ii),1≤i≤n,中的Ii,判断下式是否成立:The cloud storage server Serv executes to search encrypted documents, input trapdoor T=(u ID ,T 1 ,T 2 ,T 3 ,l 1 ,…,l d ) and ciphertext C i =(E i ,I i ), Serv initializes the empty set Ω, and for each ciphertext C i =(E i ,I i ), 1≤i≤n, I i in it, judge whether the following formula holds true:
其中的
等号上的问号表示是否相等的意思,The question mark on the equal sign means whether they are equal or not.
若成立,则Ω=Ω∪{Ei};If established, then Ω=Ω∪{E i };
否则,该密文与关键词不匹配,继续搜索下一个关键词索引Ii+1,最后将搜索结果Ω发送给用户uID。Otherwise, the ciphertext does not match the keyword, continue to search the next keyword index I i+1 , and finally send the search result Ω to the user u ID .
步骤6、用户关于密文的解密,即步骤Dec(ek,Ω)Step 6. The user decrypts the ciphertext, that is, step Dec(ek,Ω)
用户uID执行用来解密密文,输入对称密钥ek及接收到的Ω,对计算Di=Decek(Ei)。The user u ID is used to decrypt the ciphertext, input the symmetric key ek and the received Ω, for Calculate D i = Dec ek (E i ).
步骤7、撤销用户,即步骤RevokeUser(uID)Step 7. Revoke the user, that is, the step RevokeUser(u ID )
用户管理机构UM执行用来撤销用户,输入用户身份uID,UM向云存贮服务器Ser发v送撤销用户uID的命令,Serv执行操作
本发明方法的安全性分析Safety analysis of the inventive method
结论1:本发明的技术方案满足正确性。Conclusion 1: The technical solution of the present invention satisfies correctness.
证明:若所有数据都是按照方案中描述生成的,并且如果其中1≤i≤m,1≤j≤d,则有:Proof: If all data are generated as described in the scheme, and if Where 1≤i≤m, 1≤j≤d, then:
实施例1Example 1
假设文件加密者Ent欲将文档集合D=(D1,…,Dn)加密后存储到存储服务器Serv中,设文档Di的关键词列表为Wi=(wi,1,…,wi,m),1≤i≤n,n是即将存储的文件个数,m是文档Di中的关键词个数,wi,j,1≤j≤m,为Di的第j个关键词字段的关键词,构造的方案希望文档加密后可以实现关键词可搜索,实现安全保密的目标,算法包括七个多项式时间的算法,详细描述如下:Assume that the file encryptor Ent wants to encrypt the document collection D=(D 1 ,…,D n ) and store it in the storage server Serv. Let the keyword list of the document D i be W i =(w i,1 ,…,w i, m ), 1≤i≤n, n is the number of files to be stored, m is the number of keywords in document D i , w i,j , 1≤j≤m, is the jth of D i The keyword in the keyword field, the construction scheme hopes that after the document is encrypted, the keyword can be searched, and the goal of security and confidentiality is achieved. The algorithm includes seven polynomial time algorithms, which are described in detail as follows:
步骤1、系统参数初始化,即步骤Init(1k)Step 1. System parameter initialization, that is, step Init(1 k )
该算法由用户管理机构UM执行用来初始化系统,输入安全参数k,一般可以取k=160或者更大,k越大安全性越高。输出阶为素数q的循环群G,g为G的生成元,并且G中的DDHP(判定性Diffie-Hellmen假设)是困难的;The algorithm is executed by the user management organization UM to initialize the system, and the security parameter k is input. Generally, k=160 or larger can be set, and the larger the k, the higher the security. The output order is the cyclic group G of prime number q, g is the generator of G, and the DDHP (deterministic Diffie-Hellmen hypothesis) in G is difficult;
随机选择作为UM的主密钥,记为kUM=x,计算h=gx;UM选择两个伪随机函数和及其随机种子分别为s′,s″∈R{0,1}k,并为语义安全的对称加密算法Enc(·)选择加密密钥ek,这里的两个伪随机函数一般可以通过Sha-1的适当调整来实现。对称加密算法Enc(·)可以采用AES算法等安全加密算法。发布params=(G,g,q,f′,f″,h,Enc)作为系统参数。random selection As the master key of UM, denoted as k UM =x, calculate h=g x ; UM chooses two pseudo-random functions and and their random seeds are s′, s″∈ R {0,1} k respectively, and the encryption key ek is selected for the semantically secure symmetric encryption algorithm Enc( ), where the two pseudo-random functions can generally be passed through Sha- 1 is realized by proper adjustment. The symmetric encryption algorithm Enc(·) can adopt a secure encryption algorithm such as the AES algorithm. Issue params=(G, g, q, f′, f″, h, Enc) as a system parameter.
步骤2、添加用户,即步骤Enroll(kUM,uID)Step 2. Add users, that is, step Enroll(k UM , u ID )
该算法由用户管理机构UM执行以添加用户,输入UM的主密钥kUM和用户身份uID∈U(用户身份是唯一的,如用户的电子邮件地址),输出uID的密钥和辅助密钥
步骤2、添加用户,即步骤Enroll(kUM,uID)Step 2. Add users, that is, step Enroll(k UM , u ID )
该算法由用户管理机构UM执行用来添加用户,输入UM的主密钥kUM=x和用户身份uID∈U(用户身份是唯一的,如用户的电子邮件地址),输出uID的密钥和辅助密钥;将安,全地发,送给用)户uID;将
步骤3、文件拥有者对文件加密和安全索引生成,即步骤Step 3. The file owner encrypts the file and generates a security index, that is, the step
用户uID执行的加密算法,输入用户密钥加密密钥ek、随机种子s′、文档Di及其关键词列表Wi=(wi,1,…,wi,m),1≤i≤n,随机选择ri∈RZq,计算
文件索引为Ii,1,…,Ii,m),记Ci=(Ei,Ii),将(uID,Ci)发送给云存贮服务器Serv进行存储。The file index is I i,1 ,...,I i,m ), record C i =(E i ,I i ), and send (u ID ,C i ) to the cloud storage server Serv for storage.
步骤4、用户关于关键词搜索令牌生成,即步骤Step 4, the user searches for the token with regard to keywords, that is, the step
用户uID执行用来生成连接关键词的搜索令牌(搜索陷门),输入s′、s″和要检索的关键词位置1≤l1,…,ld≤m及对应的关键词w1′,…,w′d,d是用户搜The user u ID executes the search token (search trapdoor) used to generate the connection keyword, enter s′, s″ and the keyword positions to be retrieved 1≤l 1 ,…,l d ≤m and the corresponding keywords w 1 ′,…,w′ d , where d is the user search
索的关键词个数,随机选择随机数t1,按照下式计算:The number of keywords searched, randomly select the random number t 1 , Calculate according to the following formula:
T2=t1,T3=f″(s″,t2),T 2 =t 1 , T 3 =f"(s",t 2 ),
将搜索令牌(搜索陷门)T=(uID,T1,T2,T3,l1,…,ld)发送给云存贮服务器Serv。Send the search token (search trapdoor) T=(u ID , T 1 , T 2 , T 3 , l 1 , . . . , l d ) to the cloud storage server Serv.
步骤5、云存储服务器关于密文关键词的搜索,即步骤Search(T,Ci)Step 5, the cloud storage server searches for ciphertext keywords, that is, the step Search(T,C i )
云存贮服务器Serv执行用于搜索加密文档,输入陷门T=(uID,T1,T2,T3,l1,…,ld)及密文Ci=(Ei,Ii),Serv初始化空集Ω,对每一个密文Ci=(Ei,Ii),1≤i≤n,中的Ii,判断下式是否成立:The cloud storage server Serv executes to search encrypted documents, input trapdoor T=(u ID ,T 1 ,T 2 ,T 3 ,l 1 ,…,l d ) and ciphertext C i =(E i ,I i ), Serv initializes the empty set Ω, and for each ciphertext C i =(E i ,I i ), 1≤i≤n, I i in it, judge whether the following formula holds true:
其中的
等号上的问号表示是否相等的意思,The question mark on the equal sign means whether they are equal or not.
若成立,则Ω=Ω∪{Ei};If established, then Ω=Ω∪{E i };
否则,该密文与关键词不匹配,继续搜索下一个关键词索引Ii+1,最后将搜索结果Ω发送给用户uID。Otherwise, the ciphertext does not match the keyword, continue to search the next keyword index I i+1 , and finally send the search result Ω to the user u ID .
步骤6、用户关于密文的解密,即步骤Dec(ek,Ω)Step 6. The user decrypts the ciphertext, that is, step Dec(ek,Ω)
用户uID执行用来解密密文,输入对称密钥ek及接收到的Ω,对计算Di=Decek(Ei)。The user u ID is used to decrypt the ciphertext, input the symmetric key ek and the received Ω, for Calculate D i = Dec ek (E i ).
步骤7、撤销用户,即步骤RevokeUser(uID)Step 7. Revoke the user, that is, the step RevokeUser(u ID )
用户管理机构UM执行用来撤销用户,输入用户身份uID,UM向云存贮服务器Ser发v送撤销用户uID的命令,Serv执行操作即云存储服务器CSS删除用户uID注册项目
在云存储服务中,用户可以使用可搜索的加密方案对数据加密后,外包到云存储服务器。可搜索加密方案使得用户能够有选择的访问其密文数据,同时还能确保用户搜索数据的机密性,基于连接关键词(即多个关键词的布尔组合)的可搜索加密方案因其更高的搜索精度在安全存储服务中有着重要的应用价值。本发明采用授权用户和存储服务器先后对关键词加密的方式提出了一种可搜索多个关键词的加密方法,使得授权用户能够利用连接关键词的陷门搜索加密文档。通过与现有方案相比较,提出的方案在通信和计算代价,即搜索陷门大小、关键词加密和搜索的速度,等方面的综合效率得到提高。此外,提出的方案支持多用户,即能够动态的增加和撤销用户,使得用户能够直接在存储服务器上进行数据共享。In cloud storage services, users can use searchable encryption schemes to encrypt data and outsource it to cloud storage servers. The searchable encryption scheme enables users to selectively access their ciphertext data, and at the same time ensures the confidentiality of the user's search data. The searchable encryption scheme based on connection keywords (that is, the Boolean combination of multiple keywords) has higher The search accuracy has important application value in secure storage services. The invention proposes an encryption method capable of searching multiple keywords by adopting the method that the authorized user and the storage server successively encrypt the keywords, so that the authorized user can use the trapdoor connecting the keywords to search for encrypted documents. Compared with the existing schemes, the overall efficiency of the proposed scheme is improved in terms of communication and computation costs, namely the size of the search trapdoor, keyword encryption and search speed. In addition, the proposed scheme supports multiple users, that is, users can be dynamically added and revoked, so that users can directly share data on the storage server.
Claims (2)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201410219689.7A CN104023051A (en) | 2014-05-22 | 2014-05-22 | Multi-user multi-keyword searchable encryption method in cloud storage |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201410219689.7A CN104023051A (en) | 2014-05-22 | 2014-05-22 | Multi-user multi-keyword searchable encryption method in cloud storage |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN104023051A true CN104023051A (en) | 2014-09-03 |
Family
ID=51439620
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201410219689.7A Pending CN104023051A (en) | 2014-05-22 | 2014-05-22 | Multi-user multi-keyword searchable encryption method in cloud storage |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN104023051A (en) |
Cited By (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104394155A (en) * | 2014-11-27 | 2015-03-04 | 暨南大学 | Multi-user cloud encryption keyboard searching method capable of verifying integrity and completeness |
| CN104899517A (en) * | 2015-05-15 | 2015-09-09 | 陕西师范大学 | Phrase-based searchable symmetric encryption method |
| CN105049196A (en) * | 2015-07-13 | 2015-11-11 | 西安理工大学 | Searchable encryption method of multiple keywords at specified location in cloud storage |
| CN105187190A (en) * | 2015-08-28 | 2015-12-23 | 浙江工商大学 | Searchable cloud security data encryption method |
| CN105763324A (en) * | 2016-04-19 | 2016-07-13 | 四川理工学院 | Controllable searchable encryption searching method being able to verify multi user-ends |
| CN106850652A (en) * | 2017-02-21 | 2017-06-13 | 重庆邮电大学 | One kind arbitration can search for encryption method |
| CN106951411A (en) * | 2017-03-24 | 2017-07-14 | 福州大学 | A Fast Multi-keyword Semantic Ranking Search Method for Protecting Data Privacy in Cloud Computing |
| CN107256248A (en) * | 2017-06-07 | 2017-10-17 | 福州大学 | Encryption method can search for based on asterisk wildcard in cloud storage safety |
| CN107734054A (en) * | 2017-11-06 | 2018-02-23 | 福州大学 | Encryption data searching system in safe cloud storage |
| CN108011713A (en) * | 2017-11-16 | 2018-05-08 | 南京邮电大学 | Cipher text retrieval method based on homomorphic cryptography in a kind of cloud storage |
| CN108345802A (en) * | 2018-02-11 | 2018-07-31 | 西安电子科技大学 | Join safe and efficient cipher text retrieval method, the onboard system of cloud system based on vehicle |
| CN108416037A (en) * | 2018-03-14 | 2018-08-17 | 安徽大学 | Centric keyword cipher text searching method based on two-stage index in cloud environment |
| CN108599937A (en) * | 2018-04-20 | 2018-09-28 | 西安电子科技大学 | A kind of public key encryption method that multiple key can search for |
| CN109902501A (en) * | 2019-03-19 | 2019-06-18 | 中国海洋大学 | A structured encryption method and system for equality testing based on cloud service platform |
| CN111416710A (en) * | 2020-03-24 | 2020-07-14 | 国网山东省电力公司 | A certificateless searchable encryption method and system applied to multiple receivers |
| CN112257096A (en) * | 2020-11-23 | 2021-01-22 | 中电万维信息技术有限责任公司 | Searching method for cloud storage ciphertext encrypted data |
| CN113254982A (en) * | 2021-07-13 | 2021-08-13 | 深圳市洞见智慧科技有限公司 | Secret track query method and system supporting keyword query |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20090300351A1 (en) * | 2008-05-30 | 2009-12-03 | Nec (China) Co., Ltd. | Fast searchable encryption method |
| CN103731261A (en) * | 2014-01-09 | 2014-04-16 | 西安电子科技大学 | Secret key distribution method under encrypted repeating data deleted scene |
-
2014
- 2014-05-22 CN CN201410219689.7A patent/CN104023051A/en active Pending
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20090300351A1 (en) * | 2008-05-30 | 2009-12-03 | Nec (China) Co., Ltd. | Fast searchable encryption method |
| CN103731261A (en) * | 2014-01-09 | 2014-04-16 | 西安电子科技大学 | Secret key distribution method under encrypted repeating data deleted scene |
Non-Patent Citations (1)
| Title |
|---|
| 王尚平等: ""一个高效的基于连接关键词的可搜索加密方案"", 《电子与信息学报》 * |
Cited By (28)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104394155A (en) * | 2014-11-27 | 2015-03-04 | 暨南大学 | Multi-user cloud encryption keyboard searching method capable of verifying integrity and completeness |
| CN104394155B (en) * | 2014-11-27 | 2017-12-12 | 暨南大学 | It can verify that multi-user's cloud encryption keyword searching method of integrality and completeness |
| CN104899517A (en) * | 2015-05-15 | 2015-09-09 | 陕西师范大学 | Phrase-based searchable symmetric encryption method |
| CN105049196A (en) * | 2015-07-13 | 2015-11-11 | 西安理工大学 | Searchable encryption method of multiple keywords at specified location in cloud storage |
| CN105049196B (en) * | 2015-07-13 | 2018-08-03 | 佛山市明茂网络科技有限公司 | The encryption method that multiple keywords of designated position can search in cloud storage |
| CN105187190A (en) * | 2015-08-28 | 2015-12-23 | 浙江工商大学 | Searchable cloud security data encryption method |
| CN105763324A (en) * | 2016-04-19 | 2016-07-13 | 四川理工学院 | Controllable searchable encryption searching method being able to verify multi user-ends |
| CN106850652A (en) * | 2017-02-21 | 2017-06-13 | 重庆邮电大学 | One kind arbitration can search for encryption method |
| CN106850652B (en) * | 2017-02-21 | 2020-05-26 | 重庆邮电大学 | Arbitration searchable encryption method |
| CN106951411A (en) * | 2017-03-24 | 2017-07-14 | 福州大学 | A Fast Multi-keyword Semantic Ranking Search Method for Protecting Data Privacy in Cloud Computing |
| CN106951411B (en) * | 2017-03-24 | 2019-10-15 | 福州大学 | A Fast Multi-keyword Semantic Ranking Search Method for Protecting Data Privacy in Cloud Computing |
| CN107256248A (en) * | 2017-06-07 | 2017-10-17 | 福州大学 | Encryption method can search for based on asterisk wildcard in cloud storage safety |
| CN107256248B (en) * | 2017-06-07 | 2020-05-08 | 福州大学 | Wildcard-based searchable encryption method in cloud storage security |
| CN107734054A (en) * | 2017-11-06 | 2018-02-23 | 福州大学 | Encryption data searching system in safe cloud storage |
| CN108011713B (en) * | 2017-11-16 | 2020-11-20 | 南京邮电大学 | A ciphertext retrieval method based on homomorphic encryption in cloud storage |
| CN108011713A (en) * | 2017-11-16 | 2018-05-08 | 南京邮电大学 | Cipher text retrieval method based on homomorphic cryptography in a kind of cloud storage |
| CN108345802A (en) * | 2018-02-11 | 2018-07-31 | 西安电子科技大学 | Join safe and efficient cipher text retrieval method, the onboard system of cloud system based on vehicle |
| CN108345802B (en) * | 2018-02-11 | 2021-09-17 | 西安电子科技大学 | Safe and efficient ciphertext retrieval method based on vehicle-connected cloud system and vehicle-mounted system |
| CN108416037A (en) * | 2018-03-14 | 2018-08-17 | 安徽大学 | Centric keyword cipher text searching method based on two-stage index in cloud environment |
| CN108416037B (en) * | 2018-03-14 | 2021-07-23 | 安徽大学 | Central keyword ciphertext search method based on two-level index in cloud environment |
| CN108599937B (en) * | 2018-04-20 | 2020-10-09 | 西安电子科技大学 | Multi-keyword searchable public key encryption method |
| CN108599937A (en) * | 2018-04-20 | 2018-09-28 | 西安电子科技大学 | A kind of public key encryption method that multiple key can search for |
| CN109902501A (en) * | 2019-03-19 | 2019-06-18 | 中国海洋大学 | A structured encryption method and system for equality testing based on cloud service platform |
| CN109902501B (en) * | 2019-03-19 | 2021-09-17 | 中国海洋大学 | Structured encryption method and system for carrying out equivalence test based on cloud service platform |
| CN111416710A (en) * | 2020-03-24 | 2020-07-14 | 国网山东省电力公司 | A certificateless searchable encryption method and system applied to multiple receivers |
| CN112257096A (en) * | 2020-11-23 | 2021-01-22 | 中电万维信息技术有限责任公司 | Searching method for cloud storage ciphertext encrypted data |
| CN113254982A (en) * | 2021-07-13 | 2021-08-13 | 深圳市洞见智慧科技有限公司 | Secret track query method and system supporting keyword query |
| CN113254982B (en) * | 2021-07-13 | 2021-10-01 | 深圳市洞见智慧科技有限公司 | An anonymous tracking query method and system supporting keyword query |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN104023051A (en) | Multi-user multi-keyword searchable encryption method in cloud storage | |
| CN104021157B (en) | Keyword in cloud storage based on Bilinear map can search for encryption method | |
| US11381398B2 (en) | Method for re-keying an encrypted data file | |
| CN105024802B (en) | Multi-user's multi-key word based on Bilinear map can search for encryption method in cloud storage | |
| Miao et al. | Lightweight fine-grained search over encrypted data in fog computing | |
| CN108989026B (en) | A method for revocation of user attributes in publish/subscribe environment | |
| CN105262843B (en) | A data leakage protection method for cloud storage environment | |
| US10503730B1 (en) | Systems and methods for cryptographically-secure queries using filters generated by multiple parties | |
| CN104022866A (en) | Searchable encryption method for multi-user cipher text keyword in cloud storage | |
| CN105049196B (en) | The encryption method that multiple keywords of designated position can search in cloud storage | |
| CN106407822B (en) | A keyword, multi-keyword searchable encryption method and system | |
| CN105610910A (en) | Cloud storage oriented ciphertext full-text search method and system based on full homomorphic ciphers | |
| CN105743888A (en) | Agent re-encryption scheme based on keyword research | |
| CN104052740A (en) | Verifiable dictionary-based searchable encryption method in cloud storage | |
| CN104038349A (en) | Effective and verifiable public key searching encryption method based on KP-ABE | |
| CN108737374A (en) | The method for secret protection that data store in a kind of block chain | |
| CN107395568A (en) | A kind of cipher text retrieval method of more data owner's certifications | |
| Xu et al. | Enabling authorized encrypted search for multi-authority medical databases | |
| CN105933281A (en) | Quantum homomorphism symmetry searchable encryption method and system | |
| CN114036240A (en) | Multi-service provider private data sharing system and method based on block chain | |
| CN105024812B (en) | The encryption method that can search for of the nominative testing person of identity-based in cloud storage | |
| Shen et al. | BMSE: Blockchain-based multi-keyword searchable encryption for electronic medical records | |
| KR20120002729A (en) | Multiparty retrieval system for encrypted documents and method | |
| Dayıoğlu | Secure database in cloud computing-cryptdb revisited | |
| Suthar et al. | EncryScation: A novel framework for cloud iaas, daas security using encryption and obfuscation techniques |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140903 |