CN103955537A - Method and system for designing searchable encrypted cloud disc with fuzzy semantics - Google Patents
Method and system for designing searchable encrypted cloud disc with fuzzy semantics Download PDFInfo
- Publication number
- CN103955537A CN103955537A CN201410207365.1A CN201410207365A CN103955537A CN 103955537 A CN103955537 A CN 103955537A CN 201410207365 A CN201410207365 A CN 201410207365A CN 103955537 A CN103955537 A CN 103955537A
- Authority
- CN
- China
- Prior art keywords
- file
- client
- module
- storage server
- cloud storage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/30—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F16/33—Querying
- G06F16/3331—Query processing
- G06F16/3332—Query translation
- G06F16/3338—Query expansion
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Abstract
The invention relates to a method and a system for designing a searchable encrypted cloud disc with fuzzy semantics. The method comprises the following steps: firstly, inputting a key pair to encrypt a file which is needed to be uploaded by a user through a client side; extracting keywords of the encrypted file, and carrying out semantic extension to build a synonym set; secondly, building a safety index to the built synonym set by a bloom filter, and uploading the safety index to a cloud storage server side; generating a keywords trap door according to the key input by the user by the client side, and submitting the trap door to the cloud storage server side; finally, searching for a corresponding file by the safety index according to the keywords trap door submitted by the user by the cloud storage server side, and returning the file back to the client side; decrypting the file returned by the cloud storage server side through the key pair by the client side. The method and the system are mainly used for providing the synonyms semantic fuzziness search function for the information search of the cipher text file, and supporting the search of many keywords, so that the file can be updated with higher efficiency.
Description
Technical field
The present invention is mainly used in to search for and adds Miyun dish field, particularly a kind of semantic ambiguity and can search for and add Miyun dish method for designing and system.
Background technology
Along with the development of cloud computing, the calculating of traditional computer and memory function are transferred in Cloud Server, effectively reduce user's computing cost and carrying cost.360 cloud dishes, the network storage services such as Baidu's cloud dish are all directly document to be stored in cloud storage server, the data that touch user that Cloud Server keeper and external attacker can be direct or indirect like this, especially for some sensitive datas, user has just lost the direct control to data after storing data in Cloud Server, may cause leakage and the abuse of individual subscriber private data.
To after data encryption, store in cloud storage server, be that Cloud Server keeper or external attacker all cannot be obtained data true content, protected user's privacy.But this has brought great challenge to the information retrieval of encrypt data, can search for encryption technology for solving searching ciphertext problem.Can search for when encryption technology is initial to be proposed, each word in document has been adopted to the structure of two infill layers, but the efficiency of full-text search be lower, and not support multi-key word search.Pertinent literature: Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data[C] //Security and Privacy, 2000. S & P 2000. Proceedings. 2000 IEEE Symposium on. IEEE, 2000:44-55. and the search index of current many keys adopts vector model and encrypts by matrix, generate like this trapdoor and search efficiency lower, and only support accurate keyword search.Pertinent literature: Cao N, Wang C, Li M, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. Parallel and Distributed Systems, IEEE Transactions on, 2014, 25 (1): 222-233. Li R, Xu Z, Kang W, et al. Efficient multi-keyword ranked query over encrypted data in cloud computing[J]. Future Generation Computer Systems, 2014, the scheme of searching for generally that 30:179-190. proposes is at present mainly searching for generally for misspelling, do not support semantic ambiguity search.Pertinent literature: Li J, Wang Q, Wang C, et al. Fuzzy keyword search over encrypted data in cloud computing[C] //INFOCOM, 2010 Proceedings IEEE. IEEE, 2010:1-5. Liu C, Zhu L, Li L, et al. Fuzzy keyword search on encrypted cloud storage data with small index[C] //Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE International Conference on. IEEE, 2011:269-273. the present invention adopts Bloom filter as index structure, there is higher renewal and search efficiency, and support keywords-based retrieval, keyword is carried out building Security Index to complete semantic ambiguity searching request after synonym expansion again.
Because the vocabulary that user profile same thing is used is different, if can not carry out synonym search, the usability of system will be had a strong impact on.
Summary of the invention
The object of the present invention is to provide the existing encryption technology of searching for of a kind of solution cannot complete semantic ambiguity search, upgrade inefficiency, the semantic ambiguity of the low inferior deficiency of multi-key word search efficiency can be searched for and be added Miyun dish method for designing and system.
For achieving the above object, technical scheme of the present invention is: a kind of semantic ambiguity can be searched for and be added Miyun dish method for designing, comprise the steps,
Step S01: by client, the file that input key need be uploaded user is encrypted;
Step S02: extract the keyword of above-mentioned encrypt file, and carry out the set of semantic extension structure synonym;
Step S03: by Bloom filter, the synonym set of above-mentioned structure is carried out the structure of Security Index, and this Security Index is uploaded to cloud storage server end;
Step S04: client is inputted key according to user and generated keyword trapdoor, and this trapdoor is submitted to cloud storage server end;
Step S05: the keyword trapdoor that cloud storage server end is submitted to according to user, by Security Index, search corresponding document, and this document is returned to client;
Step S06: the file that client is returned cloud storage server end by key is decrypted.
In embodiments of the present invention, the update request that described cloud storage server end is submitted to according to user, revises described Security Index and can complete file update.
In embodiments of the present invention, the file encryption of described step S01 is by symmetric encipherment algorithm, file to be encrypted.
In embodiments of the present invention, described symmetric encipherment algorithm is AES, DES or 3DES cryptographic algorithm.
The present invention also provides a kind of semantic ambiguity to search for to add Miyun disc system, comprise a client and a cloud storage server end; Described client comprises that the file encryption-decryption module, that realizes file encryption-decryption uploads Security Index, submits the first communication module of trapdoor and upload/download file to for semantic extension module, a structure Security Index module and of described synonym set being carried out to Security Index structure by Bloom filter of the keyword extracting being carried out to semantic extension and building synonym set for extracting the keyword extracting module, of encrypt file keyword; Described cloud storage server end comprises that one searches the index search module of Security Index, the file storage module of a storage client upload encrypt file and sends encrypt file to described client the second communication module of communicating by letter with described first communication module according to trapdoor.
In embodiments of the present invention, described file encryption-decryption module is encrypted file by symmetric encipherment algorithm.
In embodiments of the present invention, described symmetric encipherment algorithm is AES, DES or 3DES cryptographic algorithm.
In embodiments of the present invention, described client also comprises an interface display module, and this interface display module is used for choosing encrypt file, display of search results and input search key.
In embodiments of the present invention, described semantic extension module adopts WordNet to carry out semantic extension to described synonym set.
Compared to prior art, the present invention has following beneficial effect:
1, the information retrieval that the present invention is mainly ciphertext document provides synonym semantic ambiguity function of search, even if describing difference to a certain keyword, user also can return to relevant documentation, and support keywords-based retrieval, the index structure based on Bloom filter has higher efficiency to the increase of document, deletion and renewal operation;
2, user stores sensitive data in Cloud Server into, can first will after file encryption, upload, and returns to required document afterwards by searching ciphertext, guarantees the privacy of document.
Accompanying drawing explanation
Fig. 1 is network system architecture figure of the present invention.
Fig. 2 is client terminal structure figure of the present invention.
Fig. 3 is cloud storage server end structure figure of the present invention.
Embodiment
Below in conjunction with accompanying drawing, technical scheme of the present invention is specifically described.
A kind of semantic ambiguity of the present invention can be searched for and be added Miyun dish method for designing, comprises the steps,
Step S01: by client, the file that input key need be uploaded user is encrypted;
Step S02: extract the keyword of above-mentioned encrypt file, and carry out the set of semantic extension structure synonym;
Step S03: by Bloom filter, the synonym set of above-mentioned structure is carried out the structure of Security Index, and this Security Index is uploaded to cloud storage server end;
Step S04: client is inputted key according to user and generated keyword trapdoor, and this trapdoor is submitted to cloud storage server end;
Step S05: the keyword trapdoor that cloud storage server end is submitted to according to user, by Security Index, search corresponding document, and this document is returned to client;
Step S06: the file that client is returned cloud storage server end by key is decrypted.
In embodiments of the present invention, the update request that described cloud storage server end is submitted to according to user, revises described Security Index and can complete file update.
The file encryption of described step S01 is by symmetric encipherment algorithm, file to be encrypted; Described symmetric encipherment algorithm is AES, DES or 3DES cryptographic algorithm.
The present invention also provides a kind of semantic ambiguity to search for to add Miyun disc system, comprise a client and a cloud storage server end, described client comprises the file encryption-decryption module that realizes file encryption-decryption, one for extracting the keyword extracting module of encrypt file keyword, one for carrying out semantic extension to the keyword extracting and building the semantic extension module (described semantic extension module adopts WordNet to carry out semantic extension to described synonym set) of synonym set, the one structure Security Index module and of described synonym set being carried out to Security Index structure by Bloom filter is uploaded Security Index, submit the first communication module of trapdoor and upload/download file to, described cloud storage server end comprises that one searches the index search module of Security Index, the file storage module of a storage client upload encrypt file and sends encrypt file to described client the second communication module of communicating by letter with described first communication module according to trapdoor, described client also comprises an interface display module, and this interface display module is used for choosing encrypt file, display of search results and input search key.
Described file encryption-decryption module is encrypted file by symmetric encipherment algorithm; Described symmetric encipherment algorithm is AES, DES or 3DES cryptographic algorithm.
Be below embodiments of the invention.
As Figure 1-3, because the vocabulary that user profile same thing is used is different, if can not carry out synonym search, the usability of system will be had a strong impact on.For the existing encryption technology of searching for, cannot complete semantic ambiguity search, upgrade inefficiency, the low inferior deficiency of multi-key word search efficiency.The present invention proposes a kind of multi-key word semantic ambiguity based on Bloom filter and can search for and add Miyun dish method for designing and system, belong to field of software development, mainly comprise client and server end.
Client: user passes through client, input key is encrypted operation to document, client is obtained document keyword and is carried out semantic extension and builds synonym set, and the synonym set after expansion is built to Security Index by Bloom filter, and by the Security Index end that uploads onto the server, when user submits searching request to, client generates keyword trapdoor according to key, and trapdoor is submitted to server end completes searching request.The document that server is returned is used key to be decrypted.
Server end: storage cryptograph files and index file, the keyword trapdoor of submitting to for user, finds respective document by Security Index, and the document is returned to client.When user need to upgrade, the update request of submitting to according to user, increases, deletes and change operation only needs to revise the corresponding Bloom filter index of server end, and time efficiency is O (1).
The present invention is mainly used in to search for and adds Miyun dish field, a kind of application software based on ciphertext memory scan has been proposed, this software mainly comprises: (1) some clients, each client is mainly responsible for document encryption and decryption, build document security index and submit the functions such as searching request to, A. file encryption-decryption module: mainly by calling existing symmetric encipherment algorithm, document is encrypted, as AES, DES, traditional symmetric encipherment algorithm such as 3DES, B. interface display module: be mainly responsible for choosing encrypt file, the functions such as display of search results and input search key, C. keyword extracting module: mainly also filter out a by extracting the keyword of Document Title, the, the stop words such as of, D. semantic extension module: the keyword extracting is carried out to semantic extension by WordNet, the set of structure synonym, E. build Security Index module: by the hash function with key, build Bloom filter index, F. communication module: be mainly responsible for submitting to user search trapdoor, upload/download ciphertext document sets and upload the operations such as Security Index, (2) cloud storage server end, the main functions such as file storage and index search of being responsible for, A. index search module: the keyword trapdoor of mainly submitting to by user is searched index and returned to Search Results, B. file storage module: the main ciphertext document of being responsible for storage client upload, by index search result, the document retrieving is returned to user, C. communication module: main being responsible for returns to the ciphertext document retrieving user and receive sending request of client.
Client and server end all adopts the java jdk1.7 environment under windows platform to develop herein.Client operates under Windows 7 systems, the processing of PDF document is adopted to the java class libraries of PDFBox, the JWI WordNet java class libraries that semantic extension adopts WordNet 2.1 versions and uses Massachusetts Institute of Technology (MIT) to provide; Cloud storage server end operates under Windows server 2003 servers.
Using method of the present invention is as follows:
User is first encrypted document by client, and document is extracted to keyword formation Security Index, document and Security Index after encrypting are uploaded in cloud storage server, while needing document, input in the search box keyword, client is to keyword structure trapdoor and trapdoor is committed to cloud storage server, and server is searched index by trapdoor, the document finding is returned to client, and client is decrypted document.
Be more than preferred embodiment of the present invention, all changes of doing according to technical solution of the present invention, when the function producing does not exceed the scope of technical solution of the present invention, all belong to protection scope of the present invention.
Claims (9)
1. semantic ambiguity can be searched for and be added a Miyun dish method for designing, it is characterized in that: comprise the steps,
Step S01: by client, the file that input key need be uploaded user is encrypted;
Step S02: extract the keyword of above-mentioned encrypt file, and carry out the set of semantic extension structure synonym;
Step S03: by Bloom filter, the synonym set of above-mentioned structure is carried out the structure of Security Index, and this Security Index is uploaded to cloud storage server end;
Step S04: client is inputted key according to user and generated keyword trapdoor, and this trapdoor is submitted to cloud storage server end;
Step S05: the keyword trapdoor that cloud storage server end is submitted to according to user, by Security Index, search corresponding document, and this document is returned to client;
Step S06: the file that client is returned cloud storage server end by key is decrypted.
2. a kind of semantic ambiguity according to claim 1 can be searched for and be added Miyun dish method for designing, it is characterized in that: the update request that described cloud storage server end is submitted to according to user, and revise described Security Index and can complete file update.
3. a kind of semantic ambiguity according to claim 1 can be searched for and be added Miyun dish method for designing, it is characterized in that: the file encryption of described step S01 is by symmetric encipherment algorithm, file to be encrypted.
4. a kind of semantic ambiguity according to claim 3 can be searched for and be added Miyun dish method for designing, it is characterized in that: described symmetric encipherment algorithm is AES, DES or 3DES cryptographic algorithm.
5. semantic ambiguity can be searched for and be added a Miyun disc system, it is characterized in that: comprise a client and a cloud storage server end; Described client comprises that the file encryption-decryption module, that realizes file encryption-decryption uploads Security Index, submits the first communication module of trapdoor and upload/download file to for semantic extension module, a structure Security Index module and of described synonym set being carried out to Security Index structure by Bloom filter of the keyword extracting being carried out to semantic extension and building synonym set for extracting the keyword extracting module, of encrypt file keyword; Described cloud storage server end comprises that one searches the index search module of Security Index, the file storage module of a storage client upload encrypt file and sends encrypt file to described client the second communication module of communicating by letter with described first communication module according to trapdoor.
6. a kind of semantic ambiguity according to claim 5 can be searched for and be added Miyun disc system, it is characterized in that: described file encryption-decryption module is encrypted file by symmetric encipherment algorithm.
7. a kind of semantic ambiguity according to claim 6 can be searched for and be added Miyun disc system, it is characterized in that: described symmetric encipherment algorithm is AES, DES or 3DES cryptographic algorithm.
8. a kind of semantic ambiguity according to claim 5 can be searched for and be added Miyun disc system, it is characterized in that: described client also comprises an interface display module, and this interface display module is used for choosing encrypt file, display of search results and input search key.
9. according to a kind of semantic ambiguity described in claim 5 or 8, can search for and add Miyun disc system, it is characterized in that: described semantic extension module adopts WordNet to carry out semantic extension to described synonym set.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410207365.1A CN103955537A (en) | 2014-05-16 | 2014-05-16 | Method and system for designing searchable encrypted cloud disc with fuzzy semantics |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410207365.1A CN103955537A (en) | 2014-05-16 | 2014-05-16 | Method and system for designing searchable encrypted cloud disc with fuzzy semantics |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103955537A true CN103955537A (en) | 2014-07-30 |
Family
ID=51332812
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410207365.1A Pending CN103955537A (en) | 2014-05-16 | 2014-05-16 | Method and system for designing searchable encrypted cloud disc with fuzzy semantics |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103955537A (en) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104158827A (en) * | 2014-09-04 | 2014-11-19 | 中电长城网际系统应用有限公司 | Cryptograph data sharing method and device, inquiring server and data uploading client terminal |
CN104821876A (en) * | 2015-04-16 | 2015-08-05 | 华中科技大学 | Dynamic searchable symmetrical encryption method supporting physical deletion |
CN105069358A (en) * | 2015-07-13 | 2015-11-18 | 西安理工大学 | Keyword searchable encryption method based on Bloom filter with storage structure |
CN106656925A (en) * | 2015-10-30 | 2017-05-10 | 北京国双科技有限公司 | Webpage registration method and device |
CN106997384A (en) * | 2017-03-24 | 2017-08-01 | 福州大学 | A kind of semantic ambiguity that can verify that sorts can search for encryption method |
CN107491497A (en) * | 2017-07-25 | 2017-12-19 | 福州大学 | Multi-user's multi-key word sequence of any language inquiry is supported to can search for encryption system |
CN107566111A (en) * | 2017-10-23 | 2018-01-09 | 郑州云海信息技术有限公司 | A kind of network node Bloom filter structure and implementation method based on AES |
CN107679408A (en) * | 2017-09-27 | 2018-02-09 | 福州大学 | Regular language searching system in safe cloud storage |
CN107734054A (en) * | 2017-11-06 | 2018-02-23 | 福州大学 | Encryption data searching system in safe cloud storage |
CN108021677A (en) * | 2017-12-07 | 2018-05-11 | 成都博睿德科技有限公司 | The control method of cloud computing distributed search engine |
CN108334612A (en) * | 2018-02-07 | 2018-07-27 | 华南理工大学 | A kind of nearly Chinese character full text fuzzy retrieval method of shape for ciphertext domain |
CN108512840A (en) * | 2018-03-21 | 2018-09-07 | 杭州弗兰科信息安全科技有限公司 | One kind is based on letting out the encrypted cipher text retrieval method of sequence |
TWI638271B (en) * | 2017-11-08 | 2018-10-11 | 國立成功大學 | Cloud server system with encrypted file keyword fuzzy search function |
CN108712366A (en) * | 2018-03-27 | 2018-10-26 | 西安电子科技大学 | That morphology meaning of a word fuzzy search is supported in cloud environment can search for encryption method and system |
CN109471964A (en) * | 2018-10-23 | 2019-03-15 | 哈尔滨工程大学 | A kind of fuzzy multi-key word based on synset can search for encryption method |
CN109871426A (en) * | 2018-12-18 | 2019-06-11 | 国网浙江桐乡市供电有限公司 | A kind of monitoring recognition methods of confidential data |
CN112966018A (en) * | 2021-03-03 | 2021-06-15 | 北京邮电大学 | Fuzzy retrieval method based on mixed cloud |
CN113642038A (en) * | 2021-08-09 | 2021-11-12 | 杭州安恒信息技术股份有限公司 | Searchable encryption method, device, equipment and storage medium |
CN115292737A (en) * | 2022-10-08 | 2022-11-04 | 成都泛联智存科技有限公司 | Multi-keyword fuzzy search encryption method and system and electronic equipment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005033979A1 (en) * | 2003-09-30 | 2005-04-14 | Google, Inc. | Personalization of web search |
US20080021902A1 (en) * | 2006-07-18 | 2008-01-24 | Dawkins William P | System and Method for Storage Area Network Search Appliance |
CN101470752A (en) * | 2007-12-29 | 2009-07-01 | 指点通(北京)科技有限公司 | Search engine method based on keyword resolution scheduling |
CN101561815A (en) * | 2009-05-19 | 2009-10-21 | 华中科技大学 | Distributed cryptograph full-text retrieval system |
CN102034049A (en) * | 2010-12-30 | 2011-04-27 | 华中科技大学 | Mass data compression, encryption, storage and retrieval system and using method thereof |
CN103345526A (en) * | 2013-07-22 | 2013-10-09 | 武汉大学 | Efficient privacy protection encrypted message querying method in cloud environment |
CN103593476A (en) * | 2013-11-28 | 2014-02-19 | 中国科学院信息工程研究所 | Multi-keyword plaintext and ciphertext retrieving method and device oriented to cloud storage |
-
2014
- 2014-05-16 CN CN201410207365.1A patent/CN103955537A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005033979A1 (en) * | 2003-09-30 | 2005-04-14 | Google, Inc. | Personalization of web search |
US20080021902A1 (en) * | 2006-07-18 | 2008-01-24 | Dawkins William P | System and Method for Storage Area Network Search Appliance |
CN101470752A (en) * | 2007-12-29 | 2009-07-01 | 指点通(北京)科技有限公司 | Search engine method based on keyword resolution scheduling |
CN101561815A (en) * | 2009-05-19 | 2009-10-21 | 华中科技大学 | Distributed cryptograph full-text retrieval system |
CN102034049A (en) * | 2010-12-30 | 2011-04-27 | 华中科技大学 | Mass data compression, encryption, storage and retrieval system and using method thereof |
CN103345526A (en) * | 2013-07-22 | 2013-10-09 | 武汉大学 | Efficient privacy protection encrypted message querying method in cloud environment |
CN103593476A (en) * | 2013-11-28 | 2014-02-19 | 中国科学院信息工程研究所 | Multi-keyword plaintext and ciphertext retrieving method and device oriented to cloud storage |
Cited By (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104158827B (en) * | 2014-09-04 | 2018-07-31 | 中电长城网际系统应用有限公司 | Ciphertext data sharing method, device, inquiry server and upload data client |
CN104158827A (en) * | 2014-09-04 | 2014-11-19 | 中电长城网际系统应用有限公司 | Cryptograph data sharing method and device, inquiring server and data uploading client terminal |
CN104821876B (en) * | 2015-04-16 | 2018-02-16 | 华中科技大学 | A kind of dynamic for supporting that physics is deleted can search for symmetric encryption method |
CN104821876A (en) * | 2015-04-16 | 2015-08-05 | 华中科技大学 | Dynamic searchable symmetrical encryption method supporting physical deletion |
CN105069358A (en) * | 2015-07-13 | 2015-11-18 | 西安理工大学 | Keyword searchable encryption method based on Bloom filter with storage structure |
CN105069358B (en) * | 2015-07-13 | 2018-09-04 | 杭州共享汇信息技术有限公司 | Keyword based on the Bloom filters with storage organization can search for encryption method |
CN106656925A (en) * | 2015-10-30 | 2017-05-10 | 北京国双科技有限公司 | Webpage registration method and device |
CN106997384B (en) * | 2017-03-24 | 2020-01-14 | 福州大学 | Semantic fuzzy searchable encryption method capable of verifying sequencing |
CN106997384A (en) * | 2017-03-24 | 2017-08-01 | 福州大学 | A kind of semantic ambiguity that can verify that sorts can search for encryption method |
CN107491497A (en) * | 2017-07-25 | 2017-12-19 | 福州大学 | Multi-user's multi-key word sequence of any language inquiry is supported to can search for encryption system |
CN107491497B (en) * | 2017-07-25 | 2020-08-11 | 福州大学 | Multi-user multi-keyword sequencing searchable encryption system supporting query in any language |
CN107679408A (en) * | 2017-09-27 | 2018-02-09 | 福州大学 | Regular language searching system in safe cloud storage |
CN107679408B (en) * | 2017-09-27 | 2020-06-12 | 福州大学 | Regular language retrieval system in secure cloud storage |
CN107566111A (en) * | 2017-10-23 | 2018-01-09 | 郑州云海信息技术有限公司 | A kind of network node Bloom filter structure and implementation method based on AES |
CN107734054A (en) * | 2017-11-06 | 2018-02-23 | 福州大学 | Encryption data searching system in safe cloud storage |
TWI638271B (en) * | 2017-11-08 | 2018-10-11 | 國立成功大學 | Cloud server system with encrypted file keyword fuzzy search function |
CN108021677A (en) * | 2017-12-07 | 2018-05-11 | 成都博睿德科技有限公司 | The control method of cloud computing distributed search engine |
US11537626B2 (en) | 2018-02-07 | 2022-12-27 | South China University Of Technology | Full-text fuzzy search method for similar-form Chinese characters in ciphertext domain |
CN108334612A (en) * | 2018-02-07 | 2018-07-27 | 华南理工大学 | A kind of nearly Chinese character full text fuzzy retrieval method of shape for ciphertext domain |
WO2019153813A1 (en) * | 2018-02-07 | 2019-08-15 | 华南理工大学 | Full-text fuzzy retrieval method for similar chinese characters in ciphertext domain |
CN108512840A (en) * | 2018-03-21 | 2018-09-07 | 杭州弗兰科信息安全科技有限公司 | One kind is based on letting out the encrypted cipher text retrieval method of sequence |
CN108712366A (en) * | 2018-03-27 | 2018-10-26 | 西安电子科技大学 | That morphology meaning of a word fuzzy search is supported in cloud environment can search for encryption method and system |
CN108712366B (en) * | 2018-03-27 | 2021-02-19 | 西安电子科技大学 | Searchable encryption method and system supporting word form and word meaning fuzzy retrieval in cloud environment |
CN109471964A (en) * | 2018-10-23 | 2019-03-15 | 哈尔滨工程大学 | A kind of fuzzy multi-key word based on synset can search for encryption method |
CN109871426A (en) * | 2018-12-18 | 2019-06-11 | 国网浙江桐乡市供电有限公司 | A kind of monitoring recognition methods of confidential data |
CN109871426B (en) * | 2018-12-18 | 2021-08-10 | 国网浙江桐乡市供电有限公司 | Method for monitoring and identifying confidential data |
CN112966018A (en) * | 2021-03-03 | 2021-06-15 | 北京邮电大学 | Fuzzy retrieval method based on mixed cloud |
CN112966018B (en) * | 2021-03-03 | 2022-04-01 | 北京邮电大学 | Fuzzy retrieval method based on mixed cloud |
CN113642038A (en) * | 2021-08-09 | 2021-11-12 | 杭州安恒信息技术股份有限公司 | Searchable encryption method, device, equipment and storage medium |
CN113642038B (en) * | 2021-08-09 | 2024-02-13 | 杭州安恒信息技术股份有限公司 | Searchable encryption method, searchable encryption device, searchable encryption equipment and storage medium |
CN115292737A (en) * | 2022-10-08 | 2022-11-04 | 成都泛联智存科技有限公司 | Multi-keyword fuzzy search encryption method and system and electronic equipment |
CN115292737B (en) * | 2022-10-08 | 2022-12-09 | 成都泛联智存科技有限公司 | Multi-keyword fuzzy search encryption method and system and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103955537A (en) | Method and system for designing searchable encrypted cloud disc with fuzzy semantics | |
US11537626B2 (en) | Full-text fuzzy search method for similar-form Chinese characters in ciphertext domain | |
CN103970889A (en) | Security cloud disc for Chinese and English keyword fuzzy search | |
Wang et al. | Towards secure and effective utilization over encrypted cloud data | |
Khan et al. | Secure ranked fuzzy multi-keyword search over outsourced encrypted cloud data | |
CN104036050A (en) | Complex query method for encrypted cloud data | |
Handa et al. | A cluster based multi-keyword search on outsourced encrypted cloud data | |
Mittal et al. | Privacy preserving synonym based fuzzy multi-keyword ranked search over encrypted cloud data | |
Ananthi et al. | FSS-SDD: fuzzy-based semantic search for secure data discovery from outsourced cloud data | |
CN107294701B (en) | Multidimensional ciphertext interval query device and method with efficient key management | |
JP2004234344A (en) | Database access system | |
CN113642038A (en) | Searchable encryption method, device, equipment and storage medium | |
Yan et al. | Secure and efficient big data deduplication in fog computing | |
Li et al. | Secure and verifiable multi-owner ranked-keyword search in cloud computing | |
ThandaiahPrabu et al. | An efficient and secured multiple keyword cloud data searching scheme with dynamic encryption procedure | |
CN109582818B (en) | Music library cloud retrieval method based on searchable encryption | |
Kumari et al. | Privacy preserving similarity based text retrieval through blind storage | |
Kamini et al. | Encrypted multi-keyword ranked search supporting gram based search technique | |
Li et al. | An efficient multi-keyword ranked retrieval scheme with johnson-lindenstrauss transform over encrypted cloud data | |
Handa et al. | An efficient cluster-based multi-keyword search on encrypted cloud data | |
Chen et al. | Searchable encryption system for big data storage | |
Mlgheit et al. | Security Model for Preserving Privacy over Encrypted Cloud Computing | |
Harshitha et al. | Comparative study on RSA algorithm of multi-keyword search scheme over encrypted cloud data | |
CN111026754B (en) | Safe and efficient circular range data uploading and querying method, corresponding storage medium and electronic device | |
Chen et al. | Memory leakage-resilient dynamic and verifiable multi-keyword ranked search on encrypted smart body sensor network data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140730 |